ADSL Router Forensics Part 1: An introduction to a new source of electronic evidence

作者: Patryk Szewczyk

DOI: 10.4225/75/57AD5B8E7FF31

关键词:

摘要: Currently there appears to be a lack of research in the area developing tools, testing methodologies, and creating standards for ADSL router forensics. The paper examines wide range literature introduces concept forensics as new potential field digital investigators. It begins by examining why is need detailing some more common threats which consumers may experience while online. An outline will provided discussing feasibility, limitations risks then examine one possible avenue undertaking how this applies Linksys WRT54g finally portrays where continue hereafter.

参考文章(23)
Mark Reith, Clint Carr, Gregg H. Gunsch, An Examination of Digital Forensic Models International Journal of Digital Evidence. ,vol. 1, ,(2002)
Sean Walberg, How to configure SIP and NAT Linux Journal. ,vol. 2007, pp. 3- ,(2007)
Séamus Ó Ciardhuáin, An Extended Model of Cybercrime Investigations International Journal of Digital Evidence. ,vol. 3, ,(2004)
Richard Nolan, Colin O'Sullivan, Jake Branson, Cal Waits, First Responders Guide to Computer Forensics Defense Technical Information Center. ,(2005) , 10.21236/ADA443483
I. Acre, The rise of the gadgets ieee symposium on security and privacy. ,vol. 1, pp. 78- 81 ,(2003) , 10.1109/MSECP.2003.1236241
Eoghan Casey, Product review: Tool review-WinHex Digital Investigation. ,vol. 1, pp. 114- 128 ,(2004) , 10.1016/J.DIIN.2004.04.001
Bruce J. Nikkel, Generalizing sources of live network evidence Digital Investigation. ,vol. 2, pp. 193- 200 ,(2005) , 10.1016/J.DIIN.2005.08.001
Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis, On the impact of dynamic addressing on malware propagation Proceedings of the 4th ACM workshop on Recurring malcode - WORM '06. pp. 51- 56 ,(2006) , 10.1145/1179542.1179554
Ing. M.F. Breeuwsma, Forensic imaging of embedded systems using JTAG (boundary-scan) Digital Investigation. ,vol. 3, pp. 32- 42 ,(2006) , 10.1016/J.DIIN.2006.01.003