Skip to main content

2019 | OriginalPaper | Buchkapitel

Forensic Investigation of Cross Platform Massively Multiplayer Online Games: Minecraft as a Case Study

verfasst von : Paul J. Taylor, Henry Mwiki, Ali Dehghantanha, Alex Akinbi, Kim-Kwang Raymond Choo, Mohammad Hammoudeh, Reza M. Parizi

Erschienen in: Handbook of Big Data and IoT Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Minecraft, a Massively Multiplayer Online Game (MMOG), has reportedly millions of players from different age groups worldwide. With Minecraft being so popular, particularly with younger audiences, it is no surprise that the interactive nature of Minecraft has facilitated the commission of criminal activities such as denial of service attacks against gamers, cyberbullying, swatting, sexual communication, and online child grooming. In this research, we simulate the scenario of a typical Minecraft setting, using a Linux Ubuntu 16.04.3 machine, acting as the MMOG server, and client devices running Minecraft. Then, we forensically examine both server and client devices to reveal the type and extent of evidential artefacts that can be extracted.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat L. Christopher, K.-K. R. Choo, and A. Dehghantanha, Honeypots for Employee Information Security Awareness and Education Training: A Conceptual EASY Training Model. 2016. L. Christopher, K.-K. R. Choo, and A. Dehghantanha, Honeypots for Employee Information Security Awareness and Education Training: A Conceptual EASY Training Model. 2016.
2.
Zurück zum Zitat A. Azmoodeh, A. Dehghantanha, M. Conti, and K.-K. R. Choo, “Detecting crypto-ransomware in IoT networks based on energy consumption footprint,” J. Ambient Intell. Humaniz. Comput., pp. 1–12, Aug. 2017. A. Azmoodeh, A. Dehghantanha, M. Conti, and K.-K. R. Choo, “Detecting crypto-ransomware in IoT networks based on energy consumption footprint,” J. Ambient Intell. Humaniz. Comput., pp. 1–12, Aug. 2017.
3.
Zurück zum Zitat S. Walker-Roberts, M. Hammoudeh, and A. Dehghantanha, “A Systematic Review of the Availability and Efficacy of Countermeasures to Internal Threats in Healthcare Critical Infrastructure,” IEEE Access, 2018. S. Walker-Roberts, M. Hammoudeh, and A. Dehghantanha, “A Systematic Review of the Availability and Efficacy of Countermeasures to Internal Threats in Healthcare Critical Infrastructure,” IEEE Access, 2018.
4.
Zurück zum Zitat Y.-Y. Teing, D. Ali, K. Choo, M. T. Abdullah, and Z. Muda, “Greening Cloud-Enabled Big Data Storage Forensics: Syncany as a Case Study,” IEEE Trans. Sustain. Comput., pp. 1–1, 2017. Y.-Y. Teing, D. Ali, K. Choo, M. T. Abdullah, and Z. Muda, “Greening Cloud-Enabled Big Data Storage Forensics: Syncany as a Case Study,” IEEE Trans. Sustain. Comput., pp. 1–1, 2017.
5.
Zurück zum Zitat Y.-Y. Teing, A. Dehghantanha, and K.-K. R. Choo, “CloudMe forensics: A case of big data forensic investigation,” Concurr. Comput., 2017. Y.-Y. Teing, A. Dehghantanha, and K.-K. R. Choo, “CloudMe forensics: A case of big data forensic investigation,” Concurr. Comput., 2017.
6.
Zurück zum Zitat D. Kiwia, A. Dehghantanha, K.-K. R. Choo, and J. Slaughter, “A cyber kill chain based taxonomy of banking Trojans for evolutionary computational intelligence,” J. Comput. Sci., Nov. 2017. D. Kiwia, A. Dehghantanha, K.-K. R. Choo, and J. Slaughter, “A cyber kill chain based taxonomy of banking Trojans for evolutionary computational intelligence,” J. Comput. Sci., Nov. 2017.
7.
