Skip to main content

2015 | OriginalPaper | Buchkapitel

Introducing and Analysis of the Windows 8 Event Log for Forensic Purposes

verfasst von : Javad Talebi, Ali Dehghantanha, Ramlan Mahmoud

Erschienen in: Computational Forensics

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

All operating systems are employing some sort of logging mechanism to track and note users activities and Microsoft Windows is not an exception. Log Analysis is one of the important parts of Windows forensics process. The Windows event log system introducing in Windows NT was released with a new feature for Microsoft Windows family and since then went through several major changes and updates. The event log experienced major updated in Windows 8. This paper first introduces Windows 8 event log format and then proceeds with explaining methods for analyzing the logs for digital investigation and incident handling. The main contributions of this paper are introducing Windows8 logging service and forensic examination of it.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Sharma, H., Sabharwal, N.: Investigating the implications of virtual forensics. In: 2012 International Conference on Advances in Engineering, Science and Management (ICAESM), pp. 617–620. IEEE (2012) Sharma, H., Sabharwal, N.: Investigating the implications of virtual forensics. In: 2012 International Conference on Advances in Engineering, Science and Management (ICAESM), pp. 617–620. IEEE (2012)
3.
Zurück zum Zitat Daryabar, F., Dehghantanha, A., Udzir, N.I.: A review on impacts of cloud computing on digital forensics. Int. J. Cyber-Secur. Digit. Forensics (IJCSDF) 2(2), 77–94 (2013) Daryabar, F., Dehghantanha, A., Udzir, N.I.: A review on impacts of cloud computing on digital forensics. Int. J. Cyber-Secur. Digit. Forensics (IJCSDF) 2(2), 77–94 (2013)
4.
Zurück zum Zitat Aminnezhad, A., Dehghantanha, A., Abdullah, M.: A survey on privacy issues in digital forensics. Int. J. Cyber-Secur. Digit. Forensics (IJCSDF) 1(4), 311–323 (2012) Aminnezhad, A., Dehghantanha, A., Abdullah, M.: A survey on privacy issues in digital forensics. Int. J. Cyber-Secur. Digit. Forensics (IJCSDF) 1(4), 311–323 (2012)
5.
Zurück zum Zitat Dezfoli, F.N., Dehghantanha, A., Mahmoud, R., Sani, N.F.B.M., Daryabar, F.: Digital forensic trends and future. Int. J. Cyber-Secur. Digit. Forensics (IJCSDF) 2(2), 48–76 (2013) Dezfoli, F.N., Dehghantanha, A., Mahmoud, R., Sani, N.F.B.M., Daryabar, F.: Digital forensic trends and future. Int. J. Cyber-Secur. Digit. Forensics (IJCSDF) 2(2), 48–76 (2013)
6.
Zurück zum Zitat Damshenas, M., Dehghantanha, A., Mahmoud, R., bin Shamsuddin, S.: Forensics investigation challenges in cloud computing environments. In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), pp. 190–194. IEEE (2012) Damshenas, M., Dehghantanha, A., Mahmoud, R., bin Shamsuddin, S.: Forensics investigation challenges in cloud computing environments. In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), pp. 190–194. IEEE (2012)
7.
Zurück zum Zitat Parvez, S., Dehghantanha, A., Broujerdi, H.G.: Framework of digital forensics for the samsung star series phone. In: 2011 3rd International Conference on Electronics Computer Technology (ICECT), vol. 2, pp. 264–267. IEEE (2011) Parvez, S., Dehghantanha, A., Broujerdi, H.G.: Framework of digital forensics for the samsung star series phone. In: 2011 3rd International Conference on Electronics Computer Technology (ICECT), vol. 2, pp. 264–267. IEEE (2011)
