To see the other types of publications on this topic, follow the link: Forensic analysis.

Journal articles on the topic 'Forensic analysis'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Forensic analysis.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Sachdeva, Shaweta, B. L. Raina, and Avinash Sharma. "Analysis of Digital Forensic Tools." Journal of Computational and Theoretical Nanoscience 17, no. 6 (2020): 2459–67. http://dx.doi.org/10.1166/jctn.2020.8916.

Full text
Abstract:
This paper aims to analyze different tools for Forensic Data Analysis comes under the branch of Digital Forensics. Forensic data analysis is done with digital techniques. Digital forensics becomes more important in law enforcement, due to the large use of computers and mobile devices. The pattern recognition system most appropriately fits into the Analysis Phase of the Digital Forensics. Pattern Recognition involves two processes. One Process is an analysis and the second process is recognition. The result of the analysis is taken out of the attributes from the patterns to be recognized i.e., a pattern of different faces and fingerprints. These attributes are then utilized for the further process in the analysis phase which provides attention on various techniques of pattern recognition that are applied to digital forensic examinations and is proposed to develop different forensic tools to collect evidence that would be helpful to solve specific types of crimes. This evidence further helps the examiner in the analysis phase of the digital forensic process by identifying the applicable data.
APA, Harvard, Vancouver, ISO, and other styles
2

Antwi, Paul. "Device Information for Forensic Analysis." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 373–78. http://dx.doi.org/10.22624/aims/crp-bk3-p59.

Full text
Abstract:
This document provides an overview of information for forensic analysis related to device name, serial number and model of devices used to connect to social networking platforms. The increasing use of social networking applications on smartphones makes these devices a gold mine for forensic researchers. Potential evidence can be captured on these devices and recovered with the right tools and research methods. The increasing proliferation of network devices in homes and buildings increases the possibilities of finding digital traces relevant to an investigation, physical or virtual: cyber-attacks, identity theft, etc. connected to the network can also find useful traces on the devices themselves found or stored in an associated cloud account that can be identified by device ID, model, and serial number. Keywords: Digital Forensics; Device Information, Evidence, Storage, Cyber forensics framework. BOOK Chapter ǀ Research Nexus in IT, Law, Cyber Security & Forensics. Open Access. Distributed Free Citation: Paul Antwi (2022): Device Information for Forensic Analysis Book Chapter Series on Research Nexus in IT, Law, Cyber Security & Forensics. Pp 373-378 www.isteams.net/ITlawbookchapter2022. dx.doi.org/10.22624/AIMS/CRP-BK3-P59
APA, Harvard, Vancouver, ISO, and other styles
3

Dodoo, Herbert Cyril. "Deep Learning (DL) Oriented Forensic Analysis." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 321–28. http://dx.doi.org/10.22624/aims/crp-bk3-p51.

Full text
Abstract:
Cyber-attacks are now more prevalent than ever before in all aspects of our daily lives. As a result of this circumstance, both individuals and organizations are fighting cybercrime on a regular basis. Furthermore, today's hackers have advanced a step further and are capable of employing complex cyber-attack strategies, exacerbating the problem. Some of these approaches are minute and undetectable, and they frequently masquerade as genuine requests and directives. To combat this threat, cyber security professionals, as well as digital forensic investigators, are constantly compelled to filter through massive and complicated pools of data, also known as Big Data, in order to uncover Potential Digital Forensic Evidence. that can be used as evidence in court. Potential Digital Evidence can then be used to assist investigators in reaching certain conclusions and/or judgments. The fact that Big Data frequently comes from various sources and has diverse file formats makes cyber forensics even more difficult for investigators. When it comes to the processing of vast amounts of complicated data for forensic purposes, forensic investigators typically have less time and budget to fulfil the rising demands. This paper will be studying how to incorporate Deep Learning cognitive computing approaches into Cyber Forensics Keywords: Deep Learning, Forensic Analysis, Artificial Intelligence, Online Safety, Evidence BOOK Chapter ǀ Research Nexus in IT, Law, Cyber Security & Forensics. Open Access. Distributed Free Citation: Herbert Cyril Dodoo (2022): Deep Learning (DL) Oriented Forensic Analysis Book Chapter Series on Research Nexus in IT, Law, Cyber Security & Forensics. Pp 320-328 www.isteams.net/ITlawbookchapter2022. dx.doi.org/10.22624/AIMS/CRP-BK3-P51
APA, Harvard, Vancouver, ISO, and other styles
4

Sabillon, Regner, Jordi Serra-Ruiz, Victor Cavaller, and Jeimy J. Cano. "Digital Forensic Analysis of Cybercrimes." International Journal of Information Security and Privacy 11, no. 2 (2017): 25–37. http://dx.doi.org/10.4018/ijisp.2017040103.

Full text
Abstract:
This paper reviews the existing methodologies and best practices for digital investigations phases like collecting, evaluating and preserving digital forensic evidence and chain of custody of cybercrimes. Cybercriminals are adopting new strategies to launch cyberattacks within modified and ever changing digital ecosystems, this article proposes that digital investigations must continually readapt to tackle cybercrimes and prosecute cybercriminals, working in international collaboration networks, sharing prevention knowledge and lessons learned. The authors also introduce a compact cyber forensics model for diverse technological ecosystems called Cyber Forensics Model in Digital Ecosystems (CFMDE). Transferring the knowledge, international collaboration, best practices and adopting new digital forensic tools, methodologies and techniques will be hereinafter paramount to obtain digital evidence, enforce organizational cybersecurity policies, mitigate security threats, fight anti-forensics practices and indict cybercriminals. The global Digital Forensics community ought to constantly update current practices to deal with cybercriminality and foreseeing how to prepare to new technological environments where change is always constant.
APA, Harvard, Vancouver, ISO, and other styles
5

Haoyang, Xie, Jiang Keyu, Yuan Xiaohong, and Zeng Hongbiao. "FORENSIC ANALYSIS OF WINDOWS REGISTRY AGAINST INTRUSION." FORENSIC ANALYSIS OF WINDOWS REGISTRY AGAINST INTRUSION 4, no. 2 (2012): 121–34. https://doi.org/10.5281/zenodo.3247268.

Full text
Abstract:
Windows Registry forensics is an important branch of computer and network forensics. Windows Registry is often considered as the heart of Windows Operating Systems because it contains all of the configuration setting of specific users, groups, hardware, software, and networks. Therefore, Windows Registry can be viewed as a gold mine of forensic evidences which could be used in courts. This paper introduces the basics of Windows Registry, describes its structure and its keys and subkeys that have forensic values. This paper also discusses how the Windows Registry forensic keys can be applied in intrusion detection.
APA, Harvard, Vancouver, ISO, and other styles
6

Al Jouhi, Mariam, and Sara Al Hosani. "Windows Forensics Analysis." Emirati Journal of Policing & Security Studies 1, no. 1 (2022): 4–11. https://doi.org/10.54878/jagh3855.

Full text
Abstract:
Computer forensics investigates crimes on digital devices hard disk and any other digital storage devices to determine the evidence of any unauthorized access. Essentially, forensic investigators conduct forensic analysis with the help of different approaches (Static and Dynamic) and also tools like ProDiscover, Encase, Accessdata FTK and Autopsy to guarantee the security of a system in an organization. The process requires knowledge of different registry, laws, and regulations related to computer crimes, the operating system (Windows, Linux, etc.) and the network in an organization (e.g., Win NT). In this paper we will use different forensic tools to extract forensic evidence from a windows environment.
APA, Harvard, Vancouver, ISO, and other styles
7

Maulina, Sinta Nur, Niken Dwi Wahyu Cahyani, and Erwid Musthofa Jadied. "ANALYSIS OF THE EFFECT OF VSM ON THE MEMORY ACQUISITION PROCESS USING THE DYNAMIC ANALYSIS METHOD." JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika) 8, no. 2 (2023): 638–46. http://dx.doi.org/10.29100/jipi.v8i2.3745.

Full text
Abstract:
At first, forensics was restricted to studying data that was stored on a system's hard disk. However, as storage capacity and data encryption increased, applying conventional digital forensic procedures became more challenging. As a result, memory forensics techniques are developed, or are frequently referred to as live forensics, because the process is quicker and more sophisticated. Volatile memory forensics, often known as live forensics, are necessary for this condition. Live forensics has flaws, specifically that some programs can fail when the computer is in active VSM (virtual secure mode). This results in the retrievable evidence being lost. Therefore, determining the cause is essential. The software-based memory acquisition tools Autopsy, Isobuster, DumpIt, and Magnet RAM Capturer are just a few examples. According to the findings of the experiments, the tools that have crashed include DumpIt v1.3.2.20110401. A dynamic code analysis using WindBg as a tool was utilized to study the impact of VSM on the memory acquisition tool. This study's goal is to identify the instances of crashes in various forensic instruments, which will be highly useful for forensic experts performing investigations.
APA, Harvard, Vancouver, ISO, and other styles
8

Lee, Sang Young. "Mobile Digital Forensics Framework for Smartphone User Analysis." Webology 19, no. 1 (2022): 4335–51. http://dx.doi.org/10.14704/web/v19i1/web19285.

