Skip to main content

Digital Forensics

  • Chapter
  • First Online:
Dehumanization of Warfare
  • 1014 Accesses

Abstract

In recent years, digital attacks against organizations, critical infrastructure and military targets are increasing. Generally, these attacks are summarized under the term Cyberwar and broadly discussed by the press, military experts and politicians. Attribution (“Who did it?”) is often a major question in these discussions. But, by using computers and the Internet, these attacks leave digital traces which may become digital evidence. Digital forensics as a scientific discipline deals with methodologies to find and handle digital evidence. The main goal of digital forensic investigations is to reconstruct how an attack occurred and who is responsible. In this paper we show up the fundamental principles of digital forensics and discuss the usefulness of digital evidence in the mentioned attack scenarios. By sketching out two concrete examples, we present the capabilities of digital forensics to investigate distributed denial of service attacks and malware attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    Davis (2007).

  2. 2.

    Bundesamt für Sicherheit in der Informationstechnik (2014), p. 31.

  3. 3.

    Langner (2013).

  4. 4.

    Coviello (2011).

  5. 5.

    Kaspersky (2015).

  6. 6.

    Rid and Buchanan (2014).

  7. 7.

    Böhme et al. (2009).

  8. 8.

    Böhme et al. (2009).

  9. 9.

    Casey (2011), p. 26.

  10. 10.

    Rid and Buchanan (2014).

  11. 11.

    Slay et al. (2009).

  12. 12.

    Dewald and Freiling (2011), p. 49.

  13. 13.

    Dewald (2012), p. 59.

  14. 14.

    Inman and Rudin (2002).

  15. 15.

    Dewald and Freiling (2012).

  16. 16.

    Dewald and Freiling (2012).

  17. 17.

    Inman and Rudin (2002).

  18. 18.

    Inman and Rudin (2002).

  19. 19.

    Inman and Rudin (2002).

  20. 20.

    Inman and Rudin (2002).

  21. 21.

    Dewald (2012), p. 48f.

  22. 22.

    Dardick et al. (2014), p. 156.

  23. 23.

    Inman and Rudin (2002).

  24. 24.

    Inman and Rudin (2002), Dewald and Freiling (2012).

  25. 25.

    Inman and Rudin (2002).

  26. 26.

    Inman and Rudin (2002).

  27. 27.

    Dewald (2012), p. 13.

  28. 28.

    Inman and Rudin (2000), p. 5f.

  29. 29.

    Inman and Rudin (2000), p. 5f.

  30. 30.

    Dewald (2012), p. 13f.

  31. 31.

    Casey (2011), p. 24.

  32. 32.

    HTML is the markup language used to semantically describe the structure of a website. HTML files and all referenced files like images are downloaded, rendered and presented by browsers like Firefox, Chrome, Internet Explorer or Edge.

  33. 33.

    Casey (2011), p. 7.

  34. 34.

    Inman and Rudin (2002).

  35. 35.

    Carrier (2003).

  36. 36.

    Dewald and Freiling (2011), p. 36.

  37. 37.

    Carrier (2003).

  38. 38.

    Dewald (2012), p. 83.

  39. 39.

    Dewald (2012), p. 86.

  40. 40.

    Dewald (2012), p. 91.

  41. 41.

    Association of Chief Police Officers (2007).

  42. 42.

    Dewald (2012), p. 39f.

  43. 43.

    Casey (2011), p. 26.

  44. 44.

    Dewald (2012), p. 41.

  45. 45.

    Böhme et al. (2009).

  46. 46.

    Casey (2011), p. 21.

  47. 47.

    Casey (2011), p. 21f.

  48. 48.

    Casey (2011), p. 22.

  49. 49.

    Casey (2011), p. 70.

  50. 50.

    Casey (2011), p. 26.

  51. 51.

    Casey (2011), p. 26.

  52. 52.

    Malware is a general term for viruses, trojan horses, hoaxes, worms, etc.

  53. 53.

    Stuxnet picked either www.mypremierfutbol.com. or www.todaysfutbol.com to report the information about the recently infected PC. The domains have been hosted in Malaysia and Denmark.

  54. 54.

    A command-and-control server is common to operate a bunch of infected PCs. This architecture (server+infected PCs) is also the standard for so called botnets, which are often used to deploy non-targeted malware or to execute DDoS attacks.

  55. 55.

    Inman and Rudin (2002).

  56. 56.

    Kannenberg (2015).

  57. 57.

    Rid and Buchanan (2014).

References

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Stefan Meier .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this chapter

Cite this chapter

Meier, S. (2018). Digital Forensics. In: Heintschel von Heinegg, W., Frau, R., Singer, T. (eds) Dehumanization of Warfare. Springer, Cham. https://doi.org/10.1007/978-3-319-67266-3_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-67266-3_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-67264-9

  • Online ISBN: 978-3-319-67266-3

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics