slugVolatile Memory Based Forensic Artifacts & Analysis

Abstract

Today’s technology grows its roots in positive and negatives both directions. Cyber criminals are always get one step ahead then the investigator. Digital forensics in the live environment is the biggest challenge. Aquistion of live artifacts on running system needs expertise to achieve expected results. One of the most important areas where every forensicator looks into is Memory, i.e. RAM - Random Access Memory. RAM is a volatile memory which flushes when system is shut down or restart. So before shutting down the system Memory dump should be taken. It is very important aspect for carving information resided into the volatile memory.[1] Here a role of a volatile memory analysis in digital forensics and the importance of the physical memory analysis is proposed. It is very useful in real time evidence acquisition analysis. Further we have introduced some of the tools and techniques used in acquisition and analysis of memory.

Authors and Affiliations

Rushita Dave, Nilay R. Mistry, Dr. M. S. Dahiya

Keywords

Related Articles

slugSuffix to Prefix Rule and Substring Matching Rules of Sting Matching Algorithms: An Analytical study and Correlations

String matching is a profound problem in various fields and becomes a great challenge for running a program for pattern matching quickly and effectively with less or no complexities. The application of string matching o...

slugAn Efficient Priority Based Task Management In Grid Computing

Grid computing can integrate and utilize heterogeneous computing resources which are connected through networks without the limitation of geography. In this research paper we have proposed a priority based task scheduli...

Speech Recognition in ATMs: Application of Linear Predictive Coding and Support Vector Machines

Today, Automated Teller Machines (ATMs) are extensively used by people for financial transactions. It provides a convenient, fast and easy way for customers to access cash. In this paper, a speech recognition system is...

A Hybrid Data Hiding Approach for Securing Online Transactions

Online Banking is an arrangement of administrations given by a gathering of organized bank offices. Bank clients may get to their assets and perform other basic exchanges from any of the part branch workplaces. The real...

Comparative Analysis of Gnome Sort and Bubble Sort in the Worst Case using Performance Visualization in Personal Computer

The present study aims at visualizing the performances of Gnome sort and Bubble sort algorithms in the worst case which are implemented using R in a personal computer (Desktop). In the present study, we have done a comp...

Download PDF file
  • EP ID EP17748
  • DOI -
  • Views 382
  • Downloads 12

How To Cite

Rushita Dave, Nilay R. Mistry, Dr. M. S. Dahiya (2014). slugVolatile Memory Based Forensic Artifacts & Analysis. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 2(1), -. https://europub.co.uk/articles/-A-17748