Zurück zum Zitat M. Hopkins and A. Dehghantanha, “Exploit Kits: The production line of the Cybercrime economy?,” in 2015 Second International Conference on Information Security and Cyber Forensics (InfoSec), 2015, pp. 23–27. M. Hopkins and A. Dehghantanha, “Exploit Kits: The production line of the Cybercrime economy?,” in 2015 Second International Conference on Information Security and Cyber Forensics (InfoSec), 2015, pp. 23–27.
8.
Zurück zum Zitat A. Shalaginov, S. Banin, A. Dehghantanha, and K. Franke, “Machine Learning Aided Static Malware Analysis: A Survey and Tutorial,” 2018, pp. 7–45. A. Shalaginov, S. Banin, A. Dehghantanha, and K. Franke, “Machine Learning Aided Static Malware Analysis: A Survey and Tutorial,” 2018, pp. 7–45.
9.
Zurück zum Zitat H. H. Pajouh, A. Dehghantanha, R. Khayami, and K.-K. R. Choo, “Intelligent OS X malware threat detection with code inspection,” J. Comput. Virol. Hacking Tech., 2017. H. H. Pajouh, A. Dehghantanha, R. Khayami, and K.-K. R. Choo, “Intelligent OS X malware threat detection with code inspection,” J. Comput. Virol. Hacking Tech., 2017.
10.
Zurück zum Zitat M. Petraityte, A. Dehghantanha, and G. Epiphaniou, A model for android and iOS applications risk calculation: CVSS analysis and enhancement using case-control studies, vol. 70. 2018. M. Petraityte, A. Dehghantanha, and G. Epiphaniou, A model for android and iOS applications risk calculation: CVSS analysis and enhancement using case-control studies, vol. 70. 2018.
11.
Zurück zum Zitat Y.-Y. Teing, A. Dehghantanha, K.-K. R. Choo, and L. T. Yang, “Forensic investigation of P2P cloud storage services and backbone for IoT networks: BitTorrent Sync as a case study,” Comput. Electr. Eng., vol. 58, pp. 350–363, Feb. 2017. Y.-Y. Teing, A. Dehghantanha, K.-K. R. Choo, and L. T. Yang, “Forensic investigation of P2P cloud storage services and backbone for IoT networks: BitTorrent Sync as a case study,” Comput. Electr. Eng., vol. 58, pp. 350–363, Feb. 2017.
12.
Zurück zum Zitat H. HaddadPajouh, A. Dehghantanha, R. Khayami, and K.-K. R. Choo, “A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting,” Futur. Gener. Comput. Syst., 2018. H. HaddadPajouh, A. Dehghantanha, R. Khayami, and K.-K. R. Choo, “A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting,” Futur. Gener. Comput. Syst., 2018.
13.
Zurück zum Zitat M. Conti, A. Dehghantanha, K. Franke, and S. Watson, “Internet of Things security and forensics: Challenges and opportunities,” Futur. Gener. Comput. Syst., vol. 78, pp. 544–546, Jan. 2018. M. Conti, A. Dehghantanha, K. Franke, and S. Watson, “Internet of Things security and forensics: Challenges and opportunities,” Futur. Gener. Comput. Syst., vol. 78, pp. 544–546, Jan. 2018.
14.
Zurück zum Zitat G. Epiphaniou, P. Karadimas, D. K. Ben Ismail, H. Al-Khateeb, A. Dehghantanha, and K.-K. R. Choo, “Non-Reciprocity Compensation Combined with Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Social IoT Networks,” IEEE Internet Things J., pp. 1–1, 2017. G. Epiphaniou, P. Karadimas, D. K. Ben Ismail, H. Al-Khateeb, A. Dehghantanha, and K.-K. R. Choo, “Non-Reciprocity Compensation Combined with Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Social IoT Networks,” IEEE Internet Things J., pp. 1–1, 2017.
15.
Zurück zum Zitat O. Osanaiye, H. Cai, K.-K. R. Choo, A. Dehghantanha, Z. Xu, and M. Dlodlo, “Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing,” EURASIP J. Wirel. Commun. Netw., vol. 2016, no. 1, p. 130, May 2016. O. Osanaiye, H. Cai, K.-K. R. Choo, A. Dehghantanha, Z. Xu, and M. Dlodlo, “Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing,” EURASIP J. Wirel. Commun. Netw., vol. 2016, no. 1, p. 130, May 2016.
