A Virtual Digital Forensics Laboratory

  • Philip Craiger
  • Paul Burke
  • Christopher Marberry
  • Mark Pollitt
Part of the IFIP — The International Federation for Information Processing book series (IFIPAICT, volume 285)


This paper discusses the concept of a virtual digital forensic laboratory, which incorporates networked examination and storage machines, secure communications, multi-factor authentication, role-based access control, and case management and digital asset management systems. Laboratory activities such as the examination, storage and presentation of digital evidence can be geographically distributed and accessed over a network by users with the appropriate credentials. The advantages of such a facility include reduced costs through shared resources and the availability of advanced expertise for specialized cases.


Virtual laboratory virtualization storage area network 


  1. [1]
    M. Davis, G. Manes and S. Shenoi, A network-based architecture for storing digital evidence, in Advances in Digital Forensics, M. Pollitt and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 33-42, 2005.Google Scholar
  2. [2]
    Florida LambdaRail, Florida’s Research and Education Network (www.flrnet.org).
  3. [3]
    International Business Machines, IBM Systems Virtualization (Version 2, Release 1), Armonk, New York, 2005.Google Scholar
  4. [4]
    N. McAllister, Server virtualization, InfoWorld, February 12, 2007.Google Scholar
  5. [5]
    V. Mukhin, Multi-factor authentication as a protection mechanism in computer networks, Cybernetics and Systems Analysis, vol. 35(5), pp. 832-835, 1999.MathSciNetCrossRefMATHGoogle Scholar
  6. [6]
    National Security Agency, NSA Security Configuration Guides, Fort Meade, Maryland (www.nsa.gov/snac), 2005.
  7. [7]
    B. Phillips, Have storage area networks come of age? IEEE Com- puter, vol. 31(7), pp. 10-12, 1998.CrossRefGoogle Scholar
  8. [8]
    A. Singh, An Introduction to Virtualization (www.kernelthread.com/publications/virtualization), 2004.
  9. [9]
    M. Stockman, J. Nyland and W. Weed, Centrally-stored and delivered virtual machines in the networking/system administration lab, ACM SIGITE Newsletter, vol. 2(2), pp. 4-6, 2005.CrossRefGoogle Scholar
  10. [10]
    J. Tate, F. Lucchese and R. Moore, Introduction to Storage Area Networks, IBM Redbooks/Vervante, Rolling Hills Estates, California, 2006.Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2008

Authors and Affiliations

  • Philip Craiger
    • 1
  • Paul Burke
    • 1
  • Christopher Marberry
    • 1
  • Mark Pollitt
    • 1
    • 2
  1. 1.The National Center for Forensic ScienceUniversity of Central FloridaOrlandoUSA
  2. 2.IFIP Working Group 11.9 on Digital ForensicsUSA

Personalised recommendations