Full text
Abstract:
Blockchain-based digital forensics technology is an efficient way to prevent forgery/modulation of evidence including collecting and analyzing evidential data using the technology in compliance with smartphone forensics procedures after a smartphone is seized. Moreover, the use of large-capacity storage devices and various digital devices have become a realistic solution for its development of IT in situations where the existing digital forensics analysis methods are regarded as limitations. This paper analyzed user’s status on smartphone application and implemented a smartphone user analysis framework that may extract significant digital evidence in a digital forensic way based on a blockchain perspective. In this paper researched a system that may provide important information to digital forensic analysts through these frameworks. It is expected that the proposed system will be expanded by much more structured data and online unstructured data such as SNS reports.
APA, Harvard, Vancouver, ISO, and other styles
9

Dwi Syahputri, Rischi, Alexander Anggono, Prasetyono Prasetyono, and Mohamad Djasuli. "Evolution and Research Opportunities of Digital Forensic Tools: A Bibliometric Analysis." CogITo Smart Journal 10, no. 2 (2024): 474–85. https://doi.org/10.31154/cogito.v10i2.675.474-485.

Full text
Abstract:
The use of digital technology has increased rapidly, presenting new challenges such as cybercrime, online fraud and money laundering. To address these threats, digital forensic tools have become crucial in investigating and analyzing electronic evidence to combat increasingly complex digital crimes. Therefore, research and development in the field of digital forensics is crucial to address the growing digital security challenges. This study aims to conduct a bibliometric analysis of digital forensic tools research in the business, management and accounting domains over the past ten years, evaluate the evolution of the research, identify promising research opportunities and provide insights into future directions in the field. Bibliometric analysis was conducted with the help of VOSviewer software on 698 Scopus-indexed articles sourced from ScienceDirect during 2014-2023. Based on the network map analysis, it was found that despite much progress, the field continues to evolve and offers many opportunities for further research and innovation in digital forensic tools related to mobile forensics, memory forensics, anti-forensics, malware analysis, cloud forensics, cybersecurity, machine learning and deep learning, and ethics and privacy in forensic investigations.
APA, Harvard, Vancouver, ISO, and other styles
10

Qureshi, Sirajuddin, Jianqiang Li, Faheem Akhtar, Saima Tunio, Zahid Hussain Khand, and Ahsan Wajahat. "Analysis of Challenges in Modern Network Forensic Framework." Security and Communication Networks 2021 (August 28, 2021): 1–13. http://dx.doi.org/10.1155/2021/8871230.

Full text
Abstract:
Network forensics can be an expansion associated with network security design which typically emphasizes avoidance and detection of community assaults. It covers the necessity for dedicated investigative abilities. When you look at the design, this indeed currently allows investigating harmful behavior in communities. It will help organizations to examine external and community this is undoubtedly around. It is also important for police force investigations. Network forensic techniques can be used to identify the source of the intrusion and the intruder’s location. Forensics can resolve many cybercrime cases using the methods of network forensics. These methods can extract intruder’s information, the nature of the intrusion, and how it can be prevented in the future. These techniques can also be used to avoid attacks in near future. Modern network forensic techniques face several challenges that must be resolved to improve the forensic methods. Some of the key challenges include high storage speed, the requirement of ample storage space, data integrity, data privacy, access to IP address, and location of data extraction. The details concerning these challenges are provided with potential solutions to these challenges. In general, the network forensic tools and techniques cannot be improved without addressing these challenges of the forensic network. This paper proposed a thematic taxonomy of classifications of network forensic techniques based on extensive. The classification has been carried out based on the target datasets and implementation techniques while performing forensic investigations. For this purpose, qualitative methods have been used to develop thematic taxonomy. The distinct objectives of this study include accessibility to the network infrastructure and artifacts and collection of evidence against the intruder using network forensic techniques to communicate the information related to network attacks with minimum false-negative results. It will help organizations to investigate external and internal causes of network security attacks.
APA, Harvard, Vancouver, ISO, and other styles
11

Adeyemi, Ikuesan R., Shukor Abd Razak, and Nor Amira Nor Azhan. "A Review of Current Research in Network Forensic Analysis." International Journal of Digital Crime and Forensics 5, no. 1 (2013): 1–26. http://dx.doi.org/10.4018/jdcf.2013010101.

Full text
Abstract:
Establishing facts on cyber crime is gradually gaining wider relevance in prosecuting cyber criminals. The branch of cyber policing saddled with this responsibility is the network forensic community (researchers, developer, and investigator). However, the recurring rate of advances in cybercrime poses greater challenge to the available improvements in network forensics analysis tools (NFAT) as well as to investigators, and ultimately, researchers. The need for an efficient cutting-edge research finding in curbing network crimes therefore is undeniably critical. This paper describes the distinction between network security and network forensics. In addition, the authors identify factors that militate against most network forensic techniques as well as the research challenges in network forensics. Furthermore, the paper discusses on the current research works on network forensics analysis. This research is useful to the research community of network forensics, for knowledge on existing research techniques, and direction on further research in network forensics.
APA, Harvard, Vancouver, ISO, and other styles
12

Asamoah, Jonas Takyi. "Exploring Lack of Due Diligence as a Threat to Forensic Analysis Preparation and Readiness." Advances in Multidisciplinary and scientific Research Journal Publication 1 (July 26, 2022): 307–14. http://dx.doi.org/10.22624/aims/crp-bk3-p49.

Full text
Abstract:
The usage of digital technology in the digital forensic investigation has grown in tandem with the rising importance of technology today. Too many incidences of digital and physical crime which is the focus of the world nowadays. To gather the finest evidence and investigative outcomes, a digital forensic model must be established. This study included a review of the literature on digital forensics and models established in digital forensics. According to the findings, the majority of research involves broad inquiries and procedures that overlap. Furthermore, no model has been developed to design a systemic inquiry. In this study, we propose a methodology for digital forensic examination to address this issue. This model combines several of the previous models and adds some new variables that are relevant to the study. Keywords: Due Diligence, Threats, Forensic Analysis, Preparation, Readiness, Cyber Security, BOOK Chapter ǀ Research Nexus in IT, Law, Cyber Security & Forensics. Open Access. Distributed Free Citation: Jonas Takyi Asamoah (2022): Exploring Lack of Due Diligence as a Threat to Forensic Analysis Preparation and Readiness Book Chapter Series on Research Nexus in IT, Law, Cyber Security & Forensics. Pp 307-314 www.isteams.net/ITlawbookchapter2022. dx.doi.org/10.22624/AIMS/CRP-BK3-P49
APA, Harvard, Vancouver, ISO, and other styles
13

AL-Hadi, Fatima Ismail, and Nagi Ali Al-Shaibany. "Digital Forensic Accounting: An Overview." International Journal of Computer Science and Mobile Computing 13, no. 8 (2024): 99–106. http://dx.doi.org/10.47760/ijcsmc.2024.v13i08.011.

Full text
Abstract:
Forensic analysis has become crucial for detecting financial crimes such as fraud, extortion, money laundering, and tax evasion in a rapidly evolving world. This type of analysis is also essential for promoting economic development and enhancing public trust in governments. As fraud strategies advance alongside rapid digital innovations, traditional forensic accounting relies on manual data examination and is increasingly inadequate for addressing sophisticated criminal fraud. The rise in cybercrime underscores digital forensics' need to conduct effective investigations. This study provides an overview of digital forensic accounting, emphasizing the need for forensic accountants to acquire digital forensic skills to conduct thorough investigations. It reviews previous research highlighting the importance of integrating digital technologies into forensic accounting, stressing that this convergence is crucial for enhancing the detection of financial crimes and cyber fraud. Furthermore, the study outlines the basic concepts of both traditional forensic accounting and digital forensics and presents some digital forensic accounting tools that can be utilized in forensic accounting and computer forensics.
APA, Harvard, Vancouver, ISO, and other styles
14

Alotaibi, Fahad Mazaed, Arafat Al-Dhaqm, Yasser D. Al-Otaibi, and Abdulrahman A. Alsewari. "A Comprehensive Collection and Analysis Model for the Drone Forensics Field." Sensors 22, no. 17 (2022): 6486. http://dx.doi.org/10.3390/s22176486.

Full text
Abstract:
Unmanned aerial vehicles (UAVs) are adaptable and rapid mobile boards that can be applied to several purposes, especially in smart cities. These involve traffic observation, environmental monitoring, and public safety. The need to realize effective drone forensic processes has mainly been reinforced by drone-based evidence. Drone-based evidence collection and preservation entails accumulating and collecting digital evidence from the drone of the victim for subsequent analysis and presentation. Digital evidence must, however, be collected and analyzed in a forensically sound manner using the appropriate collection and analysis methodologies and tools to preserve the integrity of the evidence. For this purpose, various collection and analysis models have been proposed for drone forensics based on the existing literature; several models are inclined towards specific scenarios and drone systems. As a result, the literature lacks a suitable and standardized drone-based collection and analysis model devoid of commonalities, which can solve future problems that may arise in the drone forensics field. Therefore, this paper has three contributions: (a) studies the machine learning existing in the literature in the context of handling drone data to discover criminal actions, (b) highlights the existing forensic models proposed for drone forensics, and (c) proposes a novel comprehensive collection and analysis forensic model (CCAFM) applicable to the drone forensics field using the design science research approach. The proposed CCAFM consists of three main processes: (1) acquisition and preservation, (2) reconstruction and analysis, and (3) post-investigation process. CCAFM contextually leverages the initially proposed models herein incorporated in this study. CCAFM allows digital forensic investigators to collect, protect, rebuild, and examine volatile and nonvolatile items from the suspected drone based on scientific forensic techniques. Therefore, it enables sharing of knowledge on drone forensic investigation among practitioners working in the forensics domain.
APA, Harvard, Vancouver, ISO, and other styles
15

Sangwan, Preeti, Tarsem Nain, Priyanka Yadav, and Neelkamal Sharma. "Molecular Approaches in Soil Microbial Analysis: Forensic Perspective." Biosciences Biotechnology Research Asia 20, no. 2 (2023): 367–79. http://dx.doi.org/10.13005/bbra/3096.