16.
Zurück zum Zitat S. Homayoun, M. Ahmadzadeh, S. Hashemi, A. Dehghantanha, and R. Khayami, “BoTShark: A Deep Learning Approach for Botnet Traffic Detection,” 2018, pp. 137–153. S. Homayoun, M. Ahmadzadeh, S. Hashemi, A. Dehghantanha, and R. Khayami, “BoTShark: A Deep Learning Approach for Botnet Traffic Detection,” 2018, pp. 137–153.
17.
Zurück zum Zitat S. Homayoun, A. Dehghantanha, M. Ahmadzadeh, S. Hashemi, and R. Khayami, “Know Abnormal, Find Evil: Frequent Pattern Mining for Ransomware Threat Hunting and Intelligence,” {IEEE} Trans. Emerg. Top. Comput., p. 1, 2017. S. Homayoun, A. Dehghantanha, M. Ahmadzadeh, S. Hashemi, and R. Khayami, “Know Abnormal, Find Evil: Frequent Pattern Mining for Ransomware Threat Hunting and Intelligence,” {IEEE} Trans. Emerg. Top. Comput., p. 1, 2017.
18.
Zurück zum Zitat A. Azmoodeh, A. Dehghantanha, and K.-K. R. Choo, “Robust Malware Detection for Internet Of (Battlefield) Things Devices Using Deep Eigenspace Learning,” IEEE Trans. Sustain. Comput., pp. 1–1, 2018. A. Azmoodeh, A. Dehghantanha, and K.-K. R. Choo, “Robust Malware Detection for Internet Of (Battlefield) Things Devices Using Deep Eigenspace Learning,” IEEE Trans. Sustain. Comput., pp. 1–1, 2018.
19.
Zurück zum Zitat K. R. Choo, “Online child grooming: a literature review on the misuse of social networking sites for grooming children for sexual offences,” Aust. Inst. Criminol., p. 132, 2009. K. R. Choo, “Online child grooming: a literature review on the misuse of social networking sites for grooming children for sexual offences,” Aust. Inst. Criminol., p. 132, 2009.
20.
Zurück zum Zitat L.-K. Bernstein, “Investigating and Prosecuting Swatting Crimes,” United States Atty. Bull., vol. 64, no. 3, pp. 51–56, 2016. L.-K. Bernstein, “Investigating and Prosecuting Swatting Crimes,” United States Atty. Bull., vol. 64, no. 3, pp. 51–56, 2016.
21.
Zurück zum Zitat A. Carpinteri, B. Bang, K. Klimley, R. A. Black, and V. B. Van Hasselt, “Commercial Sexual Exploitation of Children: an Assessment of Offender Characteristics,” J. Police Crim. Psychol., Aug. 2017. A. Carpinteri, B. Bang, K. Klimley, R. A. Black, and V. B. Van Hasselt, “Commercial Sexual Exploitation of Children: an Assessment of Offender Characteristics,” J. Police Crim. Psychol., Aug. 2017.
22.
Zurück zum Zitat H. Hillman, C. Hooper, and K.-K. R. Choo, “Online child exploitation: Challenges and future research directions,” Comput. Law Secur. Rev., vol. 30, no. 6, pp. 687–698, Dec. 2014. H. Hillman, C. Hooper, and K.-K. R. Choo, “Online child exploitation: Challenges and future research directions,” Comput. Law Secur. Rev., vol. 30, no. 6, pp. 687–698, Dec. 2014.
23.
Zurück zum Zitat L. Achternbosch, C. Miller, C. Turville, and P. Vamplew, “Griefers versus the Griefed - what motivates them to play Massively Multiplayer Online Role-Playing Games ?,” Comput. Games J. Ltd, vol. 3, no. 1, 2014. L. Achternbosch, C. Miller, C. Turville, and P. Vamplew, “Griefers versus the Griefed - what motivates them to play Massively Multiplayer Online Role-Playing Games ?,” Comput. Games J. Ltd, vol. 3, no. 1, 2014.
24.
