15.01.2014 Views

An Ontology for Digital Forensics in IT Security Incidents - OPUS

An Ontology for Digital Forensics in IT Security Incidents - OPUS

An Ontology for Digital Forensics in IT Security Incidents - OPUS

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CONTENTS 5<br />

8 Evaluation 65<br />

8.1 Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65<br />

8.2 SPARQL Queries . . . . . . . . . . . . . . . . . . . . . . . . . 66<br />

8.2.1 F<strong>in</strong>d le . . . . . . . . . . . . . . . . . . . . . . . . . . 66<br />

8.2.2 Autorun . . . . . . . . . . . . . . . . . . . . . . . . . . 66<br />

8.2.3 Network . . . . . . . . . . . . . . . . . . . . . . . . . . 66<br />

8.2.4 Parent Process . . . . . . . . . . . . . . . . . . . . . . 66<br />

8.2.5 Resources . . . . . . . . . . . . . . . . . . . . . . . . . 66<br />

8.3 Case 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67<br />

8.4 Case 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67<br />

8.5 Case 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68<br />

8.6 Case 4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68<br />

9 Summary 69<br />

A Extraction tool list<strong>in</strong>gs 71<br />

B Forensic tools output list<strong>in</strong>gs 75<br />

C Screenshots 77<br />

Bibliography 84

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!