Full text
Abstract:
The growing field of soil microbial forensics provides the legal answer to how microorganisms play a crucial role in criminal investigations. It is an advanced crossdisciplinary science capable of offering significant physical evidence with considerable interest in criminal investigations, environmental crime, and counterterrorism. Microbial forensics of soil consists of different techniques to identify and evaluate microbial abundance, their complexity, and their interaction with soil and surrounding objects. The present review highlights various microbial analysis techniques such as Terminal restriction fragment length polymorphism, Temperature/Denaturing Gradient Gel Electrophoresis, Amplified Ribosomal DNA Restriction Analysis, Length Heterogeneity PCR, Phospholipid-derived fatty acids, Fluorescence in situ hybridization, Stable-isotope probing and metagenomics using nextgeneration sequencing. This article also summarises the challenges faced in soil microbial forensics, various statistical approaches, reference databases commonly used in forensic soil studies, and different methodological approaches used in forensic laboratories. Literature was studied using various online bibliographic databases like Google Scholar, Web of Science, Pub Med, Scopus, and several other search engines. Conclusive evidence generated by this paper signifies the importance of soil microbes to assist forensic scientists and researchers in selecting adequate methods to differentiate soil samples. The present comparative study concluded that targeted molecular analysis of microbes as a forensic soil typing tool has a lot of potential and should be investigated further.
APA, Harvard, Vancouver, ISO, and other styles
16

Ghanem, Mohamed Chahine, Eduardo Almeida Palmieri, Wiktor Sowinski-Mydlarz, Sahar Al-Sudani, and Dipo Dunsin. "Weaponized IoT: A Comprehensive Comparative Forensic Analysis of Hacker Raspberry Pi and PC Kali Linux Machine." IoT 6, no. 1 (2025): 18. https://doi.org/10.3390/iot6010018.

Full text
Abstract:
The proliferation of Internet of Things (IoT) devices presents significant challenges for cybersecurity and digital forensics, particularly as these devices have become increasingly weaponised for malicious activities. This research focuses on the forensic analysis capabilities of Raspberry Pi devices configured with Kali Linux, comparing their forensic capabilities to conventional PC-based forensic investigations. The study identifies key gaps in existing IoT forensic methodologies, including limited tool compatibility, constrained data retention, and difficulties in live memory analysis due to architectural differences. The research employs a testbed-based approach to simulate cyberattacks on both platforms, capturing and analysing forensic artefacts such as system logs, memory dumps, and network traffic. The research findings reveal that while traditional PCs offer extensive forensic capabilities due to superior storage, tool support, and system logging, Raspberry Pi devices present significant forensic challenges, primarily due to their ARM architecture and limited forensic readiness. The study emphasises the need for specialised forensic tools tailored to IoT environments and suggests best practices to enhance forensic investigation capabilities in weaponised IoT scenarios. This research contributes to the field by bridging the gap between theoretical frameworks and real-world forensic investigations, offering insights into the evolving landscape of IoT forensics and its implications for digital evidence collection, analysis, and forensic readiness.
APA, Harvard, Vancouver, ISO, and other styles
17

Sukamto, Pria, Ispandi, Arman Syah Putra, Nurul Aisyah, and Rohmat Toufiq. "Forensic Digital Analysis for CCTV Video Recording." International Journal of Science, Technology & Management 3, no. 1 (2022): 284–91. http://dx.doi.org/10.46729/ijstm.v3i1.460.

Full text
Abstract:
The background of this research is how to make a video that can be analyzed as forensic data to prove the truth of the video, therefore with forensics it can be used as evidence if the video contains incorrect data or contains data capable of crime so that it can be used as data forensics. The method used in this study is to use the literature review method which uses the basis of many previous studies. From journals and books based on similar research, so that it can help develop existing problems to the latest problems so that they can find novelty in this research. The problem raised in this research is how to make a video from a CCTV that can be proven, by certain methods in order to make the video as forensic data, that can be proven so that it can be developed into data containing crimes that can be used as evidence. The purpose of this study is how to find the right method in order to analyze a CCTV video, so that it can be used as evidence on forensic data with the NIST method, it can be proven that this method is the right method in analyzing a video, so that it can be used as evidence and as data forensics.
APA, Harvard, Vancouver, ISO, and other styles
18

Goc, Mieczysław, Piotr Jastrzębski, and Dorota Semków. "COMPARATOR – a Universal Application for Forensic Comparative Examinations and a Statistical Analysis of Sample Parameters." PRZEGLĄD POLICYJNY 150, no. 2 (2023): 246–71. http://dx.doi.org/10.5604/01.3001.0053.8542.

Full text
Abstract:
In recent years, both in Poland and abroad, computer analysis methods have been increasingly used in forensic examinations. The article presents the operation and functionality of the computer program called COMPARATOR which is a joint project of the Polish Forensic Associationand its Institute of Criminalistics. The COMPARATOR program is used for registration and presentation of images (samples) of handwriting, documents or their fragments as well as various types of forensic traces in 8 windows. The program allows of numerous useful operations in comparative and identification forensic analyses (including drawing, inversions, measurements, images overlay and matching). The application combines the advantages of graphic programs and spreadsheets - the user can directly perform statistical analyzes. It might also be used as a didactic aid for lecturers and speakers of diverse areas of expertise who want to present several images on the screen simultaneously in their lecturesEn los últimos años, los métodos de análisis informático se han utilizado cada vez más en las investigaciones forenses, tanto en Polonia como fuera del país. El presente artículo contiene una descripción del funcionamiento y las funciones del programa informático KOMPARATOR, que es un proyecto conjunto de la Asociación Forense de Polonia y el Instituto Forense Polaco PTK. El programa KOMPARATOR se utiliza para registrar y presentar en 8 ventanas escaneos (fotografías) de diversos tipos de objetos, verbigracia, firmas, registros textuales, documentos o sus fragmentos y otros rastros forenses (mecanoscópicos, rastros en casquillos y balas, traseológicos, antropológicos, etc.). El programa permite realizar una serie de operaciones útiles a la hora de realizar análisis forenses de identificación comparativa (por ejemplo, dibujar segmentos, ángulos, polígonos, inversiones, mediciones, superposición de imágenes y cotejo). La aplicación combina las ventajas de los programas gráficos y de las hojas de cálculo: permite realizar directamente análisis estadísticos. Asimismo, puede servir de ayuda pedagógica para conferenciantes y ponentes de diversas especialidades que deseen utilizar en sus clases la presentación en pantalla de varias imágenes simultáneamentePalabras clave: Komparator, estudios comparativos, módulo de edición, módulo de geometría, superposición y recorte de imágenes, estadísticas
APA, Harvard, Vancouver, ISO, and other styles
19

Hikmatyar, Firmansyah Gustav, and Bambang Sugiantoro. "Digital Forensic Analysis on Android Smartphones for Handling Cybercrime Cases." IJID (International Journal on Informatics for Development) 7, no. 2 (2019): 19. http://dx.doi.org/10.14421/ijid.2018.07204.

Full text
Abstract:
As the times progressed, forensic science has developed rapidly. The science of forensics extends to new areas of technology ranging from digital forensics, computer forensics and mobile forensics. Mobile forensics in analyzing and collecting data is obtained from various resources, such as operating systems, communication lines and also various storage media. The most popular mobile operating system of the day is a smartphone based on android operating system. With android technology, criminals can use that technology as a crime medium ranging from overriding crime ideas, crime targets and crime scenarios. In this Final Project use forensic mobile application to get data residing in cell phone actors, in the form of text, sound, picture and video that have or not yet deleted in smartphone. In this study, a model for investigating the crime scene is the author using the Generic Computer Forensic Investigation Model (GCFIM). On the GCFIM model the investigator may be able to return to the previous stage because of the possibility of a changeable situation (both physical and digital), the investigation tools used, the crime tools used, and the level of investigative expertise. In this research also added weighting method of word TF-IDF, where this method can help to find keyword in digital evidence in the form of word / text.
APA, Harvard, Vancouver, ISO, and other styles
20

Okan, Emmanuel Tettey. "Forensic Analysis on Streaming Multimedia." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 221–26. http://dx.doi.org/10.22624/aims/crp-bk3-p36.