Zurück zum Zitat E. M. Jaffe, “Article : Swatting : the New Cyberbullying Frontier After Elonis V. United States,” Drake Law Rev., pp. 455–483, 2016. E. M. Jaffe, “Article : Swatting : the New Cyberbullying Frontier After Elonis V. United States,” Drake Law Rev., pp. 455–483, 2016.
25.
Zurück zum Zitat A. Choo and A. May, “Maintaining Long Distance Togetherness Synchronous Communication with Minecraft and Skype,” in Games Innovation Conference (IGIC), 2013 IEEE International, 2013. A. Choo and A. May, “Maintaining Long Distance Togetherness Synchronous Communication with Minecraft and Skype,” in Games Innovation Conference (IGIC), 2013 IEEE International, 2013.
26.
Zurück zum Zitat A. Noroozian, M. Korczyński, C. H. Gañan, D. Makita, K. Yoshioka, and M. van Eeten, “Who Gets the Boot? Analyzing Victimization by DDoS-as-a-Service,” in Research in Attacks, Intrusions, and Defenses: 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedings, F. Monrose, M. Dacier, G. Blanc, and J. Garcia-Alfaro, Eds. Cham: Springer International Publishing, 2016, pp. 368–389. A. Noroozian, M. Korczyński, C. H. Gañan, D. Makita, K. Yoshioka, and M. van Eeten, “Who Gets the Boot? Analyzing Victimization by DDoS-as-a-Service,” in Research in Attacks, Intrusions, and Defenses: 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedings, F. Monrose, M. Dacier, G. Blanc, and J. Garcia-Alfaro, Eds. Cham: Springer International Publishing, 2016, pp. 368–389.
27.
Zurück zum Zitat J. Taylor, “Online investigations: protection for child victims by raising awareness,” ERA Forum, vol. 16, no. 3, pp. 349–358, 2015. J. Taylor, “Online investigations: protection for child victims by raising awareness,” ERA Forum, vol. 16, no. 3, pp. 349–358, 2015.
28.
Zurück zum Zitat S. Khanji, R. Jabir, F. Iqbal, and A. Marrington, “Forensic analysis of xbox one and playstation 4 gaming consoles,” 8th IEEE Int. Work. Inf. Forensics Secur. WIFS 2016, 2017. S. Khanji, R. Jabir, F. Iqbal, and A. Marrington, “Forensic analysis of xbox one and playstation 4 gaming consoles,” 8th IEEE Int. Work. Inf. Forensics Secur. WIFS 2016, 2017.
29.
Zurück zum Zitat M. Cheah, L. Wyndham-Birch, and B. Bird, “What artifacts of evidentiary value can be found when investigating multi-user virtual environments.” 2015. M. Cheah, L. Wyndham-Birch, and B. Bird, “What artifacts of evidentiary value can be found when investigating multi-user virtual environments.” 2015.
30.
Zurück zum Zitat “What OS for server? - Server Administration - Server Support - Support - Minecraft Forum - Minecraft Forum.” . “What OS for server? - Server Administration - Server Support - Support - Minecraft Forum - Minecraft Forum.” .
31.
Zurück zum Zitat D. Quick and K.-K. R. Choo, “Google Drive: Forensic analysis of data remnants,” J. Netw. Comput. Appl., vol. 40, pp. 179–193, Apr. 2014. D. Quick and K.-K. R. Choo, “Google Drive: Forensic analysis of data remnants,” J. Netw. Comput. Appl., vol. 40, pp. 179–193, Apr. 2014.
32.
Zurück zum Zitat D. Quick and K.-K. R. Choo, “Dropbox analysis: Data remnants on user machines,” Digit. Investig., vol. 10, no. 1, pp. 3–18, Jun. 2013. D. Quick and K.-K. R. Choo, “Dropbox analysis: Data remnants on user machines,” Digit. Investig., vol. 10, no. 1, pp. 3–18, Jun. 2013.
33.
Zurück zum Zitat L. C. for D. Investigation, “1/21/2016 175,” Leahy Center for Digital Investigation, no. 802. 2016. L. C. for D. Investigation, “1/21/2016 175,” Leahy Center for Digital Investigation, no. 802. 2016.
34.
