You are on page 1of 1

International Journal of Digital Crime and Forensics, 5(2), 1-22, April-June 2013 3

the current state of the investigation. This forensics. In the sixth section, we illustrate the
concept distinguishes our approach from use of our framework with the infamous Ceglia
other existing approaches; versus Zuckerberg case, before concluding the
• The inclusion of anti-forensic reasoning in paper in the seventh section and giving some
the framework allows better coverage of insight into future research pathways for our
technical measures for dealing with anti- approach.
forensic techniques deployed by criminals.

RELATED WORKS
A main product of this approach would be
to establish a pattern library for various inves- The work in this paper extends similar idea
tigations and anti-forensic models, in a similar proposed recently (Aziz, 2012), which presents
fashion to the work of Fernandez et al. (2007) the first attempt in literature in utilizing KAOS
in establishing attack patterns. This library can as a methodology for capturing the require-
then be used to the benefit of the investigators ments of digital forensics investigations. The
in guiding an instance of a digital investigation current paper extends that work by including
based on the main goal of the investigation, the anti-forensics dimension, which is naturally
providing suggestions for ways to implement the represented in KAOS using the concept of
requirements of the investigation, and assign- obstacle. It also demonstrates how the KAOS-
ing responsibilities to the qualified personnel based framework is used in a real world case
or automated systems. involving document forgery.
We believe that forensic investigations can There are several works, which consider the
and probably should make their goals and re- forensic investigation process, its challenges and
quirements more explicit. We think our approach tool support. This section presents some of the

IGI GLOBAL PROOF


is generally applicable because (at worst) it still
provides a framework for collecting and analyz-
ing evidence making it easier for investigators
works that are relevant to ours. Various models,
for example (Beebe & Clark, 2005; Carrier &
Spafford, 2004; Casey & Rose, 2010; Ó Ciard-
to determine the state of the investigation and huáin, 2004; Cohen, 2009; Ieong, 2008; Palmer,
its limitations even if the resulting goal tree is 2001; Reith, Carr & Gunsch, 2002), have been
not entirely accurate. The KAOS model has proposed in the past to capture the process of a
been developed over the last 20 years for all digital forensics investigation, which have the
aspects of requirements engineering, and is a purpose of managing and organizing a digital
very detailed, refined and flexible framework. investigation rather than dictating its specific
We believe the framework can make investi- steps and procedures.
gative difficulties clear and therefore aid their Cohen (2009) provides a multistage model
discussion and planning with remedial forensic with several stages, including transport, storage
actions, but that does not mean they can neces- and destruction of evidence that are typically
sarily be overcome just because they have been incorporated into other stages of, or omitted
made explicit. altogether from other models. Ó Ciardhuáin
The rest of the paper is organized as follows: (2004) combines existing models and proposes
In the second section, we discuss existing works an extended model of cybercrime investigations,
on digital forensics and anti-forensic models. In which is able to capture information flows in a
the third section, we provide a brief overview of full investigation. Awareness is the first step,
the KAOS requirements engineering methodol- which triggers an investigation. Authorization
ogy. In the fourth section, we demonstrate how is obtained then from internal and external
the various elements underlying a digital foren- authoritative entities. Planning is considered
sics investigation can be expressed in KAOS to involve strategies and policies, whereas
model elements. In the fifth section, we give dissemination is used for guiding future inves-
an example of this mapping applied to digital

Copyright © 2013, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.

You might also like