Full text
Abstract:
Since the advent of technology and digitalization of multimedia, there has been a massive increase in cybercrime. During streaming, with the availability of a network or internet source, multimedia; audio and visual can easily be accessed whiles being aired live. This technology dates as far back as 1990s. Similar to still videos and images, the user is able to download, pause, reverse or forward the show. The ability to stream multimedia has made it easier for users to partake or retrieve multimedia from the comfort of their homes, offices or personal spaces without necessarily being present. However, there are several challenges that affect the functionality of this technology, slow network connection and cybercrime. The issue of slow network may easily be handled by network providers, but cybercrimes has become rampant over the years. These attackers, also known as cyber criminals, use various activities to attack data. Some of their activities include phishing, data breach, identity theft and harassment. The paper has been written to assess forensic analysis of streaming multimedia. While exploring existing studies, it was realized that despite the rich availability of digital image forensics, video forensics hasn’t been explored much. This is because of the difficulty involved in analyzing the video data. Video data is always presented in a compressed form, unlike still images that are obtained in their original state. The compressed data often cancels or totally compromises the existing fingerprints, hence making it difficult to monitor or recover data. It was also revealed that, much has not been done so far as the research area is concerned. Keywords: Mobile Forensics, Cybersecurity, Streaming, Media, Video, Networks BOOK Chapter ǀ Research Nexus in IT, Law, Cyber Security & Forensics. Open Access. Distributed Free Citation: Emmanuel Tettey Okan (2022): Forensic Analysis On Streaming Multimedia Book Chapter Series on Research Nexus in IT, Law, Cyber Security & Forensics. Pp 221-226 www.isteams.net/ITlawbookchapter2022. dx.doi.org/10.22624/AIMS/CRP-BK3-P36
APA, Harvard, Vancouver, ISO, and other styles
21

Dumchykov, M. "THE PROCESSES OF DIGITIZATION AND FORENSICS: A RETROSPECTIVE ANALYSIS." Criminalistics and Forensics, no. 65 (May 18, 2020): 100–108. http://dx.doi.org/10.33994/kndise.2020.65.10.

Full text
Abstract:
The article deals with some aspects of digitalization of forensic activity, such as improving the efficiency of search and cognitive activity of an investigator using digital technologies, and effective organization of such activity. Use of computer hardware, software, various computer and digital technologies and scripting to investigate crimes. The definitions of “digital trace” and “virtual trace” demonstrate the complexity of these issues. Certain dynamic movement of criminal activity in the information environment is analyzed. Defines the concept of virtual trace as a specific trace of certain actions in the information space of computer devices and their network systems. In considering the definition of the concept of virtual trace, the views of scientists such as V.A. Meshcheriakov, V.V. Poliakov and Smushkin A.V. The aspects of consideration of forensic digitization are identified, among which the main ones are: – use of digital technologies to increase the effectiveness of search and cognitive activity of the investigator, effective organization of this activity at the present level, optimization of interaction of different bodies, institutions in the investigation of crimes. – the use of information and communication technologies to investigate crimes. – solving didactic tasks in the field of training, retraining, advanced training of investigators, criminal investigators, forensic experts, improvement of their qualification, exchange of experience. The further question of the development of forensic science in the field of information society is investigated. It is determined in what form the information forensics will exist, namely: A new section of classic forensics that focuses on working with digital and virtual footprints. The new science of “digital or virtual forensics”. 3. Independent forensic science within the framework of the general theory of forensic science, which integrates the development of virtual traces, the use of new technical means of finding, fixing, research, use in proving forensically relevant information, technologies that ensure the effectiveness of the investigator.
APA, Harvard, Vancouver, ISO, and other styles
22

Vadlamudi, Divya, Dr K. Thirupathi Rao, Pellakuri Vidyullatha, and B. AjasekharReddy. "Analysis on digital forensics challenges and anti-forensics techniques in cloud computing." International Journal of Engineering & Technology 7, no. 2.7 (2018): 1072. http://dx.doi.org/10.14419/ijet.v7i2.7.12230.

Full text
Abstract:
In the modern life, there is a rapid increase in the usage of the technology. One reason of increasing the technology is usage of cloud. The mobile devices or any other technological devices mainly depend on cloud. The cloud can be accessible from anywhere. Cloud forensic process had introduced to help the investigators to find the evidence when the criminal attacks the cloud and to maintain the integrity and security for the data stored in the cloud. The increasing in the criminal attacks in cloud, made the investigators to find the latest methods for the forensic investigation process. Similarly in the same way the criminals also discover new ways to hide the source of evidences. This causes damage to the investigation process and is called anti-forensics. To hide the sources anti-forensic techniques are used and research must be done against the anti-forensics techniques in cloud environment. In this paper we focused mainly on detailed study on various challenges in cloud forensic and anti-forensic techniques.
APA, Harvard, Vancouver, ISO, and other styles
23

Faiz, Muhammad Nur, Rusydi Umar, and Anton Yudhana. "Implementasi Live Forensics untuk Perbandingan Browser pada Keamanan Email." JISKA (Jurnal Informatika Sunan Kalijaga) 1, no. 3 (2017): 108. http://dx.doi.org/10.14421/jiska.2017.13-02.

Full text
Abstract:
Digital Forensics become one popular term because Currently many violations of cyber crime. Digital techniques Computer Forensics performed or with analyze digital device, whether the device is a media Actors or as a media victim. Digital Forensic Analysis Being divided into two, traditional / dead and alive. Forensic analysis traditionally involves digital data Deposited permanent Operates in Irish, while live forensic analysis involves analysis of data Namely temporary in Random Access Memory or Deposited hearts transport equipment in the Network. Singer proposes journal Forensic analysis of life in the latest operation system windows 10. That study focused IN case several email security browsers Sales Operations manager of Google Chrome, Mozilla Firefox, and Microsoft Internet Explorer Edge. In addition, although many digital forensics type software applications not free, goal on research objectives compares browser security information so it will be more minimize abuse email.
APA, Harvard, Vancouver, ISO, and other styles
24

Sonali, Ekhande, Patil Uttam, and Vishwanath Kulhalli Kshama. "Review on effectiveness of deep learning approach in digital forensics." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 5 (2022): 5481–92. https://doi.org/10.11591/ijece.v12i5.pp5481-5492.

Full text
Abstract:
Cyber forensics is use of scientific methods for definite description of cybercrime activities. It deals with collecting, processing and interpreting digital evidence for cybercrime analysis. Cyber forensic analysis plays very important role in criminal investigations. Although lot of research has been done in cyber forensics, it is still expected to face new challenges in near future. Analysis of digital media specifically photographic images, audio and video recordings are very crucial in forensics This paper specifically focus on digital forensics. There are several methods for digital forensic analysis. Currently deep learning (DL), mainly convolutional neural network (CNN) has proved very promising in classification of digital images and sound analysis techniques. This paper presents a compendious study of recent research and methods in forensic areas based on CNN, with a view to guide the researchers working in this area. We first, defined and explained preliminary models of DL. In the next section, out of several DL models we have focused on CNN and its usage in areas of digital forensic. Finally, conclusion and future work are discussed. The review shows that CNN has proved good in most of the forensic domains and still promise to be bette
APA, Harvard, Vancouver, ISO, and other styles
25

Amparbeng, Maxwell. "Inaccessibility of Services as a Threat to Forensic Analysis." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 29–34. http://dx.doi.org/10.22624/aims/crp-bk3-p5.

Full text
Abstract:
Computer and Internet-based crimes are widespread problems that affect a vast number of individuals. Combating such criminals has become a difficult task for competent authorities, as it has enabled a new wave of criminal activity. This phenomenon has drew the attention of security and justice systems all over the world, and these institutions must now deal with the task of reforming and redefining the laws and methodologies used to investigate computer-related criminal activity (Garfinkel, 2010). On the other hand cybercriminals are also making use of existing technologies or systems and new means or techniques to make cybercrime detection, investigation and prevention very difficult. The paper will look at anti-forensics strategies such as data concealment, artefact erasure, trail obfuscation, and attacks on the forensic instruments themselves. Investigators must deal with anti-forensics approaches on a regular basis as digital forensics becomes more significant in current investigations. This article will explore the challenges that investigators and forensic practitioners face when conducting investigations. Keywords: Digital Forensics, Cloud Computing, Cloud Service Provider, Full Disk Encryption
APA, Harvard, Vancouver, ISO, and other styles
26

Kroz, M. V., and N. A. Ratinova. "History and Current State of Forensic Analysis of Extremist Materials." Theory and Practice of Forensic Science, no. 3(43) (September 30, 2016): 146–54. http://dx.doi.org/10.30764/64/1819-2785-2016-3-146-154.