Zurück zum Zitat A. Rutkin, “Your place or Minecraft?,” New Sci., vol. 230, no. 3071, pp. 22–23, 2016. A. Rutkin, “Your place or Minecraft?,” New Sci., vol. 230, no. 3071, pp. 22–23, 2016.
35.
Zurück zum Zitat “Mojang - Minecon 2015 - Day Two - Twitch.” . “Mojang - Minecon 2015 - Day Two - Twitch.” .
36.
Zurück zum Zitat Z. Zhang, H. Anada, J. Kawamoto, and K. Sakurai, “Detection of illegal players in massively multiplayer online role playing game by classification algorithms,” Proc. - Int. Conf. Adv. Inf. Netw. Appl. AINA, vol. 2015–April, pp. 406–413, 2015. Z. Zhang, H. Anada, J. Kawamoto, and K. Sakurai, “Detection of illegal players in massively multiplayer online role playing game by classification algorithms,” Proc. - Int. Conf. Adv. Inf. Netw. Appl. AINA, vol. 2015–April, pp. 406–413, 2015.
37.
Zurück zum Zitat Y. Ki, J. Woo, and H. K. Kim, “Identifying Spreaders of Malicious Behaviors in Online Games,” in Proceedings of the 23rd International Conference on World Wide Web, 2014, pp. 315–316. Y. Ki, J. Woo, and H. K. Kim, “Identifying Spreaders of Malicious Behaviors in Online Games,” in Proceedings of the 23rd International Conference on World Wide Web, 2014, pp. 315–316.
38.
Zurück zum Zitat J. Oh, Z. H. Borbora, and J. Srivastava, “Automatic Detection of Compromised Accounts in MMORPGs,” in 2012 International Conference on Social Informatics, 2012, pp. 222–227. J. Oh, Z. H. Borbora, and J. Srivastava, “Automatic Detection of Compromised Accounts in MMORPGs,” in 2012 International Conference on Social Informatics, 2012, pp. 222–227.
39.
Zurück zum Zitat A. S. V Nair and B. A. S. Ajeena, “A Log Based Strategy for Fingerprinting and Forensic Investigation of Online Cyber Crimes,” in Proceedings of the 2014 International Conference on Interdisciplinary Advances in Applied Computing, 2014, p. 7:1--7:5. A. S. V Nair and B. A. S. Ajeena, “A Log Based Strategy for Fingerprinting and Forensic Investigation of Online Cyber Crimes,” in Proceedings of the 2014 International Conference on Interdisciplinary Advances in Applied Computing, 2014, p. 7:1--7:5.
40.
Zurück zum Zitat M. Barni and B. Tondi, “Threat Models and Games for Adversarial Multimedia Forensics,” in Proceedings of the 2nd International Workshop on Multimedia Forensics and Security, 2017, pp. 11–15. M. Barni and B. Tondi, “Threat Models and Games for Adversarial Multimedia Forensics,” in Proceedings of the 2nd International Workshop on Multimedia Forensics and Security, 2017, pp. 11–15.
41.
Zurück zum Zitat S. Rajendran and N. P. Gopalan, “Mobile Forensic Investigation (MFI) Life Cycle Process for Digital Data Discovery (DDD),” in Proceedings of the International Conference on Soft Computing Systems: ICSCS 2015, Volume 2, L. P. Suresh and B. K. Panigrahi, Eds. New Delhi: Springer India, 2016, pp. 393–403. S. Rajendran and N. P. Gopalan, “Mobile Forensic Investigation (MFI) Life Cycle Process for Digital Data Discovery (DDD),” in Proceedings of the International Conference on Soft Computing Systems: ICSCS 2015, Volume 2, L. P. Suresh and B. K. Panigrahi, Eds. New Delhi: Springer India, 2016, pp. 393–403.
42.
Zurück zum Zitat T. Dargahi, A. Dehghantanha, and M. Conti, “Chapter 2 - Forensics Analysis of Android Mobile VoIP Apps,” in Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, K.-K. R. Choo and A. Dehghantanha, Eds. Syngress, 2017, pp. 7–20. T. Dargahi, A. Dehghantanha, and M. Conti, “Chapter 2 - Forensics Analysis of Android Mobile VoIP Apps,” in Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, K.-K. R. Choo and A. Dehghantanha, Eds. Syngress, 2017, pp. 7–20.
