Topic
Digital evidence
About: Digital evidence is a research topic. Over the lifetime, 1621 publications have been published within this topic receiving 18476 citations.
Papers published on a yearly basis
Papers
More filters
••
19 Sep 2012TL;DR: The paper offers a critique on how Website Capture is applied and the methods required for successful and valid capture and analysis of live digital evidence.
Abstract: Collecting evidence using Website Capture tools and techniques enables law enforcement agencies and independent investigators to investigate crimes that are committed over the Internet or through the use of the World Wide Web, even when the suspect is hiding behind large scale heterogeneous virtual computing infrastructures. These crimes range from theft and fraud to the more extreme crimes of paedophilia, terrorist propaganda and corporate warfare. The paper offers a critique on how Website Capture is applied and the methods required for successful and valid capture and analysis of live digital evidence. We explore the different types of tools required to conduct Website Capture, why they are required and the procedure to successfully conduct Website Capture.
3 citations
••
16 Mar 2009TL;DR: The system architecture is presented and the feasibility and scalability of the approach is shown by comparing its performance to those of a popular forensic tool currently on the market by comparing the performance of the proposed approach to the current state of the art.
Abstract: Due to recent advanced technology in the field of HDD, forensic investigators and analysts are dealing with terabyte data sets and spending tremendous time and effort in forensic investigations. It makes "Speed" one of the hot issues in digital forensics. To get speed up or to improve efficiency, some approaches have been proposed. One of them getting attention is a hardware-based approach. However, such a way is limitedly used in the field of evidence cloning or password cracking while rarely applied in search and analysis for the digital evidence. A general approach to the forensic search is to find specific text strings by comparing every byte of the digital evidence at the physical level. Besides, alternative approaches have been proposed for speedup of search and analysis process. They are usually based on the technologies such like indexing algorithms, distributed processing, and data mining. However, these methods have some drawbacks. Some require a lot of initial time for preprocessing, others are impractical. In order to solve this problem, we have already proposed an efficient and practical approach for forensic analysis in [1]. In this paper, we present the system architecture and show feasibility and scalability of our approach by comparing its performance to those of a popular forensic tool currently on the market.
3 citations
01 Jan 2016
TL;DR: The experimental results on a real-life dataset support the effectiveness of the SIM card forensics approach presented in this paper and compare various forensic tools in terms of retrieving specific data.
Abstract: With the rapid evolution of the smartphone industry, mobile device forensics has become essential in cybercrime investigation. Currently, evidence forensically-retrieved from a mobile device is in the form of call logs, contacts, and SMSs; a mobile forensic investigator should also be aware of the vast amount of user data and network information that are stored in the mobile SIM card such as ICCID, IMSI, and ADN. The aim of this study is to test various forensic tools to effectively gather critical evidence stored on the SIM card. In the first set of experiments, we compare the selected forensic tools in terms of retrieving specific data; in the second set, genuine user data from eight different SIM cards is extracted and analyzed. The experimental results on a real-life dataset support the effectiveness of the SIM card forensics approach presented in this paper.
3 citations
••
31 Aug 2019TL;DR: The design of Framework is developed by implementing Composite Logic Model, a logic Composite model that can be used to determine the role model of any variable or pattern that need to collaborate in the process of collecting digital evidence on social media.
Abstract: Social media has become a major part of society. But most of the time social media is used as a way people commit the crime. Due to numerous crimes that use social media, it is essential to design a framework to gather digital evidence on social media. This study develops the design of Framework by implementing Composite Logic Model. A logic Composite model can be used to determine the role model of any variable or pattern that need to collaborate. Composite Logic Model will produce a role model that has a role to produce patterns so that it can produce the same goal. A method of Composite Logic will collaborate with the Digital Forensics Investigation framework to produce a Digital Evidence Collection Framework on Social Media. Based on data and facts, this study has been producing a new framework of gathering digital evidence on social media. The framework has four main stages in the process of collecting digital evidence on social media including pre-process, collection, analysis, and report.
3 citations
••
01 Jul 2020TL;DR: A system design is made to facilitate investigators in choosing the right digital forensic tool and in accordance with using an expert system and later this system will be implemented with website technology.
Abstract: Along with the diverse types of electronic goods and digital evidence, techniques have also developed in conducting digital forensic investigations. Another effect is the increase in types and types of tools for conducting digital forensic investigations. The problem is the increasing number of digital forensic tools is not always developed in conjunction with the manual book. So this is what makes the investigator to check the tool to make it suitable for investigations. Choosing the right tool is very important in the investigation process, because each stage of the forensic investigation process has a different treatment for each of its staging. Seeing these conditions, then in this paper we make a system design to facilitate investigators in choosing the right digital forensic tool and in accordance with using an expert system. The design system shows that it's still needed to confirm to an expert to get a match output if there is a new rule. Later this system will be implemented with website technology.
3 citations