FORWEB: file fingerprinting for automated network forensics investigations

  • Authors:
  • John Haggerty;David Llewellyn-Jones;Mark Taylor

  • Affiliations:
  • Liverpool John Moores University, Byrom Street, Liverpool, UK;Liverpool John Moores University, Byrom Street, Liverpool, UK;Liverpool John Moores University, Byrom Street, Liverpool, UK

  • Venue:
  • Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

A major advantage of information technology is the ease, speed and volume of information that may be shared between hosts. However, this has given rise to concerns over paedophile activity and the spread of malicious digital pictures amongst this community. In network forensic investigations a wealth of information relevant to the investigation will reside within the network itself and on disparate hosts. Current computer forensics tools are designed for the analysis of seized hard drives rather than investigating data within a network. In this paper we present FORWEB, a novel scheme for automated file fingerprinting of malicious pictures resident on Web servers. This approach may be used in forensic investigations to automatically identify repositories of malicious digital pictures on the Internet or to verify the Internet usage of a suspect. A case study and its results demonstrate the applicability of this approach.