Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/11361
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSangwan, Aniketen_US
dc.contributor.authorJain, Sarthaken_US
dc.contributor.authorHubballi, Neminathen_US
dc.date.accessioned2023-02-27T15:27:45Z-
dc.date.available2023-02-27T15:27:45Z-
dc.date.issued2022-
dc.identifier.citationSangwan, A., Jain, S., & Hubballi, N. (2022). WiP: EventTracker-event driven evidence collection for Digital forensics doi:10.1007/978-3-031-23690-7_15 Retrieved from www.scopus.comen_US
dc.identifier.isbn978-3031236891-
dc.identifier.issn0302-9743-
dc.identifier.otherEID(2-s2.0-85145256759)-
dc.identifier.urihttps://doi.org/10.1007/978-3-031-23690-7_15-
dc.identifier.urihttps://dspace.iiti.ac.in/handle/123456789/11361-
dc.description.abstractDigital forensics involves credible evidence collection from digital assets and analysis to conclusively attribute events to users and sources. Traditional forensic methods only focus on preserving the evidence and audit trail generated. Further they have the standard practices for evidence collection by invoking these methods manually. In this paper, we present EventTracker which has the features of traditional methods to monitor and track file system and user activity, and can also dynamically invoke evidence collection based on events of interest. EventTracker allows the user to specify the kind of evidence required for an event type giving more flexibility to the user. It also allows users to define custom event types and monitor the system and evidence be logged safely. We implement a proof of concept code of EventTracker integrating several open source facilities and also furnish details of experiments with a handful of custom event types. We also perform a measurement study with file monitoring and quantify the frequency and number of changes typical system operations do to the underlying file system and conclude that the number of changes is often high which warrants automated techniques for investigation. © 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.en_US
dc.language.isoenen_US
dc.publisherSpringer Science and Business Media Deutschland GmbHen_US
dc.sourceLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)en_US
dc.subjectComputer crimeen_US
dc.subjectComputer forensicsen_US
dc.subjectElectronic crime countermeasuresen_US
dc.subjectOpen systemsen_US
dc.subjectActivity monitoringen_US
dc.subjectAudit trailsen_US
dc.subjectDigital analysisen_US
dc.subjectDigital assetsen_US
dc.subjectEvent Typesen_US
dc.subjectEvent-drivenen_US
dc.subjectEvent-trackingen_US
dc.subjectEvidence collectionen_US
dc.subjectFilesystemen_US
dc.subjectStandard practicesen_US
dc.subjectFile organizationen_US
dc.titleWiP: EventTracker-Event Driven Evidence Collection for Digital Forensicsen_US
dc.typeConference Paperen_US
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: