Anti-Forensic Digital Investigation for Unauthorized Intrusion on a Wireless Network
aut.embargo | No | en_NZ |
aut.thirdpc.contains | No | en_NZ |
aut.thirdpc.permission | No | en_NZ |
aut.thirdpc.removed | No | en_NZ |
dc.contributor.advisor | Cusack, Brian | |
dc.contributor.author | Li, Wei | |
dc.date.accessioned | 2014-06-27T04:32:17Z | |
dc.date.available | 2014-06-27T04:32:17Z | |
dc.date.copyright | 2013 | |
dc.date.created | 2014 | |
dc.date.issued | 2013 | |
dc.date.updated | 2014-06-27T04:26:44Z | |
dc.description.abstract | In the last decade, the digital forensic methodologies and techniques have advanced rapidly. They have many variations such as computer forensics, network forensics and in this thesis project, wireless forensics. Similarly, computer criminals have become aware of current investigation procedures and, in turn, have developed their own techniques and tools in an attempt to manipulate and/or remove digital evidence. Such techniques are known as anti-forensics. In this project, the researcher was motivated by the potential difficulties facing investigators in the wireless environment when anti-forensics is deliberately used. Thus, the research is to set up a wireless intrusion investigation with anti-forensic elements inserted into the environment. The main goal of this research is to create a solution to overcome the impact or thwarting created by anti-forensic techniques and tools during the wireless investigation processes. Therefore two problem areas are identified, the wireless forensic investigation and the wireless forensic investigation with anti-forensics. The relevant problems such as the acquiring of evidence from a wireless network, the detection and analysis of anti-forensic affects, and the impact of anti-forensics on investigation processes are addressed. Three phases of research testing were conducted. The research Phase One was to gather the testing data then to be used as a benchmark to evaluate the effects of applied anti-forensic tools on the investigation processes. The collected evidence included the captured wireless network traffic and the initial evidence image file. The second phase applied the anti-forensic tools on the host in order to cover the evidence trail. The investigation process was repeated until consistency. The outcomes were processed and presented in the findings table. The Phase Three was a review step. The findings from Phase One and Phase Two were analysed and compared. The anti-forensic effects on the host system were identified. Subsequently, the current data recovery technology used to restore or mitigate the damage caused by anti-forensic tools was tested. The findings from the third phase determined the anti-forensic effects on the investigation process of a wireless intrusion incident. In summary, the results of this research show that the applied anti-forensic tools caused irrecoverable damages for the Internet artefacts. The reconstruction of the wireless intrusion incident involving anti-forensic effects could be mostly accomplished by combining the information extracted from the captured wireless traffic and the evidence findings from the recovered evidence image file. The lack of intrusion activities on the host system could be explained by the applied anti-forensic tools themselves. | en_NZ |
dc.identifier.uri | https://hdl.handle.net/10292/7383 | |
dc.language.iso | en | en_NZ |
dc.publisher | Auckland University of Technology | |
dc.rights.accessrights | OpenAccess | |
dc.subject | Anti-forensic investigation | en_NZ |
dc.subject | Wireless intrusion | en_NZ |
dc.title | Anti-Forensic Digital Investigation for Unauthorized Intrusion on a Wireless Network | en_NZ |
dc.type | Thesis | |
thesis.degree.discipline | ||
thesis.degree.grantor | Auckland University of Technology | |
thesis.degree.level | Masters Theses | |
thesis.degree.name | Master of Computer and Information Sciences | en_NZ |