信息网络安全 ›› 2014, Vol. 14 ›› Issue (12): 47-50.doi: 10.3969/j.issn.1671-1122.2014.12.010
Previous Articles Next Articles
XU Guo-tian
Received:
Online:
Abstract: Most of the Linux hosts use the EXT3 file system. The hard disk of EXT3 format can store a large number of suspicious files. It's very important to identify the increase, delete, change operation of the suspect in the documents. Extraction of the modified data is important for the investigation and forensic of the public security organs. The operation traces of different files are analyzed in this paper. The basic structure of the EXT3 log file and a method to extract the file name and the inode node information from the log are studied. Extraction method of operating traces based on inode and a state transition machine are designed. The software can be run directly in the Linux host and complete the trace extraction by scanning the log file. After a lot of practical testing, the software can effectively extract the uncovered traces of operation in EXT3 file system.
Key words: operation trace, extraction, EXT3, journal, inode
CLC Number:
TP309
XU Guo-tian. Software Design of EXT3 File Operation Trace Extraction[J]. 信息网络安全, 2014, 14(12): 47-50.
0 / / Recommend
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2014.12.010
http://netinfo-security.org/EN/Y2014/V14/I12/47