Abstract
When an incident or security threat occurs, in which a system resource is compromised or potentially exposed to unauthorized access, computer forensics techniques and methodologies must ensure that it is possible to adequately determine what, who, when and how the incident occurred, as well as to ensure and preserve the evidence collected. This paper explore two methodologies of digital data collection, the first called Preventive Approach-Data Collection a priori or Forensic Readiness and the second called Reactive Approach - Post-Collection of a security event to comparatively analyze its performance based on certain criteria and control points established over HTTP and HTTP/2 web servers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
ISACA: Incident Management and Response. http://www.isaca.org/. Accessed 23 July 2017
Internet Crime Complaint Center (IC3): Annual Report (2015). http://www.ic3.gov/media/annualreports.aspx. Accessed 14 Mar 2017
Ministerio Público Fiscal de la Ciudad Autónoma de Buenos Aires. CyberCrime Informe Final 2013 - Delitos Informáticos. http://delitosinformaticos.fiscalias.gob.ar/wp-content/uploads/2014/02/CyberCrime-Informe-Final-2013-flip.pdf. Accessed 14 Feb 2017
Digital Forensic Research Workshop (DFRWS). http://www.dfrws.org/. Accessed 14 Feb 2017
Tugnarelli, M., Fornaroli, M., Santana, S., Jacobo, E., Díaz, J.: Análisis de Metodologías de Recolección de Datos Digitales. In: Libro de Actas Workshop de Investigadores en Ciencias de la Computación, pp. 1000–1004 (2017). ISBN 978-987-42-5143-5
Tan, J.: Forensic Readiness. http://isis.poly.edu/kulesh/forensics/forensic_readiness.pdf. Accessed 30 Sept 2016
Rowlingson, R.: A ten step for forensic readiness. Int. J. Digit. Evid. 2, 1–28 (2004)
Pooe, A., Labuschagne, L.: A conceptual model for digital forensic readiness. http://ieeexplore.ieee.org/document/6320452/. Accessed 7 Oct 2017
Piccirilli, D.: Protocolos a aplicar en la forensia informática en el marco de las nuevas tecnologías (pericia – forensia y cibercrimen). Tesis de doctorado. Facultad de Informática. Universidad Nacional de La Plata (2016). http://hdl.handle.net/10915/52212
IETF: RFC 3227 Guidelines for Evidence Collection and Archiving. https://www.ietf.org/rfc/rfc3227.txt. Accessed 30 Aug 2016
Guidelines for identification, collection, acquisition and preservation of digital evidence ISO/IEC 27037:2012
U.S. Department of Justice: Electronic Crime Scene Investigation: A Guide for First Responders, 2nd Edn. https://www.ncjrs.gov/pdffiles1/nij/219941.pdf. Accessed 30 Aug 2017
Forte, D.: Principles of digital evidence collection. Netw. Secur. 2003(12), 6–7 (2003). https://doi.org/10.1016/S1353-4858(03)00006-0
IETF: RFC 1945 Hypertext Transfer Protocol - HTTP/1.0. http://tools.ietf.org/html/rfc1945. Accessed 30 June 2017
IETF: RFC 2616 Hypertext Transfer Protocol - HTTP/1.1. http://tools.ietf.org/html/rfc2616. Accessed 30 June 2017
IETF: RFC 7540 Hypertext Transfer Protocol Version 2 (HTTP/2). https://tools.ietf.org/html/rfc7540. Accessed 30 July 2017
Altheide, C., Carvey, H.: Digital Forensics with Open Source Tools, pp. 1–8 (2011). https://doi.org/10.1016/b978-1-59749-586-8.00001-7
Tugnarelli, M., Fornaroli, M., Pacifico, C.: Análisis de prestaciones de herramientas de software libre para la recolección a priori de evidencia digital en servidores web. In: Libro de Actas Workshop de Investigadores en Ciencias de la Computación, pp. 985–990 (2015). ISBN 978-987-633-134-0
Computer Aided Investigative Environment. http://www.caine-live.net/. Accessed 30 Sept 2017
BlackArch Linux. https://blackarch.org/. Accessed 30 Aug 2017
KALI Linux. https://www.kali.org. Accessed 30 Aug 2017
ISECOM: Open Source Security Testing Methodology Manual (OSSTMM). http://www.isecom.org/mirror/OSSTMM.3.pdf. Accessed 30 Mar 2017
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this paper
Cite this paper
Tugnarelli, M.D., Fornaroli, M.F., Santana, S.R., Jacobo, E., Díaz, J. (2018). Analysis of Methodologies of Digital Data Collection in Web Servers. In: De Giusti, A. (eds) Computer Science – CACIC 2017. CACIC 2017. Communications in Computer and Information Science, vol 790. Springer, Cham. https://doi.org/10.1007/978-3-319-75214-3_25
Download citation
DOI: https://doi.org/10.1007/978-3-319-75214-3_25
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-75213-6
Online ISBN: 978-3-319-75214-3
eBook Packages: Computer ScienceComputer Science (R0)