Full text
Abstract:
The paper looks at the history and current state of forensic analysis of the content and intentionality of contentious (extremist) materials. It discusses different approaches based in linguistics, psychology, and social sciences/humanities, as well as issues relating to integrated forensic psycholinguistic analysis. Techniques and methodological recommendations described in the paper were developed by the experts of the Research Institute for Law and Order of the Prosecutor General's Office of the Russian Federation, various national forensic organizations, such as the Russian Federal Center of Forensic Science of the Ministry of Justice of the Russian Federation, the Forensic Science Center of the Ministry of Internal Affairs of the Russian Federation, forensic divisions of the Federal Security Service of the Russian Federation, and members of the scientific community. Generic methodologies (linguistic and psycholinguistic) proposed by government agency specialists for the forensic evaluation of extremism manifestations are discussed, including the level of methodological sophistication, and the problem of methodological harmonization in this field of forensics.
APA, Harvard, Vancouver, ISO, and other styles
27

Alotaibi, Fahad Mazaed, Arafat Al-Dhaqm, and Yasser D. Al-Otaibi. "A Novel Forensic Readiness Framework Applicable to the Drone Forensics Field." Computational Intelligence and Neuroscience 2022 (February 28, 2022): 1–13. http://dx.doi.org/10.1155/2022/8002963.

Full text
Abstract:
The Drone Forensics (DRFs) field is a branch of digital forensics, which involves the identification, capture, preservation, reconstruction, analysis, and documentation of drone incidents. Several models have been proposed in the literature for the DRF field, which generally discusses DRF from a reactive forensic perspective; however, the proactive forensic perspective is missing. Therefore, this paper proposes a novel forensic readiness framework called Drone Forensics Readiness Framework (DRFRF) using the design science method. It consists of two stages: (i) proactive forensic stage and (ii) reactive forensic stage. It considers centralized logging of all events of all the applicants within the drone device in preparation for an examination. It will speed up gathering data when an investigation is needed, permitting the forensic investigators to handle the examination and analysis directly. Additionally, digital forensics analysts can increase the possible use of digital evidence while decreasing the charge of performing forensic readiness. Thus, both the time and cost required to perform forensic readiness could be saved. The completeness, logicalness, and usefulness of DRFRF were compared to those of other models already existing in the DRF domain. The results showed the novelty and efficiency of DRFRF and its applicability to the situations before and after drone incidents.
APA, Harvard, Vancouver, ISO, and other styles
28

Ekhande, Sonali, Uttam Patil, and Kshama Vishwanath Kulhalli. "Review on effectiveness of deep learning approach in digital forensics." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 5 (2022): 5481. http://dx.doi.org/10.11591/ijece.v12i5.pp5481-5592.

Full text
Abstract:
<p><span>Cyber forensics is use of scientific methods for definite description of cybercrime activities. It deals with collecting, processing and interpreting digital evidence for cybercrime analysis. Cyber forensic analysis plays very important role in criminal investigations. Although lot of research has been done in cyber forensics, it is still expected to face new challenges in near future. Analysis of digital media specifically photographic images, audio and video recordings are very crucial in forensics This paper specifically focus on digital forensics. There are several methods for digital forensic analysis. Currently deep learning (DL), mainly convolutional neural network (CNN) has proved very promising in classification of digital images and sound analysis techniques. This paper presents a compendious study of recent research and methods in forensic areas based on CNN, with a view to guide the researchers working in this area. We first, defined and explained preliminary models of DL. In the next section, out of several DL models we have focused on CNN and its usage in areas of digital forensic. Finally, conclusion and future work are discussed. The review shows that CNN has proved good in most of the forensic domains and still promise to be better.</span></p>
APA, Harvard, Vancouver, ISO, and other styles
29

Saragih, Naikson, Ridho Agus Wery Nanda Panjaitan, and Mufria Jonatan Purba. "FORENSIC NETWORK ANALYSIS AND IMPLEMENTATION OF SECURITY ATTACKS ON VIRTUAL PRIVATE SERVERS." Jurnal Sistem Informasi dan Ilmu Komputer Prima(JUSIKOM PRIMA) 6, no. 2 (2023): 28–34. http://dx.doi.org/10.34012/jurnalsisteminformasidanilmukomputer.v6i2.2932.

Full text
Abstract:
ABSTRACT-PT Kodinglab Integrasi Indonesia's Virtual Private Server (VPS) product requires good quality standards, including security. The challenge that arises is still frequent disruptions to the protection of PT Kodinglab's VPS customers, where it is difficult to identify the source of the attack. Network forensics in the form of dead forensics and live forensics using the NIST method with the stages of collection, examination, Analysis, and reporting are used to find the source of the attack. Data for dead forensics comes from snort tools, and data for live forensics comes from capture Wireshark. The collection stage involves collecting attack data from snort logs and wireshark for life forensics. While the examination dataset stages are further analyzed and mapped. Advanced check on the server via syslog snort. From the attack testing carried out to obtain information in the form of the attacker's IP address, destination IP address, date of the attack, server time, and type of attack from testing the TCP Flooding and UDP Flooding attacks, all attacks on the customer's VPS can be identified. The information obtained regarding the attacker is in the form of the date and time the attack occurred, the attacker's IP address and the victim's IP address, and the protocol used. Kata kunci : Network Forensic, Dead Forensic, Live Forensic, Virtual Private Server, DDos, TCP Flooding, UDP Flooding.
APA, Harvard, Vancouver, ISO, and other styles
30

Mualfah, Desti, and Rizdqi Akbar Ramadhan. "Analisis Forensik Metadata Kamera CCTV Sebagai Alat Bukti Digital." Digital Zone: Jurnal Teknologi Informasi dan Komunikasi 11, no. 2 (2020): 257–67. http://dx.doi.org/10.31849/digitalzone.v11i2.5174.

Full text
Abstract:
Kejahatan konvensial yang terekam kamera CCTV (Closed Circuit Televison) semakin banyak ditemukan di masyarakat, setiap pelaku kejahatan yang terbukti melakukan tindak pidana tertentu akan dihukum sesuai dengan peraturan perundang-undangan. Kamera CCTV memiliki peran penting dalam keamanan, banyak diantaranya hasil tangkapan rekaman kamera CCTV dijadikan sebagai alat bukti digital. Tantangannya adalah bagaimana teknik yang diperlukan untuk penanganan khusus investigasi digital forensik dalam mencari bukti ditgital rekaman kamera CCTV menggunakan metode live forensik, yaitu ketika barang bukti dalam keadan aktif berdasarkan pedoman SNI 27037:2014 sesuai acuan kerangka kerja Common Phases of Computer Forensics Investigation Models untuk di implementasikan ke dalam dokumen Chain of Custody. Hasil penelitian ini berupa hasil analisis video rekaman kamera CCTV tentang karakteristik bukti digital dan informasi metadata yang digunakan untuk memberikan penjelasan komprehensif secara terstruktur serta acuan pengelolaan informasi data yang didapat dari hasil investigasi digital forensik yang dapat dipertanggungjawabkan dalam persidangan.
 
 Kata kunci: Bukti Digital, Live Forensik, Metadata, Kamera CCTV, Chain of Custody.
 
 Abstract
 Conventional crimes that are recorded on CCTV (Closed Circuit Television) cameras are increasingly being found in society, every crime that commits certain crimes will be in accordance with statutory regulations. CCTV cameras have an important role in security, many of which are recorded by CCTV cameras used as digital evidence. The challenge is how the techniques required for special handling, digital forensics in searching for digital evidence of CCTV camera footage using the live forensic method, namely when the evidence is in an active state based on the latest SNI 27037: 2014 according to the framework reference Common Phases of Computer Forensics Investigation Models for in implement it into the Chain of Custody document. These results of this research are in the form of analysis of CCTV camera video recordings about the characteristics of digital evidence and metadata information used to provide a structured comprehensive explanation and reference data management information obtained from the results of digital forensic investigations that can be accounted for in court. 
 Keywords: Digital Evidence, Live Forensic, Metadata, CCTV Camera, Chain of Custady.
APA, Harvard, Vancouver, ISO, and other styles
31

Syed Khurram Hassan and Hafiza Hadia Shehzad. "The Nanoforensic: An Advanced Perspective in Crime Investigation." International Journal for Electronic Crime Investigation 7, no. 1 (2023): 33–38. http://dx.doi.org/10.54692/ijeci.2023.0701126.

Full text
Abstract:
Nano forensics is the advanced application of nanotechnology-based techniques to resolve cases in forensic science. Forensic science offers scientific methods in a criminal investigation. Nano-forensics deals with the development of new approaches for fingerprint visualization, DNA isolation, forensic toxicology, explosive detection, identification of body fluids, gunshot residue analysis, detection of illicit drugs, etc. The nanomaterials used in forensic science are nanocrystals, nanoparticles, quantum dots, nanobelts, nanocomposites, nanoclusters, nanotubes, nanorods, etc. The scope of nanotechnology is very wide.
APA, Harvard, Vancouver, ISO, and other styles
32

Hamed, Abdul Sallam Said. "Digital Forensic: Techniques, Challenges, and Future Direction." International Journal for Research in Applied Science and Engineering Technology 13, no. 5 (2025): 5869–73. https://doi.org/10.22214/ijraset.2025.71562.

