Zur Kurzanzeige

Contemporary File System Forensic Analysis

dc.contributor.advisorMartini, Peter
dc.contributor.authorHilgert, Jan-Niclas
dc.date.accessioned2025-08-06T08:54:09Z
dc.date.available2025-08-06T08:54:09Z
dc.date.issued06.08.2025
dc.identifier.urihttps://hdl.handle.net/20.500.11811/13313
dc.description.abstractThis work bridges the gap between traditional and contemporary file system forensic analysis by addressing the limitations of Brian Carrier's foundational 2005 workflow for file system analysis. While Carrier's model has remained the de facto standard for nearly two decades, it has neither been updated nor its applicability evaluated for file systems commonly used today, such as ZFS, BTRFS, and MooseFS. These modern file systems introduce complexities - such as pooled storage, the concept of stacked file systems, and network-enhanced functionality - that are beyond the scope of the original workflow and forensic tools like The Sleuth Kit.
To address these shortcomings, this research proposes an extended forensic workflow by introducing two new analysis steps: pool analysis and stacked file system analysis. Pool analysis enables the reconstruction and forensic examination of pooled storage file systems, while stacked file system analysis provides a framework for analyzing file systems that store their data on an underlying file system.
Furthermore, this work explores the integration of network analysis to enhance file system forensics, leveraging network protocols like SMB to reconstruct file systems and user activities from network traffic. Tools such as pcapFS and SMB Command Fingerprinting (SCF) are developed and implemented, offering novel capabilities to recover historical file versions or reconstruct user interactions.
Our findings establish the limitations of Carrier's workflow in the context of contemporary file system analysis and demonstrate the efficacy of our extended model. Thus, our work equips digital forensic analysts with the methods and tools necessary to address contemporary file systems and their challenges as well as leverage the unique features they provide.
en
dc.language.isoeng
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 International
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/
dc.subjectDigitale Forensik
dc.subjectDateisysteme
dc.subjectDatenrekonstruktion
dc.subjectDigital Forensics
dc.subjectFile Systems
dc.subjectData Reconstruction
dc.subject.ddc004 Informatik
dc.titleContemporary File System Forensic Analysis
dc.typeDissertation oder Habilitation
dc.publisher.nameUniversitäts- und Landesbibliothek Bonn
dc.publisher.locationBonn
dc.rights.accessRightsopenAccess
dc.identifier.urnhttps://nbn-resolving.org/urn:nbn:de:hbz:5-83808
dc.relation.doihttps://doi.org/10.1016/j.diin.2017.06.003
dc.relation.doihttps://doi.org/10.1016/j.diin.2018.04.020
dc.relation.doihttps://doi.org/10.1016/j.fsidi.2023.301678
dc.relation.doihttps://doi.org/10.1016/j.fsidi.2024.301807
ulbbn.pubtypeErstveröffentlichung
ulbbnediss.affiliation.nameRheinische Friedrich-Wilhelms-Universität Bonn
ulbbnediss.affiliation.locationBonn
ulbbnediss.thesis.levelDissertation
ulbbnediss.dissID8380
ulbbnediss.date.accepted17.06.2025
ulbbnediss.instituteMathematisch-Naturwissenschaftliche Fakultät : Fachgruppe Informatik / Institut für Informatik
ulbbnediss.fakultaetMathematisch-Naturwissenschaftliche Fakultät
dc.contributor.coRefereePadilla, Elmar
ulbbnediss.contributor.orcidhttps://orcid.org/0009-0000-5308-5712


Dateien zu dieser Ressource

Thumbnail

Das Dokument erscheint in:

Zur Kurzanzeige

Die folgenden Nutzungsbestimmungen sind mit dieser Ressource verbunden:

Attribution-NonCommercial-NoDerivatives 4.0 International