Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Digital forensic investigation methodology for Storage Space: Based on the NIST digital forensic process

Full metadata record
DC Field Value Language
dc.contributor.authorKim, Junho-
dc.contributor.authorLee, Sangjin-
dc.contributor.authorJeong, Doowon-
dc.date.accessioned2022-06-23T00:41:25Z-
dc.date.available2022-06-23T00:41:25Z-
dc.date.created2022-06-22-
dc.date.issued2022-05-
dc.identifier.issn0022-1198-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/142322-
dc.description.abstractFor forensic examiners, investigating the RAID systems of servers has been challenging, as the examiners must reconstruct multiple high-capacity disks to identify digital evidence. Software-based RAID systems' use has been released for personal use, so examiners should consider RAID systems even when they investigate personal computers. Although there is a high probability that the software-based RAID will become a target of crime, there has been little research into digital forensic methodology for software-based RAID, as exemplified by Storage Space. In this paper, we introduce details about the structure of Storage Space found through reverse engineering. Storage Space was analyzed by applying the digital forensic process of NIST. We explain how to reconstruct a virtual disk configured using Storage Space and develop an automated tool to do so. To evaluate our study and the tool developed, we created an experimental scenario and describe in detail the forensic procedure and technical methods for the analysis of Storage Space. Our research can be used as the basis of forensic investigations for Storage Space.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherWILEY-
dc.subjectDATA TRACES-
dc.subjectDEVICE-
dc.subjectSYSTEM-
dc.titleDigital forensic investigation methodology for Storage Space: Based on the NIST digital forensic process-
dc.typeArticle-
dc.contributor.affiliatedAuthorLee, Sangjin-
dc.identifier.doi10.1111/1556-4029.14992-
dc.identifier.scopusid2-s2.0-85123898031-
dc.identifier.wosid000748149200001-
dc.identifier.bibliographicCitationJOURNAL OF FORENSIC SCIENCES, v.67, no.3, pp.989 - 1001-
dc.relation.isPartOfJOURNAL OF FORENSIC SCIENCES-
dc.citation.titleJOURNAL OF FORENSIC SCIENCES-
dc.citation.volume67-
dc.citation.number3-
dc.citation.startPage989-
dc.citation.endPage1001-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaLegal Medicine-
dc.relation.journalWebOfScienceCategoryMedicine, Legal-
dc.subject.keywordPlusDATA TRACES-
dc.subject.keywordPlusDEVICE-
dc.subject.keywordPlusSYSTEM-
dc.subject.keywordAuthordigital forensics-
dc.subject.keywordAuthorRAID forensics-
dc.subject.keywordAuthorRAID reconstruction-
dc.subject.keywordAuthorsoftware-based RAID-
dc.subject.keywordAuthorStorage Space-
dc.subject.keywordAuthorwindows forensics-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher LEE, SANG JIN photo

LEE, SANG JIN
정보보호학과
Read more

Altmetrics

Total Views & Downloads

BROWSE