To download any from files, please resolve the captcha: 25 + 2 =
Table of content
Scientific Committee
Title page
Information
Partners
Preface
Chairman Committee
The Internet of Things and Services (IoT&S) is a novel-networking paradigm, which allows the communication among various types of physical objects and people over the Internet. Operations and application models of IoT&S are different from the traditional networks have brought great challenges and opportunities to digital forensic technology. In this paper, we: 1) discuss specific of cybercrime in the IoT&S; 2) analyze digital evidence in various types of electronic devices; 3) analyze a taxonomy of free, commercial and open source computer forensic tools; 4) discuss suitability of the traditional digital forensic tools in the Iot&s investigation domain; and 4) summarize analyze results in tables, provide conclusion.
Author keywords
Internet of Things and Services
cyber crime
computer forensic
References
[1] Altheide, C., Carvey, H. Digital Forensics with Open Source Tools. 2011, Syngress,
225 Wyman Street, Waltham, MA 02451, USA. ISBN: 978-1-59749-586-8.
[2] Noblett, M.G., Politt, M.M, Presley, L.A.. Recovering and Examining Computer
Forensic Evidence. Forensic Science Copmmunications. October 2000 - Volume2 –
Number - 4, (2015, 01 26) Available at
http://www.fbi.gov/about-us/lab/forensic-science-communications/fsc/oct2000/computer.
htm/Top%20of%20article
[3] Holder, E. H., Robinson, L. O., Rose, K. Electronic Crime Scene Investigation: An
On-the-Scene Reference for First Responders. U.S. Department of Justice Office of
Justice Programs 810 Seventh Street N.W. Washington, DC 20531, 2001.
[4] Francia, G., Clinton, K. Computer forensics laboratory and tools. Journal of
Computing Sciences in Colleges. Volume 20, Issue 6, June 2005, 143-150.
[5] Altheide, C., Carvey, H. Computer and Intrusion Forensics. 2003, ARTECH HOUSE, INC.,
685 Canton Street Norwood, MA 02062, USA. ISBN 1-58053-369-8.
[6] NIST, Computer Forensic Tool Catalog. (2015, 06 18) Available at
http://www.cftt.nist.gov/tool_catalog/index.php
[7] Open Source Digital Forensic. (2015, 07 18) Available at
http://www2.opensourceforensics.org/tools
[8] Magnet Forensics. Internet evidence finder (IEF). (2015, 07 28) Available at
http://www.magnetforensics.com/
[9] AccessData Group. Forensic Toolkit (FTK). (2015, 07 28) Available at
http://accessdata.com/solutions/digital-forensics/forensic-toolkit-ftk
[10] SCG Canada Inc. Covert Forensic Imaging Device (CFID). (2015, 04 08) Available at
http://www.scgcanada.com/
[11] BlackBag Technologies. BlackLight. (2015, 03 18) Available at
https://www.blackbagtech.com/
[12] PassMark Software Pty Ltd. OSForensics. (2015, 03 18) Available at
http://www.osforensics.com/
[13] Steganography Analysis and Research Center (SARC). (2015, 06 02) Available at
http://www.sarc-wv.com/
[14] Berla. Infotainment and Vehicle System Forensics (iVe). (2015, 06 02) Available at
https://berla.co/ive.html
[15] Micro Systemation. XRY. (2015, 06 02) Available at
https://www.msab.com/xry/what-is-xry
[16] Automated Image and Restore. (2015, 07 28) Available at
http://sourceforge.net/projects/air-imager/
http://www.linuxlinks.com/article/20110114032833760/AutomatedImageandRestore.html
[17] Sleuth Kit. (2015, 07 12) Available at http://www.sleuthkit.org/sleuthkit/
[18] Autopsy. (2015, 07 12) Available at http://www.sleuthkit.org/autopsy/
[19] DEFT Association. DEFT. (2015, 07 12) Available at http://www.deftlinux.net/
[20] Digital Forensics Framework (DFF). (2015, 07 12) Available at
http://www.digital-forensic.org/
[21] IoT-A Internet of Things – Architecture. (2015, 07 12) Available at
http://www.iot-a.eu/public/terminology
[22] Oriwoh, E.., Jazani, D., Epiphaniou, G., Sant, P. Internet of Things Forensics:
Challenges and approaches. 9th Int. Conference Conference on Collaborative Computing:
Networking, Applications and Worksharing, 20-23 Oct. 2013, pp.608-615.
[23] Batalla, J.M., Krawiec, P. Conception of ID layer performance at the network level
for Internet of Things. Pers Ubiquit Comput (2014) 18:465–480.