Full Description
The digital forensics research community develops new solutions daily to advance its subfields, including cloud and network forensics and security. However, a substantial amount of such research requires greater experimental rigor. A few works have discussed how to improve such rigor. One of the most essential ways to address it is to promote the reproducibility of digital forensics controlled experiments. Research has demonstrated that specific techniques, such as conceptual modeling and ontology, have been successfully applied.
This book presents techniques for planning, modeling, conducting, and disseminating controlled experiments and quasi-experiments in digital forensics. By properly documenting and disseminating experiments, researchers are preparing their experimental artifacts to ensure reproducibility, thereby enabling the appropriate evolution of a given research topic.
The target audience comprises researchers in digital forensics, undergraduate and graduate students, law enforcement personnel, police, experts, and other related communities interested in improving their experiments to make them more reproducible. All of these groups might benefit from this book by deepening their understanding of the essential concepts of digital forensics experiments, how to plan, conduct, and disseminate experimental findings, and how to organize experimental artifacts for reproducibility.
Contents
Part I: Fundamentals of Digital Forensics and Controlled Experimentation.- 1. Digital Forensics in a Nutshell.- 2. Principles of Controlled Experimentation.- 3. The Role of Reproducibility in Science and Digital Forensics.- Part II: Documenting Digital Forensics Controlled Experiments.- 4. Basics of Conceptual Modelling.- 5. ExperDF-CM: a Digital Forensics Controlled Experiments Conceptual Model.- Part III: Formal Representation and Semantic Integration of Digital Forensics Controlled Experiments.- 6. Basics of Ontology and SPARQL Queries.- 7. The ExperDF-Onto Ontology.- Part IV: ExperDF-Onto Walkthroughs of Exemplary Digital Forensics.- 8. Example 1: The Memory That Wouldn't Lie.- 9. Example 2: Unlocking the Locked - Smartphone Bypass Experiments.- 10. Example 3: The Case of the Altered Cloud Logs.- 11. Example 4: Echoes in the IoT Lab.- 12. Example 5: The Invisible Signature — Blockchain Provenance.- Part V: Integration, Reflection, and Future Directions.- 13. Concluding Remarks - Towards a Scientifically Grounded and Open Digital Forensic.



