scispace - formally typeset
Search or ask a question
Topic

Digital evidence

About: Digital evidence is a research topic. Over the lifetime, 1621 publications have been published within this topic receiving 18476 citations.


Papers
More filters
05 Nov 2017
TL;DR: A performance comparison between different digital evidence acquisition protocols in the cloud-computing environment is presented, focusing on data confidentiality, authenticity, and integrity issues.
Abstract: In this paper, we present a performance comparison between different digital evidence acquisition protocols in the cloud-computing environment. We focus on data confidentiality, authenticity, and integrity issues.

3 citations

Journal ArticleDOI
01 Jun 2021
TL;DR: In this paper, a web-based system to determine the right tool in digital forensics using rule-based reasoning approach is presented, which shows that only 40% of the tools coming with the help document on how to use the tool are suitable to help the investigator to decide the right tools.
Abstract: Digital forensics is a method to trace the digital evidence using knowledge of science. There are several stages in the method of digital forensics. Each stage has their own way to use the method collaborate with the tool of digital forensics. Nowadays, there are tools that we can use in digital forensics. Therefore, not all the tool coming with the help document on how to use the tool. This situation makes the investigator have to check the feature of the tool one by one in order to suit which one is the best tool to use in some stage. To overcome this problem, we made a system to determine the right tool in digital forensics using rule-based reasoning approach. The result of this paper is web-based system to determine the right tool in digital forensics. The system shows that only 40% in suitability to help the investigator to determine the right tool. This cause by lacking of the rule consists in the reasoning approach.

3 citations

Book ChapterDOI
22 Jul 2011
TL;DR: Methods to retrieve only picture files from the whole digital media or digital evidence file are evolved and an optimal method to find skin component in a given picture file using skin tone detection technique is suggested.
Abstract: Distribution of child pornography material is one of the most disturbing cyber crimes. Cyber crime is a form of crime where the Internet or computer is used as a medium to commit the crime. With the growth of the Internet and the ease of file sharing in these days, child pornography has grown to become a worldwide issue. Most of the tools available today retrieve all the files and folders from the digital evidence file. The investigator has to search through all these files to identify relevant picture files pertaining to the child grooming case. To make an investigator’s job easier, we evolved methods to retrieve only picture files from the whole digital media or digital evidence file. Also, we suggest an optimal method to find skin component in a given picture file using skin tone detection technique.

3 citations

Proceedings ArticleDOI
01 Oct 2018
TL;DR: Forensic measures carried out based on the NIST Mobile Forensics framework can be applied to the digital evidence retrieval process Instant Messaging applications on smartphones and Android smartwatches with Oxygen Forensic Suite has the highest successful rate.
Abstract: The rapid development of Android technology has an impact on the increasing number of devices that use Android as operating system. Applications developed for the Android platform are also very diverse, including instant messaging applications. Short Message Service, Blackberry Messenger, Line, and WhatsApp are multi-platform instant messaging applications with lots of users, so the possibility of digital crime that occurs by digital crime perpetrators has also increased significantly. The process of investigating digital crime cases require digital evidence to solve it. The process of obtaining digital evidence requires a forensic investigation technique against the physical evidence that has been obtained using certain methods. This research focuses on forensic steps to obtain digital evidence from Instant Messaging application on Android smartphones and smartwatches using widely used mobile forensic software, namely, Andriller, Oxygen Forensic Suite, WhatsApp DB / Key Extractor, and Metasploit using a framework developed by the National Institute of Standard Technology (NIST). The results of this research are presented in the form of a comparison table of artifact extraction success rate from each tool. The conclusions obtained from this research are: forensic measures carried out based on the NIST Mobile Forensics framework can be applied to the digital evidence retrieval process Instant Messaging applications on smartphones and Android smartwatches with Oxygen Forensic Suite has the highest successful rate at 57.14% on BBM and WhatsApp artifact extraction and 42.85 on Smartwatch’s SMS and LINE Messenger artifact extraction. WhatsApp DB/ Key Extractor has the highest successful rate at 42.85 on Smartphone’s WhatsApp artifact extraction but has weakness in Smartwatch’s SMS, BBM, and LINE Messenger artifact extraction and Metasploit has the lowest success ratio.

3 citations


Network Information
Related Topics (5)
Information privacy
25.4K papers, 579.6K citations
78% related
Cloud computing security
27.1K papers, 511.8K citations
77% related
Authentication
74.7K papers, 867.1K citations
77% related
Intrusion detection system
28.4K papers, 509.5K citations
76% related
Public-key cryptography
27.2K papers, 547.7K citations
75% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20241
202387
2022206
202187
2020116
2019111