An Ontology for Digital Forensics in IT Security Incidents - OPUS
An Ontology for Digital Forensics in IT Security Incidents - OPUS
An Ontology for Digital Forensics in IT Security Incidents - OPUS
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
CONTENTS 5<br />
8 Evaluation 65<br />
8.1 Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65<br />
8.2 SPARQL Queries . . . . . . . . . . . . . . . . . . . . . . . . . 66<br />
8.2.1 F<strong>in</strong>d le . . . . . . . . . . . . . . . . . . . . . . . . . . 66<br />
8.2.2 Autorun . . . . . . . . . . . . . . . . . . . . . . . . . . 66<br />
8.2.3 Network . . . . . . . . . . . . . . . . . . . . . . . . . . 66<br />
8.2.4 Parent Process . . . . . . . . . . . . . . . . . . . . . . 66<br />
8.2.5 Resources . . . . . . . . . . . . . . . . . . . . . . . . . 66<br />
8.3 Case 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67<br />
8.4 Case 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67<br />
8.5 Case 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68<br />
8.6 Case 4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68<br />
9 Summary 69<br />
A Extraction tool list<strong>in</strong>gs 71<br />
B Forensic tools output list<strong>in</strong>gs 75<br />
C Screenshots 77<br />
Bibliography 84