Full text
Abstract:
Digital forensics is now a crucial field of study in cybersecurity and criminal investigation, which helps identify, analyze, and preserve digital evidence. This systematic literature review discusses the current techniques, challenges, and future directions of research in digital forensics. Contemporary forensic techniques include disk forensics, network forensics, memory forensics, and cloud forensics, with the help of artificial intelligence (AI) and machine learning (ML) to improve evidence identification and analysis. Yet, digital forensics is confronted by various challenges, such as the quick development of technology, encryption intricacies, anti-forensic methods, and the volatility of digital data. Growing reliance on cloud computing, Internet of Things (IoT) devices, and encrypted communication channels only makes forensic examinations more challenging. Also, issues of legal and ethical considerations, like jurisdictional disputes and privacy, hinder the efficacy of forensic procedures. Future research will have to address the development of sophisticated automation methods, trans-border legal instruments, and AI-based forensic software for processing massive amounts of data. Blockchain-based technology for maintaining evidence integrity and normalized forensic processes in jurisdictions can further improve investigation effectiveness. The findings of this study emphasize the imperative of ongoing innovation and convergence among academia, law enforcement agencies, and technology providers to solve evolving digital forensic challenges.
APA, Harvard, Vancouver, ISO, and other styles
33

Bhatia, Manjot Kaur, Palak Gambhir, Shefali Sinha, and Saksham Kumar Singh. "A Comparative Analysis of OS Forensics Tools." International Journal for Research in Applied Science and Engineering Technology 10, no. 11 (2022): 494–502. http://dx.doi.org/10.22214/ijraset.2022.47346.

Full text
Abstract:
Abstract: The internet is expanding at a breakneck pace, as the number of crimes perpetrated using or against computers. The area of computer forensics has arisen in reaction to the rise of computer crime. Computer forensics is the meticulous collection and examination of electronic evidence that not only analyses the damage to a computer because of an electronic attack but also recovers lost data from such a system to convict a criminal. As a result, the standard forensic process that is required after an electronic attack involves collecting evidence from a computer system, analyzing, and presentation of the collected evidence in court. Forensics deals primarily with the recovery and analysis of latent evidence. The growth of digital forensics has substantially increased the requirement for effective tools. There are several tools available today which are used to investigate the OS of a given computer. The purpose of this paper is to compare OS forensics tools by evaluating their ease of use, functionality, performance, and product support and documentation. This research will provide a brief comparative analysis of two widely used OS forensic tools-OSForensics and autopsy based on various contradictory factors.
APA, Harvard, Vancouver, ISO, and other styles
34

Soni, Nishchal. "IoT forensics: Challenges, methodologies, and future directions in securing the Internet of Things ecosystem." Computer and Telecommunication Engineering 2, no. 4 (2024): 3070. https://doi.org/10.54517/cte3070.

Full text
Abstract:
<p>The rapid growth of the Internet of Things (IoT) has significantly impacted digital forensics, introducing both new opportunities and challenges. IoT forensics, a specialized field within digital forensics, focuses on the acquisition, analysis, and interpretation of data from diverse IoT devices such as smart home systems, wearables, and industrial platforms. This review examines the current state of IoT forensics, highlighting challenges such as device diversity, data volatility, encryption, and the need for real-time analysis. It also evaluates existing forensic methodologies and tools, assessing their effectiveness and limitations in addressing these challenges. Furthermore, the paper identifies critical research gaps and proposes future directions, including the development of standardized forensic frameworks and greater collaboration between IoT manufacturers and forensic experts. The aim is to advance IoT forensic practices to keep pace with rapidly evolving IoT technologies, thereby enhancing the investigation and prosecution of cybercrimes.</p>
APA, Harvard, Vancouver, ISO, and other styles
35

Morić, Zlatan, Vedran Dakić, Ana Kapulica, and Damir Regvart. "Forensic Investigation Capabilities of Microsoft Azure: A Comprehensive Analysis and Its Significance in Advancing Cloud Cyber Forensics." Electronics 13, no. 22 (2024): 4546. http://dx.doi.org/10.3390/electronics13224546.

Full text
Abstract:
This article delves into Microsoft Azure’s cyber forensic capabilities, focusing on the unique challenges in cloud security incident investigation. Cloud services are growing in popularity, and Azure’s shared responsibility model, multi-tenant nature, and dynamically scalable resources offer unique advantages and complexities for digital forensics. These factors complicate forensic evidence collection, preservation, and analysis. Data collection, logging, and virtual machine analysis are covered, considering physical infrastructure restrictions and cloud data transience. It evaluates Azure-native and third-party forensic tools and recommends methods that ensure effective investigations while adhering to legal and regulatory standards. It also describes how AI and machine learning automate data analysis in forensic investigations, improving speed and accuracy. This integration advances cyber forensic methods and sets new standards for future innovations. Unified Audit Logs (UALs) in Azure are examined, focusing on how Azure Data Explorer and Kusto Query Language (KQL) can effectively parse and query large datasets and unstructured data to detect sophisticated cyber threats. The findings provide a framework for other organizations to improve forensic analysis, advancing cloud cyber forensics while bridging theoretical practices and practical applications, enhancing organizations’ ability to combat increasingly sophisticated cybercrime.
APA, Harvard, Vancouver, ISO, and other styles
36

Sharma, Sandeep Kumar, and Mazhar Khaliq. "Design and development of software quality forensics framework and model." Multidisciplinary Science Journal 6, no. 7 (2024): 2024111. http://dx.doi.org/10.31893/multiscience.2024111.

Full text
Abstract:
The illicit activist tampers the software for malcious purposes. The process of forensics examining and gathering evidence for software accused in forensic laboratories presents challenges in terms of software quality. Therefore, it is crucial to design and develop a framework, model, and dedicated standards for the forensic analysis of software quality. These resources can be employed for investigations, legal proceedings, as well as establishing criteria and standards for both past and present scenarios. The aim of the research work is to design a software-quality forensics framework for forensic investigation to the quality of software. The research primarily concentrates on developing a model for software quality assessment and identifying the pertinent existing standards through the conceptual framework of software quality forensics. The implementation of software quality forensics has improved the efficiency and effectiveness in investigating and managing incidents related to software quality. The proposed framework for software quality forensics allows for the evaluation and assessment of quality issues within specific software systems. To complement the software quality forensic framework, a comparative analysis has been conducted between existing software quality models and the proposed software quality forensic model.
APA, Harvard, Vancouver, ISO, and other styles
37

Hakim, Muhamad Faishol, and Alamsyah Alamsyah. "Development of Digital Forensic Framework for Anti-Forensic and Profiling Using Open Source Intelligence in Cyber Crime Investigation." Recursive Journal of Informatics 2, no. 2 (2024): 114–23. http://dx.doi.org/10.15294/rji.v2i2.73731.

Full text
Abstract:
Abstract. Cybercrime is a crime that increases every year. The development of cyber crime occurs by utilizing mobile devices such as smartphones. So it is necessary to have a scientific discipline that studies and handles cybercrime activities. Digital forensics is one of the disciplines that can be utilized in dealing with cyber crimes. One branch of digital forensic science is mobile forensics which studies forensic processes on mobile devices. However, in its development, cybercriminals also apply various techniques used to thwart the forensic investigation process. The technique used is called anti-forensics. Purpose: It is necessary to have a process or framework that can be used as a reference in handling cybercrime cases in the forensic process. This research will modify the digital forensic investigation process. The stages of digital forensic investigations carried out consist of preparation, preservation, acquisition, examination, analysis, reporting, and presentation stages. The addition of the use of Open Source Intelligence (OSINT) and toolset centralization at the analysis stage is carried out to handle anti-forensics and add information from digital evidence that has been obtained in the previous stage. Methods/Study design/approach: This research will modify the digital forensic investigation process. The stages of digital forensic investigations carried out consist of preparation, preservation, acquisition, examination, analysis, reporting, and presentation stages. The addition of the use of Open Source Intelligence (OSINT) and toolset centralization at the analysis stage is carried out to handle anti-forensics and add information from digital evidence that has been obtained in the previous stage. By testing the scenario data, the results are obtained in the form of processing additional information from the files obtained and information related to user names. Result/Findings: The result is a digital forensic phase which concern on anti-forensic identification on media files and utilizing OSINT to perform crime suspect profiling based on the evidence collected in digital forensic investigation phase. Novelty/Originality/Value: Found 3 new types of findings in the form of string data, one of which is a link, and 7 new types in the form of usernames which were not found in the use of digital forensic tools. From a total of 408 initial data and new findings with a total of 10 findings, the percentage of findings increased by 2.45%.
APA, Harvard, Vancouver, ISO, and other styles
38

Chandran, Rahul, and Wei Q. Yan. "Attack Graph Analysis for Network Anti-Forensics." International Journal of Digital Crime and Forensics 6, no. 1 (2014): 28–50. http://dx.doi.org/10.4018/ijdcf.2014010103.

Full text
Abstract:
The development of technology in computer networks has boosted the percentage of cyber-attacks today. Hackers are now able to penetrate even the strongest IDS and firewalls. With the help of anti-forensic techniques, attackers defend themselves, from being tracked by destroying and distorting evidences. To detect and prevent network attacks, the main modus of operandi in network forensics is the successful implementation and analysis of attack graph from gathered evidences. This paper conveys the main concepts of attack graphs, requirements for modeling and implementation of graphs. It also contributes the aspect of incorporation of anti-forensic techniques in attack graph which will help in analysis of the diverse possibilities of attack path deviations and thus aids in recommendation of various defense strategies for better security. To the best of our knowledge, this is the first time network anti-forensics has been fully discussed and the attack graphs are employed to analyze the network attacks. The experimental analysis of anti-forensic techniques using attack graphs were conducted in the proposed test-bed which helped to evaluate the model proposed and suggests preventive measures for the improvement of security of the networks.
APA, Harvard, Vancouver, ISO, and other styles
39

Hammond, Roselyn Abena Terbie. "Smartphone RSS Traces For Forensic Analysis." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 227–32. http://dx.doi.org/10.22624/aims/crp-bk3-p37.

