International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064

Research Paper | Information Technology | Malaysia | Volume 2 Issue 6, June 2013

A Study: Volatility Forensic On Hidden Files

Cutifa Safitri

More and more forensic researchers gain findings by live investigating memory volatility. Forensic research on volatile data is nowadays big area of interest. In the early days, investigators pulled the plug, but now it could be very interesting to capture the volatile data of the system. Memory forensics and data carving are among methods that are usually used during volatile investigation. Before pulled the plug, it is often desirable to capture volatile information that may not be recorded in a file system or image backup, such as processes and the contents of memory. This data may hold clues as to the attackers identity or the attack methods that were used. However, risks are associated with acquiring information from the live system. Any action performed on the host itself will alter the state of the machine to some extent. In paper, an analysis of hidden process on volatility is conducted.

Keywords: RAM, Forensic, Volatility, Hidden Files

Edition: Volume 2 Issue 6, June 2013

Pages: 71 - 75


How to Cite this Article?

Cutifa Safitri, "A Study: Volatility Forensic On Hidden Files", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=IJSRON20131139, Volume 2 Issue 6, June 2013, 71 - 75

28 PDF Views | 21 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'RAM'

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 91 - 93

A Scalable Two-Phase Bottom-Up Specialization Prospective for Data Anonymization Using Map Reduce on Cloud

Dilipprasad.E, Ajay.R, K. Durairaj

Share this article

Review Papers, Information Technology, Kenya, Volume 4 Issue 2, February 2015

Pages: 1293 - 1296

Management of Records in Health Institutions

Samuel Macharia Were

Share this article

Research Paper, Information Technology, India, Volume 3 Issue 7, July 2014

Pages: 1360 - 1367

Implementation of Location based Encryption in GSM Cellular Network using OPNET

Vijay S. More, Uma R. Godase

Share this article

Research Paper, Information Technology, India, Volume 6 Issue 4, April 2017

Pages: 1750 - 1753

Currency Recognition System Using Image Processing

Devashree R. Patwardhan, Swarali Namjoshi, Vrinda Valunj, Pratibha Shikhare, Prof. Anjali Shejul

Share this article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 6 Issue 6, June 2017

Pages: 1640 - 1644

Personalizing Search Based on User Profile by Using Anonymization

Abhilasha V. Biradar, K. B. Sadafale

Share this article

Similar Articles with Keyword 'Forensic'

Survey Paper, Information Technology, India, Volume 3 Issue 10, October 2014

Pages: 607 - 611

A Survey Based on Fingerprint Recognition - Minutiae

Annapoorani. D, Caroline Viola Stella Mery. M

Share this article

Research Paper, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 2791 - 2794

Internet Usage Analysis Using Karl Pearson?s Coefficient of Correlation -A Computer Forensic Investigation

Suneeta Satpathy, Sateesh K. Pradhan, Subhasish Mohapatra

Share this article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 2473 - 2475

Intrusion Detection System with Automatic Forensic Data Acquisition and Firewall

Laimayum Bulbul Sharma, J. Dharani

Share this article

Research Paper, Information Technology, Malaysia, Volume 2 Issue 6, June 2013

Pages: 71 - 75

A Study: Volatility Forensic On Hidden Files

Cutifa Safitri

Share this article

Research Paper, Information Technology, India, Volume 6 Issue 6, June 2017

Pages: 5 - 8

Memory Forensics: Tools Comparison

Pooja Salave, Atisha Wakdikar

Share this article

Top