Case based interpretation of windows 10 registry forensics

With the advancement in computer technologies, cybercrimes advanced too. As in today’s world, the technology knowledge to attack a computer is less than ever, with the help of advanced tools that does most of the work. Digital forensic investigations are crucial in solving this type of crimes, and i...

Full description

Saved in:
Bibliographic Details
Main Authors: Mat Din, Mazura, Binjuraid, Hasan
Format: Article
Published: International Journal of Innovative Computing 2018
Subjects:
Online Access:http://eprints.utm.my/id/eprint/82202/
https://doi.org/10.11113/ijic.v8n1.165
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Teknologi Malaysia
id my.utm.82202
record_format eprints
spelling my.utm.822022019-11-10T01:16:41Z http://eprints.utm.my/id/eprint/82202/ Case based interpretation of windows 10 registry forensics Mat Din, Mazura Binjuraid, Hasan QA75 Electronic computers. Computer science With the advancement in computer technologies, cybercrimes advanced too. As in today’s world, the technology knowledge to attack a computer is less than ever, with the help of advanced tools that does most of the work. Digital forensic investigations are crucial in solving this type of crimes, and it must be done professionally. Computer registries play a big part in the digital forensic investigation, it can help find artifacts that are left by the cybercrimes, dates of the crimes on the computer system and the user at the time of the crime. In this research, interpretation of these artifacts is the main focus, committees and jurors are the focus of the interpretations of the registries. Two types of cases are subject to investigation in this research. BitTorrent clients’ use for downloading illegal o copyrighted content, and three clients are chosen for this digital forensic investigation uTorrent, Vuze and BitComet. Theft using USB storage devices is the second type of case, where there are three types of USB devices Mass Storage Class, Picture Transfer Protocol and Media Transfer Protocol, each type of USB devices leaves different artifacts behind during insertion and removal. A web based dashboard will be developed to help with the process of interpretation the artifacts found in the registry of the computer system. A categorization process of each cybercrime case will be conduct to evaluate the severity of the case depending on the artifacts found in the digital forensics investigation process. The research methodology will consist of three phases. The first phase will be information gathering including literature review, requirements gathering and dataset gathering for the research. Performing digital forensics analysis will be the second phase and it includes planning, identification and reconnaissance. Last phase will include result analysis and discussion. International Journal of Innovative Computing 2018 Article PeerReviewed Mat Din, Mazura and Binjuraid, Hasan (2018) Case based interpretation of windows 10 registry forensics. International Journal of Innovative Computing, 8 (1). pp. 43-47. ISSN 2180-4370 https://doi.org/10.11113/ijic.v8n1.165 DOI: 10.11113/ijic.v8n1.165
institution Universiti Teknologi Malaysia
building UTM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Malaysia
content_source UTM Institutional Repository
url_provider http://eprints.utm.my/
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Mat Din, Mazura
Binjuraid, Hasan
Case based interpretation of windows 10 registry forensics
description With the advancement in computer technologies, cybercrimes advanced too. As in today’s world, the technology knowledge to attack a computer is less than ever, with the help of advanced tools that does most of the work. Digital forensic investigations are crucial in solving this type of crimes, and it must be done professionally. Computer registries play a big part in the digital forensic investigation, it can help find artifacts that are left by the cybercrimes, dates of the crimes on the computer system and the user at the time of the crime. In this research, interpretation of these artifacts is the main focus, committees and jurors are the focus of the interpretations of the registries. Two types of cases are subject to investigation in this research. BitTorrent clients’ use for downloading illegal o copyrighted content, and three clients are chosen for this digital forensic investigation uTorrent, Vuze and BitComet. Theft using USB storage devices is the second type of case, where there are three types of USB devices Mass Storage Class, Picture Transfer Protocol and Media Transfer Protocol, each type of USB devices leaves different artifacts behind during insertion and removal. A web based dashboard will be developed to help with the process of interpretation the artifacts found in the registry of the computer system. A categorization process of each cybercrime case will be conduct to evaluate the severity of the case depending on the artifacts found in the digital forensics investigation process. The research methodology will consist of three phases. The first phase will be information gathering including literature review, requirements gathering and dataset gathering for the research. Performing digital forensics analysis will be the second phase and it includes planning, identification and reconnaissance. Last phase will include result analysis and discussion.
format Article
author Mat Din, Mazura
Binjuraid, Hasan
author_facet Mat Din, Mazura
Binjuraid, Hasan
author_sort Mat Din, Mazura
title Case based interpretation of windows 10 registry forensics
title_short Case based interpretation of windows 10 registry forensics
title_full Case based interpretation of windows 10 registry forensics
title_fullStr Case based interpretation of windows 10 registry forensics
title_full_unstemmed Case based interpretation of windows 10 registry forensics
title_sort case based interpretation of windows 10 registry forensics
publisher International Journal of Innovative Computing
publishDate 2018
url http://eprints.utm.my/id/eprint/82202/
https://doi.org/10.11113/ijic.v8n1.165
_version_ 1654960007160004608