Full text
Abstract:
This paper’s topic is on Smartphone RSS traces for Forensic analysis; RSS represents Really Simple Syndication whereas smartphone RSS traces refers to a small software program that collects and displays RSS feeds. It allows you to scan headlines from a number of news sources in a central location and has the ability to suggest information of interest to you based on the criteria of your search. RSS feed has been in existence for many years but has never been as widely used as it is today, the term syndication refers to publishing information on the Internet that can be used by other sites as well as by stand-alone reader applications. The introduction of blogs hyped content syndication before, the syndicated content, known as feeds, was typically found on news sites only. Once blogs began proliferating on the Internet, content started being shared left and right, and users began using readers and aggregators to track their favorite blogs. In addition, those who subscribe to podcasts are actually using technology built on RSS. Whether providing a feed for a blog, providing a feed of changes for some software you may be writing, or doing your own podcast, the applications for content syndication are almost endless, and its usage is growing at a phenomenal rate every day.” Robert Richards, January 2006- Article on “RSS feed and content Syndication”. Forensically, Smartphone RSS feed gives the forensic examiner a fair idea about the conception of the individual whose phone contains the analyzed feed. This is because the feed usually contains information of interest to the user which helps you think like the user in order to get the needed information you are looking for. This paper will also identify gaps with smartphone RSS feed users and suggest solutions/recommendations to mitigate them in order to be safe even after subscribing to certain RSS feeds. Keywords: RSS, Forensics, Syndication, Tracing, Cybersecurity, Feeds BOOK Chapter ǀ Research Nexus in IT, Law, Cyber Security & Forensics. Open Access. Distributed Free Citation: Roselyn Abena Terbie Hammond (2022): Smartphone RSS Traces For Forensic Analysis Book Chapter Series on Research Nexus in IT, Law, Cyber Security & Forensics. Pp 227-232 www.isteams.net/ITlawbookchapter2022. dx.doi.org/
APA, Harvard, Vancouver, ISO, and other styles
40

Haryanto, Eri, and Imam Riadi. "Forensik Internet Of Things pada Device Level berbasis Embedded System." Jurnal Teknologi Informasi dan Ilmu Komputer 6, no. 6 (2019): 703. http://dx.doi.org/10.25126/jtiik.2019661828.

Full text
Abstract:
<p>Perangkat Internet of Things (IoT) merupakan perangkat cerdas yang memiliki interkoneksi dengan jaringan internet global. Investigasi kasus yang menyangkut perangkat IoT akan menjadi tantangan tersendiri bagi investigator forensik. Keberagaman jenis perangkat dan teknologi akan memunculkan tantangan baru bagi investigator forensik. Dalam penelitian ini dititikberatkan forensik di level internal device perangkat IoT. Belum banyak bahkan belum penulis temukan penelitian sejenis yang fokus dalam analisis forensik perangkat IoT pada level device. Penelitian yang sudah dilakukan sebelumnya lebih banyak pada level jaringan dan level cloud server perangkat IoT. Pada penelitian ini dibangun environment perangkat IoT berupa prototype smart home sebagai media penelitian dan kajian tentang forensik level device. Pada penelitian ini digunakan analisis model forensik yang meliputi collection, examination, analysis, dan reporting dalam investigasi forensik untuk menemukan bukti digital. Penelitian ini berhasil mengungkap benar-benar ada serangan berupa injeksi malware terhadap perangkat IoT yang memiliki sistem operasi Raspbian, Fedberry dan Ubuntu Mate. Pengungkapan fakta kasus mengalami kesulitan pada perangkat IoT yang memiliki sistem operasi Kali Linux. Ditemukan 1 IP Address komputer penyerang yang diduga kuat menanamkan malware dan mengganggu sistem kerja perangkat IoT.</p><p><em><strong>Abstract</strong></em></p><p class="Abstract"><em>The Internet of Things (IoT) is an smart device that has interconnection with global internet networks. Investigating cases involving IoT devices will be a challenge for forensic investigators. The diversity of types of equipment and technology will create new challenges for forensic investigators. In this study focused on forensics at the IoT device's internal device level, there have not been many similar research that focuses on forensic analysis of IoT devices at the device level. Previous research has been done more at the network level and cloud level of IoT device's. In this study an IoT environment was built a smart home prototype as a object for research and studies on forensic level devices. This study, using forensic model analysis which includes collection, examination, analysis, and reporting in finding digital evidence. This study successfully revealed that there was really an attack in the form of malware injection against IoT devices that have Raspbian, Fedberry and Ubuntu Mate operating systems. Disclosure of the fact that the case has difficulties with IoT devices that have the Kali Linux operating system. Found 1 IP Address of an attacker's computer that is allegedly strongly infusing malware and interfering with the work system of IoT devices.</em></p><p><em><strong><br /></strong></em></p>
APA, Harvard, Vancouver, ISO, and other styles
41

Sheldon, Andrew. "Forensic analysis." Infosecurity 4, no. 8 (2007): 17. http://dx.doi.org/10.1016/s1754-4548(07)70196-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Ballou, Susan, John Goodpaster, William MacCrehan, and Dennis Reeder. "Forensic analysis." Analytical and Bioanalytical Chemistry 376, no. 8 (2003): 1149–50. http://dx.doi.org/10.1007/s00216-003-2068-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Lloyd, J. B. F., and J. G. Sutton. "Forensic analysis." Analytical Proceedings 24, no. 8 (1987): 239. http://dx.doi.org/10.1039/ap9872400239.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Mikayla, Halimah Septya, Ari Kusyanti, and Primantara Hari Trisnawan. "Analisis Forensik Digital untuk Investigasi Kasus Cyberbullying pada Media Sosial Tiktok." Jurnal Teknologi Informasi dan Ilmu Komputer 10, no. 7 (2023): 1571–82. http://dx.doi.org/10.25126/jtiik.1078017.

Full text
Abstract:
TikTok merupakan media sosial yang populer digunakan pada masa kini. Media sosial TikTok yang populer di kalangan pengguna menjadi salah satu media yang banyak ditemui jenis kejahatan siber cyberbullying. Kasus cyberbullying pada media sosial TikTok dapat ditindak secara hukum yakni dengan dilakukan investigasi forensik digital. Penelitian ini dilakukan untuk mengumpulkan dan menganalisis bukti digital kasus cyberbullying pada TikTok android dan juga TikTok web dengan melakukan skenario kasus serta menerapkan model investigasi forensik digital yang berfokus pada jejaring sosial. Fase skenario terdiri dari persiapan, perancangan, serta pelaksanaan. Data dari skenario ini kemudian dilakukan forensik digital fase dengan tahapan-tahapan berikut: planning, reconnaissance, collection, transport, examination, identification, analysis, classification, reporting, dan presentation. Penelitian ini berhasil mendapatkan bukti-bukti digital untuk membuktikan kasus cyberbullying yang dieksperimenkan dengan skenario serta dengan model investigasi forensik digital yang diterapkan. Didapatkan hasil perbandingan yang signifikan pada perbedaan antara bukti digital TikTok android dan TikTok web. Secara keseluruhan, penelitian ini berhasil memperoleh barang bukti digital dengan persentase sebesar 68,8% dari perbandingan data awal skenario dengan data ditemukan dari hasil forensik digital. Abstract TikTok is currently a widely popular social media platform among users and is also a media where various forms of cyberbullying are encountered. Cases of cyberbullying on TikTok can be subject to legal prosecution through digital forensic investigations. This research aims to collect and analyze digital evidence related to cyberbullying cases on TikTok's Android and Website platforms. It involves the creation of case scenarios and the application of a digital forensic investigative model specifically focused on social networks. The scenario phase encompasses preparation, design, and implementation. Data obtained from these scenarios is subsequently subjected to a digital forensics phase, consisting of these stages: planning, reconnaissance, collection, transport, examination, identification, analysis, classification, reporting, and presentation. This research successfully obtained digital evidence that substantiates cases of cyberbullying, as simulated in the scenarios and investigated using the applied digital forensic model. Significant differences were observed in the digital evidence between TikTok on Android and TikTok on the web. In summary, this study achieved a 68.8% match between the initial scenario data and the data retrieved through digital forensics, ultimately obtaining valuable digital evidence.
APA, Harvard, Vancouver, ISO, and other styles
45

Mikayla, Halimah Septya, Ari Kusyanti, and Primantara Hari Trisnawan. "Analisis Forensik Digital untuk Investigasi Kasus Cyberbullying pada Media Sosial Tiktok." Jurnal Teknologi Informasi dan Ilmu Komputer 11, no. 5 (2024): 1113–24. https://doi.org/10.25126/jtiik.2024118017.

