scispace - formally typeset
Search or ask a question
Topic

Digital evidence

About: Digital evidence is a research topic. Over the lifetime, 1621 publications have been published within this topic receiving 18476 citations.


Papers
More filters
Proceedings ArticleDOI
20 May 2010
TL;DR: A new national model that combines digital forensics and related laws at national level to investigate and prosecute cases which involves digital evidence based on legal system and cyber laws is presented.
Abstract: Revolution in Internet and ease in use of latest technology is significantly increasing the use of latest technology worldwide, day by day. Advancement in digital devices such as computers and cell phones also helped the people to work both from home and offices. The indispensable nature of information technology, however, has also attracted cyber terrorist to target our strategic critical information resources like banks, defense installations, vital telecommunication hubs, means of transportation, and other infrastructures linked with our national security. Similarly, internet and related technologies also helped terrorists as well as cyber and organized criminals to carry out their criminal activities while maintaining the anonymity and stealth. Currently, prosecution and conviction of criminals is completely based on evidence collected from digital devices based on the standard forensics models developed during last two decades. This paper presents a new national model that combines digital forensics and related laws at national level to investigate and prosecute cases which involves digital evidence based on legal system and cyber laws. The paper also discusses a real life case of Hawala as well as issues related to cross border prosecution and different obstacles to investigate such cases due to transnational prosecution and legal issues.

11 citations

Proceedings ArticleDOI
15 Sep 2009
TL;DR: This work introduces an architecture for data mining and knowledge discovery, applied in a effective real world domain, i.e. computer forensics and digital evidence, that integrates Computational Intelligence techniques and Semantic Web methodologies in a distributed agent-based environment.
Abstract: This work introduces an architecture for data mining and knowledge discovery, applied in a effective real world domain, i.e. computer forensics and digital evidence. The approach integrates Computational Intelligence techniques and Semantic Web methodologies in a distributed agent-based environment. The system elicits conceptual representation of textual resources and generates an automatic catalogue, whose categories evolve in a continuous learning process.

10 citations

Proceedings ArticleDOI
04 Apr 2015
TL;DR: To give an advanced crime scene investigation benefit on cloud environment, a cloud based computer forensic tool is proposed in this paper like data recovery, sorting, indexing, hex viewer, data bookmarking.
Abstract: Nowadays, Cloud computing is receiving more and more attention from the information and communication technology industry recently. Thus, From the demand of cloud users digital forensics in cloud computing are a raw expanse of study linked to the increasing use of information processing governance, internet and digital computer storage devices in numerous criminal actions in both traditional and Hi-Tech. The digital forensics, including handle, conduct of, study, and document digital evidence in a court of law. Digital Forensic tool in a cloud computing environment is a big demand from forensic investigator. Thus, in the process of digital forensics, it is needed to create an image of the original digital data without damage and to show that the computer evidence existed at the specific time. The evidences are then analyzed by the forensic investigator. After the proof is examined, it is obliged to make a report to embrace it as legitimately successful confirmation in the law court. To give an advanced crime scene investigation benefit on cloud environment, a cloud based computer forensic tool is proposed in this paper. To probe the evidence multiple features are provided in this tool like data recovery, sorting, indexing, hex viewer, data bookmarking.

10 citations

Posted Content
TL;DR: The role of the digital forensic expert witness is examined from three different, but related perspectives, the Court requirements of the expert witness are analyzed, and several existing Australian and international standards and guides for incident response to cyber-security incidents are reviewed.
Abstract: Despite the ever increasing cyberspatial threats, the roles of expert evidence and the expert witness are not as widely known as it needs to be. In this paper, we examine the role of the digital forensic expert witness from three different, but related perspectives and analyse the Court requirements of the expert witness, and then review several existing Australian and international standards and guides for incident response to cyber security incidents.

10 citations

Journal ArticleDOI
TL;DR: The Distributed network forensics is based on the distributed techniques, which are useful for providing an integrated platform for the automatic forensic evidence gathering and important data storage, valuable support and an attack attribution graph generation mechanism to depict hacking events.
Abstract: Network forensics is a branch of digital forensics, which applies to network security. It is used to relate monitoring and analysis of the computer network traffic, that helps us in collecting information and digital evidence, for the protection of network that can use as firewall and IDS. Firewalls and IDS can’t always prevent and find out the unauthorized access within a network. This paper presents an extensive survey of several forensic frameworks. There is a demand of a system which not only detects the complex attack, but also it should be able to understand what had happened. Here it talks about the concept of the distributed network forensics. The concept of the Distributed network forensics is based on the distributed techniques, which are useful for providing an integrated platform for the automatic forensic evidence gathering and important data storage, valuable support and an attack attribution graph generation mechanism to depict hacking events.

10 citations


Network Information
Related Topics (5)
Information privacy
25.4K papers, 579.6K citations
78% related
Cloud computing security
27.1K papers, 511.8K citations
77% related
Authentication
74.7K papers, 867.1K citations
77% related
Intrusion detection system
28.4K papers, 509.5K citations
76% related
Public-key cryptography
27.2K papers, 547.7K citations
75% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20241
202387
2022206
202187
2020116
2019111