首页 | 本学科首页   官方微博 | 高级检索  
     检索      


IoT forensics: Exploiting unexplored log records from the HIKVISION file system
Authors:Evangelos Dragonas MSc  Costas Lambrinoudakis PhD  Michael Kotsis MSc
Institution:1. Department of Digital Systems, University of Piraeus, Attica, Greece;2. Department of Informatics and Computer Engineering, University of West Attica, Attica, Greece
Abstract:CCTV surveillance systems are IoT products that can be found almost everywhere. Their digital forensic analysis often plays a key role in solving crimes. However, it is common for these devices to use proprietary file systems, which frequently hinders a complete examination. HIKVISION is a well-known manufacturer of such devices that typically ships its products with its proprietary file system. The HIKVISION file system has been analyzed before but that research has focused on the recovery of video footage. In this paper, the HIKVISION file system is being revisited regarding the log records it stores. More specifically, these log records are thoroughly examined to uncover both their structure and meaning. These unexplored pieces of evidence remain unexploited by major commercial forensic software, yet they can contain critical information for an investigation. To further assist digital forensic examiners with their analysis, a Python utility, namely the Hikvision Log Analyzer, was developed as part of this study that can automate part of the process.
Keywords:CCTV  DVR  HIKVISION  HIKVISION file system  Hikvision log analyzer  HIKVISION log records  IoT forensics  NVR
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号