信息网络安全 ›› 2014, Vol. 14 ›› Issue (12): 47-50.doi: 10.3969/j.issn.1671-1122.2014.12.010

Previous Articles     Next Articles

Software Design of EXT3 File Operation Trace Extraction

XU Guo-tian   

  1. China Criminal Police College, Shenyang Liaoning 110854, China
  • Received:2014-11-05 Online:2014-12-15

Abstract: Most of the Linux hosts use the EXT3 file system. The hard disk of EXT3 format can store a large number of suspicious files. It's very important to identify the increase, delete, change operation of the suspect in the documents. Extraction of the modified data is important for the investigation and forensic of the public security organs. The operation traces of different files are analyzed in this paper. The basic structure of the EXT3 log file and a method to extract the file name and the inode node information from the log are studied. Extraction method of operating traces based on inode and a state transition machine are designed. The software can be run directly in the Linux host and complete the trace extraction by scanning the log file. After a lot of practical testing, the software can effectively extract the uncovered traces of operation in EXT3 file system.

Key words: operation trace, extraction, EXT3, journal, inode

CLC Number: