Abstract
In this study, we investigate large-scale digital forensic investigation on Apache Spark using a Windows registry. Because the Windows registry depends on the system on which it operates, the existing forensic methods on the Windows registry have been targeted on the Windows registry in a single system. However, it is a critical issue to analyze large-scale registry data collected from several Windows systems because it allows us to detect suspiciously changed data by comparing the Windows registry in multiple systems. To this end, we devise distributed algorithms to analyze large-scale registry data collected from multiple Windows systems on the Apache Spark framework. First, we define three main scenarios in which we classify the existing registry forensic studies into them. Second, we propose an algorithm to load the Windows registry into the Hadoop distributed file system (HDFS) for subsequent forensics. Third, we propose a distributed algorithm for each defined forensic scenario using Apache Spark operations. Through extensive experiments using eight nodes in an actual distributed environment, we demonstrate that the proposed method can perform forensics efficiently on large-scale registry data. Specifically, we perform forensics on 1.52 GB of Windows registry data collected from four computers and show that the proposed algorithms can reduce the processing time by up to approximately 3.31 times, as we increase the number of CPUs from 1 to 8 and the number of worker nodes from 2 to 8. Because the distributed algorithms on Apache Spark require the inherent network and MapReduce overheads, this improvement of the processing performance verifies the efficiency and scalability of the proposed algorithms.
Funder
National Research Foundation of Korea
Publisher
Public Library of Science (PLoS)
Reference44 articles.
1. Registry. Available online: https://docs.microsoft.com/en-us/windows/desktop/sysinfo/registry;(accessed on 04-Jan.-2022).
2. Constructing a lightweight key-value store based on the windows native features;HY Kwon;Applied Sciences,2019
3. Redundancy Analysis and Elimination on Access Patterns of the Windows Applications Based on I/O Log Data;JH Lee;IEEE Access,2020
4. Introduction to Windows Mobile Forensics;E Casey;Digital Investigation,2010
5. Windows memory forensics;N Ruff;Journal in Computer Virology,2008