Cloud computing is a new computing paradigm that presents fresh research issues in the field of digital forensics. Cloud computing builds upon virtualisation technologies and is distributed in nature. Depending on its implementation, the cloud can span across numerous countries. Its distributed nature and virtualisation introduces digital forensic research issues that include among others difficulty in identifying and collecting forensically sound evidence. Even if the evidence may be identified and essential tools for collecting the evidence are acquired, it may be illegal to access computer data residing beyond the jurisdiction of a forensic investigator. The investigator needs to acquire a search warrant that can be executed in a specific foreign country – which may not be a single country due to the distributed nature of the cloud. Obtaining warrants for numerous countries at once may be costly and time consuming. Some countries may also fail to comply with the demands of cloud forensics. Since the field of digital forensics is itself still in its infancy, it lacks standardised forensic processes and procedures. Thus, digital forensic investigators are able to collect evidence, but often fail in following a valid investigation process that is acceptable in a court of law. In addressing digital forensic issues such as the above, the authors are writing a series of papers that are aimed at providing guidelines for digital forensic procedures in a cloud environment. Live forensics and network forensics constitute an integral part of cloud forensics. A paper that deals with guidelines for digital forensic procedures in live forensics was submitted elsewhere. The current paper is therefore the second in a series where the authors propose and present guidelines for digital forensic procedures in network forensics. The authors eventually aim to have guidelines for digital forensic procedures in a cloud environment as the last paper in the series.
Reference:
Sibiya, G, Venter, HS, Ngobeni, S and Fogwill, T. 2012. Guidelines for procedures of a harmonised digital forensic process in network forensics. International Workshop on Digital Forensics in the Cloud, Sandton, Johannesburg, 17 August 2012
Sibiya, G., Venter, H., Ngobeni, S., & Fogwill, T. (2012). Guidelines for procedures of a harmonised digital forensic process in network forensics. IEEE. http://hdl.handle.net/10204/6543
Sibiya, G, HS Venter, S Ngobeni, and T Fogwill. "Guidelines for procedures of a harmonised digital forensic process in network forensics." (2012): http://hdl.handle.net/10204/6543
Sibiya G, Venter H, Ngobeni S, Fogwill T, Guidelines for procedures of a harmonised digital forensic process in network forensics; IEEE; 2012. http://hdl.handle.net/10204/6543 .
Copyright: 2012 IEEE. This is the accepted version of the work. Reprinted, with permission, from Sibiya, G, Venter, HS, Ngobeni, S and Fogwill, T. 2012. Guidelines for procedures of a harmonised digital forensic process in network forensics. International Workshop on Digital Forensics in the Cloud, Sandton, Johannesburg, 17 August 2012. This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of CSIR Information Services' products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to pubs-permissions@ieee.org. By choosing to view this document, you agree to all provisions of the copyright laws protecting it.
Author:Grobler, MM; Von Solms, SHDate:Jun 2009This paper discusses the development of a South African model for Live Forensic Acquisition - Liforac. The Liforac model is a comprehensive model that presents a range of aspects related to Live Forensic Acquisition. The model provides forensic ...Read more
Author:Grobler, MM; Von Solms, SHDate:Jul 2009The development of the Live Forensic discipline instigates the development of a method that allows forensically sound acquisition to stand fast in a court of law. The study presents the development of a comprehensive model for forensically ...Read more
Author:Ngobeni, Sipho J; Venter, H; Burke, Ivan DDate:Jun 2012Over the past decade, wireless mobile communication technology based on the IEEE 802.11 Wireless Local Area Networks (WLANs) has been adopted worldwide on a massive scale. However, as the number of wireless users has soared, so has the ...Read more