8.
Zurück zum Zitat TzeTzuen, Y., Dehghantanha, A., Seddon, A., Mohtasebi, S.H.: Greening digital forensics: opportunities and challenges. In: Das, V.V., Ariwa, E., Rahayu, S.B. (eds.) SPIT 2011. LNICST, vol. 62, pp. 114–119. Springer, Heidelberg (2012)CrossRef TzeTzuen, Y., Dehghantanha, A., Seddon, A., Mohtasebi, S.H.: Greening digital forensics: opportunities and challenges. In: Das, V.V., Ariwa, E., Rahayu, S.B. (eds.) SPIT 2011. LNICST, vol. 62, pp. 114–119. Springer, Heidelberg (2012)CrossRef
9.
Zurück zum Zitat Daryabar, F., Dehghantanha, A., Broujerdi, H.G.: Investigation of malware defence and detection techniques. Int. J. Digit. Inf. Wireless Commun. (IJDIWC) 1(3), 645–650 (2011) Daryabar, F., Dehghantanha, A., Broujerdi, H.G.: Investigation of malware defence and detection techniques. Int. J. Digit. Inf. Wireless Commun. (IJDIWC) 1(3), 645–650 (2011)
10.
Zurück zum Zitat Mohtasebi, S.H., Dehghantanha, A., Broujerdi, H.G.: Smartphone forensics: a case study with Nokia E5-00 mobile phone. Int. J. Digit. Inf. Wireless Commun. (IJDIWC) 1(3), 651–655 (2011) Mohtasebi, S.H., Dehghantanha, A., Broujerdi, H.G.: Smartphone forensics: a case study with Nokia E5-00 mobile phone. Int. J. Digit. Inf. Wireless Commun. (IJDIWC) 1(3), 651–655 (2011)
11.
Zurück zum Zitat Mohtasebi, S.H., Dehghantanha, A.: Towards a unified forensic investigation framework of smartphones. Int. J. Comput. Theory Eng. 5(2), 351–355 (2013)CrossRef Mohtasebi, S.H., Dehghantanha, A.: Towards a unified forensic investigation framework of smartphones. Int. J. Comput. Theory Eng. 5(2), 351–355 (2013)CrossRef
12.
Zurück zum Zitat Saleh, M., Arasteh, A.R., Sakha, A., Debbabi, M.: Forensic analysis of logs: modeling and verification. Knowl.-Based Syst. 20(7), 671–682 (2007)CrossRef Saleh, M., Arasteh, A.R., Sakha, A., Debbabi, M.: Forensic analysis of logs: modeling and verification. Knowl.-Based Syst. 20(7), 671–682 (2007)CrossRef
13.
Zurück zum Zitat Borhan, N., Mahmod, R., Dehghantanha, A.: A framework of TPM, SVM and boot control for securing forensic logs. Int. J. Comput. Appl. 50, 15–19 (2012) Borhan, N., Mahmod, R., Dehghantanha, A.: A framework of TPM, SVM and boot control for securing forensic logs. Int. J. Comput. Appl. 50, 15–19 (2012)
14.
Zurück zum Zitat Ibrahim, N.M., Al-Nemrat, A., Jahankhani, H., Bashroush, H.: Sufficiency of windows event log as evidence in digital forensics. In: Georgiadis, C.K., Jahankhani, H., Pimenidis, E., Bashroush, R., Al-Nemrat, A. (eds.) ICGS3/e-Democracy 2011. LNICST, vol. 99, pp. 253–262. Springer, Heidelberg (2012)CrossRef Ibrahim, N.M., Al-Nemrat, A., Jahankhani, H., Bashroush, H.: Sufficiency of windows event log as evidence in digital forensics. In: Georgiadis, C.K., Jahankhani, H., Pimenidis, E., Bashroush, R., Al-Nemrat, A. (eds.) ICGS3/e-Democracy 2011. LNICST, vol. 99, pp. 253–262. Springer, Heidelberg (2012)CrossRef
15.
Zurück zum Zitat Schuster, A.: Introducing the Microsoft Vista event log file format. Digit. Invest. 4, 65–72 (2007)CrossRef Schuster, A.: Introducing the Microsoft Vista event log file format. Digit. Invest. 4, 65–72 (2007)CrossRef
Metadaten
Titel
Introducing and Analysis of the Windows 8 Event Log for Forensic Purposes
verfasst von
Javad Talebi
Ali Dehghantanha
Ramlan Mahmoud
Copyright-Jahr
2015
DOI
https://doi.org/10.1007/978-3-319-20125-2_13