Towards detecting digital criminal activities using file system analysis
Document Type
Conference Proceeding
Publication Title
Proceedings of Data Analytics and Management
Volume
785
First Page
531
Last Page
550
Publisher
Springer
School
Graduate Research School
Abstract
Destroying or clearing evidence is sometimes necessary for data protection, such as in cases of legitimate purposes or to conceal cybercrimes. Various techniques have been proposed for this task, including data wiping, which can permanently remove data from computer disks. However, it is a common misconception that wiping data will completely destroy all traces of it, as evidence may still remain in the file system, including metadata. This paper discusses tools that employ several data-wiping methods to investigate the possibility of retrieving data or metadata after full or partial wiping. Our research has found evidence in the locations $MFT, $Log files, and $UsnJrnl on the file system (NTFS), indicating that the file or data may have been present on the disk at some point. The results of this study highlight the need for caution when using data-wiping tools for data protection or to conceal cybercrimes, as they may not provide complete protection.
DOI
10.1007/978-981-99-6544-1_40
Access Rights
subscription content
Comments
Al-Fayoumi, M., Al-Fawa'reh, M., Al-Haija, Q. A., & Alakailah, A. (2024). Towards detecting digital criminal activities using file system analysis. In Proceedings of Data Analytics and Management (pp. 531-550). Springer, Singapore. https://doi.org/10.1007/978-981-99-6544-1_40