{"title":"Forensic Techniques to Detect Hidden Data in Alternate Data Streams in NTFS","authors":"Rahul Hermon, Upasna Singh, Bhupendra Singh","doi":"10.1109/IBSSC56953.2022.10037507","DOIUrl":null,"url":null,"abstract":"Alternate Data Streams (ADS) have been a feature of the New Technology File System (NTFS) since its introduction in 1993. Alternate Data Streams (ADS) were introduced to address compatibility within the existing Operating Systems. Lately Hackers/Cyber Criminals have used Alternate Data Streams (ADS) as a means for launching Cyber- Attacks. Alternate Data Streams (ADS) allow data hiding, same being difficult to detect without adequate knowledge. In this paper we shall bring out the various Forensic techniques in which hidden data in Alternate Data Streams (ADS) can be detected. Finally, we compared the Forensic techniques to detect data hidden in Alternate Data Streams (ADS) in both Windows 10 and 11 Operating System.","PeriodicalId":426897,"journal":{"name":"2022 IEEE Bombay Section Signature Conference (IBSSC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE Bombay Section Signature Conference (IBSSC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IBSSC56953.2022.10037507","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Alternate Data Streams (ADS) have been a feature of the New Technology File System (NTFS) since its introduction in 1993. Alternate Data Streams (ADS) were introduced to address compatibility within the existing Operating Systems. Lately Hackers/Cyber Criminals have used Alternate Data Streams (ADS) as a means for launching Cyber- Attacks. Alternate Data Streams (ADS) allow data hiding, same being difficult to detect without adequate knowledge. In this paper we shall bring out the various Forensic techniques in which hidden data in Alternate Data Streams (ADS) can be detected. Finally, we compared the Forensic techniques to detect data hidden in Alternate Data Streams (ADS) in both Windows 10 and 11 Operating System.