Please use this identifier to cite or link to this item: https://rda.sliit.lk/handle/123456789/2776
Full metadata record
DC FieldValueLanguage
dc.contributor.authorRupasinghe, R-
dc.contributor.authorFernando, D. N-
dc.date.accessioned2022-07-15T06:22:08Z-
dc.date.available2022-07-15T06:22:08Z-
dc.date.issued2022-03-
dc.identifier.issn2456-2165-
dc.identifier.urihttp://rda.sliit.lk/handle/123456789/2776-
dc.description.abstractAccording to many research findings, the volatile memory has become a more vital space used by attackers and malicious users to store data that needs to be covert from others and avoid reverse-engineering. Since most incident response teams seldom study the volatile memory and lack the knowledge and equipment needed to extract information from it, there is plenty of data to back this up. Furthermore, the recent development of malicious codes can remain in the memory without affecting the physical disk. Therefore security analysts must prioritize and investigate the volatile memory as an important component rather than being following traditional logic thinking that the malicious users will only look into hard disk storage. The Volatility Framework is an open-source and free set of tools to analyze computer memory. This framework provides many options for data analysis in different aspects as a command-line interface. This makes complications for forensic analysts to memorize and use the tools and plugins. This research offers a GUI and extensions for the Volatility Framework, which simplifies the usage and provides a time-saving approach as the investigators do not want to memorize long command sequences.en_US
dc.language.isoenen_US
dc.publisherwww.ijisrt.comen_US
dc.relation.ispartofseriesInternational Journal of Innovative Science and Research Technology;Volume 7, Issue 3-
dc.subjectVolatility Frameworken_US
dc.subjectForensic Investigationen_US
dc.titleForensic Investigation Tool for Volatility Frameworken_US
dc.typeArticleen_US
Appears in Collections:Research Papers - Dept of Computer Systems Engineering
Research Papers - Open Access Research
Research Papers - SLIIT Staff Publications

Files in This Item:
File Description SizeFormat 
IJISRT22MAR657_(1).pdf476.77 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.