Full text
Abstract:
TikTok merupakan media sosial yang populer digunakan pada masa kini. Media sosial TikTok yang populer di kalangan pengguna menjadi salah satu media yang banyak ditemui jenis kejahatan siber cyberbullying. Kasus cyberbullying pada media sosial TikTok dapat ditindak secara hukum yakni dengan dilakukan investigasi forensik digital. Penelitian ini dilakukan untuk mengumpulkan dan menganalisis bukti digital kasus cyberbullying pada TikTok android dan juga TikTok web dengan melakukan skenario kasus serta menerapkan model investigasi forensik digital yang berfokus pada jejaring sosial. Fase skenario terdiri dari persiapan, perancangan, serta pelaksanaan. Data dari skenario ini kemudian dilakukan forensik digital fase dengan tahapan-tahapan berikut: planning, reconnaissance, collection, transport, examination, identification, analysis, classification, reporting, dan presentation. Penelitian ini berhasil mendapatkan bukti-bukti digital untuk membuktikan kasus cyberbullying yang dieksperimenkan dengan skenario serta dengan model investigasi forensik digital yang diterapkan. Didapatkan hasil perbandingan yang signifikan pada perbedaan antara bukti digital TikTok android dan TikTok web. Secara keseluruhan, penelitian ini berhasil memperoleh barang bukti digital dengan persentase sebesar 68,8% dari perbandingan data awal skenario dengan data ditemukan dari hasil forensik digital. Abstract TikTok is currently a widely popular social media platform among users and is also a media where various forms of cyberbullying are encountered. Cases of cyberbullying on TikTok can be subject to legal prosecution through digital forensic investigations. This research aims to collect and analyze digital evidence related to cyberbullying cases on TikTok's Android and Website platforms. It involves the creation of case scenarios and the application of a digital forensic investigative model specifically focused on social networks. The scenario phase encompasses preparation, design, and implementation. Data obtained from these scenarios is subsequently subjected to a digital forensics phase, consisting of these stages: planning, reconnaissance, collection, transport, examination, identification, analysis, classification, reporting, and presentation. This research successfully obtained digital evidence that substantiates cases of cyberbullying, as simulated in the scenarios and investigated using the applied digital forensic model. Significant differences were observed in the digital evidence between TikTok on Android and TikTok on the web. In summary, this study achieved a 68.8% match between the initial scenario data and the data retrieved through digital forensics, ultimately obtaining valuable digital evidence.
APA, Harvard, Vancouver, ISO, and other styles
46

Badger, Eric Sowah. "Liabilities of Shared System in Forensic Analysis." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 191–96. http://dx.doi.org/10.22624/aims/crp-bk3-p31.

Full text
Abstract:
In today’s connected world, there is a tendency for connectivity even in the sectors which conventionally have been not so connected in the past, such as power systems substations. Substations have seen considerable digitalization of the grid hence, providing much more available insights than before. This has all been possible due to connectivity, digitalization, and automation of the power grids. Interestingly, this also means that anybody can access such critical infrastructures from a remote location, and gone are the days of physical barriers. The power of connectivity and control makes it a much more challenging task to protect critical industrial control systems. This capability comes at a price, in this case, increasing the liabilities and risk of potential cyber threats to substations. (ASIF, FARHAN , & EKSTEDT) Keywords: Digital Evidence Backlog, Digital Forensic Challenges BOOK Chapter ǀ Research Nexus in IT, Law, Cyber Security & Forensics. Open Access. Distributed Free Citation: Eric Sowah Badger (2022): Liabilities of Shared System in Forensic Analysis Book Chapter Series on Research Nexus in IT, Law, Cyber Security & Forensics. Pp 191-196 www.isteams.net/ITlawbookchapter2022. dx.doi.org/10.22624/AIMS/CRP-BK3-P31
APA, Harvard, Vancouver, ISO, and other styles
47

Alansari, Iman S. "A Detection and Investigation Model for the Capture and Analysis of Network Crimes." Engineering, Technology & Applied Science Research 13, no. 5 (2023): 11871–77. http://dx.doi.org/10.48084/etasr.6316.

Full text
Abstract:
Investigation in the field of network forensics involves examining network traffic to identify, capture, preserve, reconstruct, analyze, and document network crimes. Although there are different perspectives on the practical and technical aspects of network forensics, there is still a lack of fundamental guidelines. This paper proposes a new detection and investigation model for capturing and analyzing network crimes, using design science research. The proposed model involves six processes: identification, verification, gathering, preservation, examination, analysis, and documentation. Each process is associated with several activities that provide the investigation team with a clear picture of exactly what needs to be performed. In addition, the proposed model has a unique activity, namely reporting. As a result, this model represents a comprehensive approach to network forensics investigations. It is designed to work in conjunction with established forensic techniques to ensure that forensic evidence from the network is collected and analyzed efficiently and effectively following accepted forensic procedures. The proposed model was compared with existing models in terms of completeness, showing that it is complete and can be adapted to any type of network and legal framework.
APA, Harvard, Vancouver, ISO, and other styles
48

Savenko, A. S. "Formation of Intellectual Property Forensics in the System of the Russian Ministry of Justice." Theory and Practice of Forensic Science 15, no. 3 (2020): 98–105. http://dx.doi.org/10.30764/1819-2785-2020-3-98-105.

Full text
Abstract:
The article analyses legal regulations of a forensic investigation into intellectual property o jects regarding the appointment of examinations of trademarks and service marks. The matter of necessity of specialized knowledge to conduct such investigations is addressed as well as current expert and judicial practice in this field. The author notes that forensic analysis of trade and service marks should be carried out as a part of a comprehensive examination in complex cases. The investigation should also include a sociological study.It is shown that the training of state forensic experts in the Russian Ministry of Justice system for intellectual property forensics, among other things to assess its value, will provide fully competent, unbiased, and independent experts and specialists in the field. The author proposes acknowledging and adding to the List of types of forensic examinations conducted in the Federal budget forensic institutions of the Russian Ministry of Justice the new type of forensic examinations – “Intellectual Property Forensics”.
APA, Harvard, Vancouver, ISO, and other styles
49

Shalgynbayeva, A. R. "COMPARATIVE ANALYSIS OF FORENSIC TOOLS: ENCASE AND FTK IMAGER." Bulletin of Shakarim University. Technical Sciences, no. 1(17) (March 29, 2025): 86–92. https://doi.org/10.53360/2788-7995-2025-1(17)-11.

Full text
Abstract:
Disk forensics is an essential area of information security aimed at examining digital storage devices to identify, recover, and analyze data relevant to investigations. This study focuses on the functionality and performance of modern tools for disk forensics analysis, with a primary emphasis on comparing the capabilities of programs such as EnCase and FTK Imager used in this field.The research includes an overview of existing methods and technologies underlying forensic tools, including the search for deleted files, recovery of file systems, metadata analysis, and detection of artifacts indicating traces of user activity. In addition to functional capabilities, the study evaluates the performance of the software, including data processing speed, the range of supported file formats, and the efficiency of handling large volumes of information.Special attention is paid to quality assessment criteria for the tools, such as data recovery accuracy, user interface, and support for task automation.The results of the study may be valuable for professionals in cybersecurity, forensic investigation, and IT administration, as well as for students and researchers studying digital forensics. The work aims to enhance understanding of the capabilities and limitations of modern disk analysis tools, facilitating the selection of optimal solutions for specific tasks.
APA, Harvard, Vancouver, ISO, and other styles
50

Malik, Dr Pankaj, Harshit Jain, Vartika Bhawsar, Neha Patidar, and Tanishka Soni. "Development of a Machine Learning Framework for Real-Time PMI (Post-Mortem Interval) Estimation in Field Forensics." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 09 (2024): 1–6. http://dx.doi.org/10.55041/ijsrem37561.

Full text
Abstract:
Accurate estimation of the Post-Mortem Interval (PMI) is critical in forensic investigations, aiding in determining the time of death. However, traditional PMI estimation methods, often reliant on physiological observations and environmental factors, face significant limitations in accuracy and efficiency, especially in field conditions. This paper presents the development of a machine learning (ML) framework designed for real-time PMI estimation, integrating multimodal sensor data to address the challenges encountered in field forensics. Our framework utilizes environmental and physiological features, including body temperature, ambient humidity, and biochemical decomposition markers, to predict PMI with high precision. The ML model, trained on historical forensic data, is deployed on a real-time processing platform, enabling rapid analysis and decision-making in resource- constrained environments. The system is optimized for field operations, incorporating low-power hardware and edge computing capabilities to provide forensic investigators with reliable PMI estimates on-site. Through a series of controlled experiments simulating forensic scenarios, our framework demonstrates a significant improvement in PMI accuracy compared to traditional methods, while maintaining low latency for real-time applications. This research highlights the potential of machine learning to revolutionize forensic practices, offering a scalable and adaptive solution for time-sensitive investigations. Here are some relevant keywords for the development of a machine learning framework for real-time PMI (Post- Mortem Interval) estimation in field forensics: Keywords: Field Forensics, Real-Time Machine Learning, Body Decomposition Stages, Machine Learning in Forensic Science, Artificial Intelligence for PMI Analysis, Sensor Data in PMI Estimation, Deep Learning for PMI Estimation, Automated Forensic Analysis, Data Acquisition in Field Forensics.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography