DOC PREVIEW
UTD CS 4398 - CS 4398 Introduction

This preview shows page 1-2-20-21 out of 21 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 21 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 21 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 21 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 21 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 21 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Digital ForensicsOutline of the UnitObjective of the CourseOutline of the CourseSlide 5Slide 6Course WorkCourse RulesProgramming projectAssignmentsReading material for the Mid-termReading material for the Final examGroup 1Group 2Group 3Group 4Group 5Group 6Group 7Optional PapersContactDigital ForensicsDr. Bhavani ThuraisinghamThe University of Texas at DallasIntroduction to the CourseAugust 20, 2007Outline of the UnitObjective of the CourseOutline of the CourseCourse WorkCourse RulesContactObjective of the CourseThe course describes concepts, developments, challenges, and directions in Digital Forensics.Text Book: Computer Forensics: Computer Crime Scene Investigation, John Vacca, Charles River Media 2005.Topics include:-Digital forensics fundamentals, systems and tools, Digital forensics evidence and capture, Digital forensics analysis, Military forensics, and Future DirectionsOutline of the CourseIntroduction to Data and Applications Security and Digital ForensicsPart I: Computer Forensics Overview-Unit #1: Fundamentals-Unit #2: Technologies-Unit #3: Systems-Unit #4: VendorsPart II: Computer Forensics Evidence and Capture-Unit #5: Data Recovery-Unit #6: Evidence Collection-Unit #7: Preserving Evidence-Unit #8: Computer Image VerificationOutline of the CoursePart III: Computer Forensics Analysis-Unit #9: Discovery of Evidence-Unit #10: Identifica6tion of Data-Unit #11: Reconstructing past events-Unit #12: NetworksPart IV: Information Warfare (OPTIONAL)-Unit #13: Defensive Strategies-Unit #14: Military tactics-Unit #15: Fighting Terrorism-Unit #16: Private Corporations-Unit 17: Future of Information Warfare-Unit #18: Surveillance-Unit 19: Civilian CausalitiesOutline of the CoursePart V: Advanced Computer Forensics (OPTIONAL)-Unit #20: Advances and Directions-Unit #21: Future DirectionsPapers from Conferences and Journals (e.g., Journal of Digital Evidence) to supplement the Textbook (several papers to be listed at the end)Each lecture will be posted on my web site before classCourse WorkTwo exams each worth 16 points-Mid-term and Final examsProgramming project worth 16 points-Due date; the day of the final examFour homework assignments worth 10 points each-Due dates will be announcedTerm paper (12 points)Total 100 pointsOptional term paper for extra credit: 8 pointsDetails of the course work will be discussed during the lecturesCourse RulesUnless special permission is obtained from the instructor, each student will work incidviaullyCopying material from other sources will not be permitted unless the source is properly referencedAny student who plagiarizes from other sources will be reported to the Computer Science department and any other committees as advised by the departmentProgramming projectTogether with your program in a CD-ROM, please provide a design document.Design document should include:-The objective-The design-The implementation of the design-Challenges encountered-Sample runs (if applicable)-DirectionsAssignmentsAssignment 1: Text Book exercises at the end of chapters 1, 2, 3, 4Assignment 2: text book exercises at the end of chapters 5, 6, 7, 8Assignment 3: Text book exercises at the end of chapters 9, 10, 11, 12Assignment 4: Framework unit; adapt the framework for a problem you choose.Reading material for the Mid-termChapters 1-12 of the bookPapers discussed in classReading material for the Final examPapers discussed in class; papers are in groups-Group 1: Snodgrass papers (database tampering)-Group 2: Intelligent digital analysis-Group 3: Frameworks-Group 4: Evidence Correlation-Group 5: Information hiding-Group 6: Network forensics (revisited)Optional reading: remainder of the text book for extra credit in examGroup 1Richard T. Snodgrass, Stanley Yao and Christian Collberg, "Tamper Detection in Audit Logs," In Proceedings of the International Conference on Very Large Databases, Toronto, Canada, August–September 2004, pp. 504–515. Kyri Pavlou and Richard T. Snodgrass, "Forensic Analysis of Database Tampering," in Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD), pages 109-120, Chicago, June, 2006. Additional paper for reading: Kyri Pavlou and Richard. T. Snodgrass, "The Pre-images of Bitwise AND Functions in Forensic Analysis,'' TimeCenter TR 87, October, 2006. (OPTIONAL)http://www.cs.arizona.edu/~rts/publications.htmlGroup 2http://dfrws.org/2006/proceedings/7-Alink.pdfXIRAF – XML-based indexing and querying for digital forensicshttp://dfrws.org/2006/proceedings/8-Turner.pdfSelective and intelligent imaging using digital evidence bagshttp://dfrws.org/2006/proceedings/9-Lee.pdfDetecting false captioning using common-sense reasoningGroup 3FORZA – Digital forensics investigation framework that incorporate legal issues-http://dfrws.org/2006/proceedings/4-Ieong.pdfA cyber forensics ontology: Creating a new approach to studying cyber forensics-http://dfrws.org/2006/proceedings/5-Brinson.pdfArriving at an anti-forensics consensus: Examining how to define and control the anti-forensics problem-http://dfrws.org/2006/proceedings/6-Harris.pdfGroup 4Forensic feature extraction and cross-drive analysis-http://dfrws.org/2006/proceedings/10-Garfinkel.pdfmd5bloom: Forensic file system hashing revisited (OPTIONAL)-http://dfrws.org/2006/proceedings/11-Roussev.pdfIdentifying almost identical files using context triggered piecewise hashing (OPTIONAL)-http://dfrws.org/2006/proceedings/12-Kornblum.pdfA correlation method for establishing provenance of timestamps in digital evidence-http://dfrws.org/2006/proceedings/13-%20Schatz.pdfGroup 5Data Hiding in Journaling File Systems -http://dfrws.org/2005/proceedings/eckstein_journal.pdfEvaluating Commercial Counter-Forensic Tools-http://dfrws.org/2005/proceedings/geiger_couterforensics.pdfAutomatically Creating Realistic Targets for Digital Forensics Investigation (OPTIONAL)-http://dfrws.org/2005/proceedings/adelstein_falcon.pdfGroup 6File Hound: A Forensics Tool for First Responders-http://dfrws.org/2005/proceedings/gillam_filehound.pdfMonitoring Access to Shared Memory-Mapped File-http://dfrws.org/2005/proceedings/sarmoria_memorymap.pdfNetwork Forensics Analysis with Evidence Graphs (OPTIONAL)-http://dfrws.org/2005/proceedings/wang_evidencegraphs.pdfGroup 7 How to Reuse Knowledge about Forensic InvestigationsDanilo


View Full Document

UTD CS 4398 - CS 4398 Introduction

Documents in this Course
Botnets

Botnets

33 pages

Botnets

Botnets

33 pages

Load more
Download CS 4398 Introduction
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view CS 4398 Introduction and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view CS 4398 Introduction 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?