43.
Zurück zum Zitat K. K. R. Choo and A. Dehghantanha, Contemporary Forensic Investigation of Cloud and Mobile Applications. 2017. K. K. R. Choo and A. Dehghantanha, Contemporary Forensic Investigation of Cloud and Mobile Applications. 2017.
44.
Zurück zum Zitat ACPO, “ACPO Good Practice Guide for Digital Evidence,” Association of Chief Police Officers, 2012. ACPO, “ACPO Good Practice Guide for Digital Evidence,” Association of Chief Police Officers, 2012.
45.
Zurück zum Zitat N. C. J. U.S. Department of Justice, “Electronic Crime Scene Investigation: A Guide for First Responders,” NIJ Res. Rep., no. NCJ 187736, p. 96, 2001. N. C. J. U.S. Department of Justice, “Electronic Crime Scene Investigation: A Guide for First Responders,” NIJ Res. Rep., no. NCJ 187736, p. 96, 2001.
46.
Zurück zum Zitat F. S. Regulator, “Codes of Practice and Conduct Issue 4,” 2017. F. S. Regulator, “Codes of Practice and Conduct Issue 4,” 2017.
47.
Zurück zum Zitat K. Kent, S. Chevalier, T. Grance, and H. Dang, “Guide to Integrating Forensic Techniques into Incident Response,” The National Institute of Standards and Technology, 2006. K. Kent, S. Chevalier, T. Grance, and H. Dang, “Guide to Integrating Forensic Techniques into Incident Response,” The National Institute of Standards and Technology, 2006.
48.
Zurück zum Zitat A. Antwi-Boasiako and H. Venter, “A Model for Digital Evidence Admissibility Assessment,” in Advances in Digital Forensics XIII: 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30 - February 1, 2017, Revised Selected Papers, G. Peterson and S. Shenoi, Eds. Cham: Springer International Publishing, 2017, pp. 23–38. A. Antwi-Boasiako and H. Venter, “A Model for Digital Evidence Admissibility Assessment,” in Advances in Digital Forensics XIII: 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30 - February 1, 2017, Revised Selected Papers, G. Peterson and S. Shenoi, Eds. Cham: Springer International Publishing, 2017, pp. 23–38.
49.
Zurück zum Zitat B. Martini and K.-K. R. Choo, “An integrated conceptual digital forensic framework for cloud computing,” Digit. Investig., vol. 9, no. 2, pp. 71–80, Nov. 2012. B. Martini and K.-K. R. Choo, “An integrated conceptual digital forensic framework for cloud computing,” Digit. Investig., vol. 9, no. 2, pp. 71–80, Nov. 2012.
50.
Zurück zum Zitat Y.-Y. Teing, D. Ali, K.-K. R. Choo, M. Conti, and T. Dargahi, “Forensic Investigation of Cooperative Storage Cloud Service: Symform as a Case Study,” J. Forensics Sci., vol. [In Press], 2016. Y.-Y. Teing, D. Ali, K.-K. R. Choo, M. Conti, and T. Dargahi, “Forensic Investigation of Cooperative Storage Cloud Service: Symform as a Case Study,” J. Forensics Sci., vol. [In Press], 2016.
51.
Zurück zum Zitat T. Alstad et al., “Minecraft computer game performance analysis and network traffic emulation by a custom bot,” Proc. 2015 Sci. Inf. Conf. SAI 2015, pp. 227–236, 2015. T. Alstad et al., “Minecraft computer game performance analysis and network traffic emulation by a custom bot,” Proc. 2015 Sci. Inf. Conf. SAI 2015, pp. 227–236, 2015.
Metadaten
Titel
Forensic Investigation of Cross Platform Massively Multiplayer Online Games: Minecraft as a Case Study
verfasst von
Paul J. Taylor
Henry Mwiki
Ali Dehghantanha
Alex Akinbi
Kim-Kwang Raymond Choo
Mohammad Hammoudeh
Reza M. Parizi
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-10543-3_7