scispace - formally typeset
Search or ask a question
Topic

Digital forensics

About: Digital forensics is a research topic. Over the lifetime, 4270 publications have been published within this topic receiving 49676 citations. The topic is also known as: digital forensic science & Digital forensics.


Papers
More filters
01 Jan 2006
TL;DR: The focus of this paper is to outline the effectiveness of employing machine learning methodology for computer forensic analysis by tracing previous file-system activities and preparing a timeline of the events.
Abstract: In this paper, we present a novel approach for post- event timeline reconstruction using machine learning techniques. Post-event timeline reconstruction plays a critical role in forensic investigation and serves as evidence of the digital crime. A variety of digital forensic tools have been developed during last two decades to assist computer forensic investigators for digital timeline analysis but most of them cannot handle large volumes of data in an efficient manner. The focus of this paper is to outline the effectiveness of employing machine learning methodology for computer forensic analysis by tracing previous file-system activities and preparing a timeline of the events. Our approach consists of monitoring the file-system accesses, taking file-system snapshots at discrete intervals of time by running different applications and using this data to train a recurrent neural network to recognize the execution patterns of the individual applications. The trained version of the network could subsequently be used for generating post-event timeline of a seized hard disk to verify the execution of different applications at different time intervals.

18 citations

DOI
01 Jan 2010
TL;DR: The foundations of Information Systems Assurance and information Quality provide a solid foundation for improving the current efforts in Cyber Forensics Assurance.
Abstract: As the usage of Cyber Forensics increases, so does the potential for errors in the practice of applying Cyber Forensic. Errors in opinions derived from faulty practices have resulted in grievous miscarriages of justice. However, utilizing the foundations of Information Systems Assurance and Information Quality, a solid foundation for improving the quality and effectiveness of Cyber Forensics can be derived. The foundations of Information Systems Assurance and information Quality provide a solid foundation for improving the current efforts in Cyber Forensics. With increasing computer and network systems usage as well as the increasing frequency of attacks on information systems, the need for controlling risks in information systems have become more apparent. Meeting that need, Information Systems Assurance has continued to evolve: from the CIA (confidentiality, integrity, and availability) into variations such as the five pillars (confidentiality, integrity, availability, authenticity, and nonrepudiation) and the Parkerian Hexad (confidentiality, integrity, availability, authenticity, possession, and utility). Also, with the continuing growth of information systems, the need for improving the quality of such systems has also evolved focusing on various components of information Quality (accuracy, relevance, consistency, timeliness and completeness). Utilizing the foundations of Information Systems Assurance and information Quality a model is derived for Cyber Forensics Assurance.

18 citations

BookDOI
11 Apr 2014
TL;DR: This edited volume contains seventeen chapters and presents the latest state-of-the-art advancement of Computational Intelligence in Digital Forensics; in both theoretical and application papers related to novel discovery in intelligent forensics.
Abstract: Computational Intelligence techniques have been widely explored in various domains including forensics. Analysis in forensic encompasses the study of pattern analysis that answer the question of interest in security, medical, legal, genetic studies and etc. However, forensic analysis is usually performed through experiments in lab which is expensive both in cost and time. Therefore, this book seeks to explore the progress and advancement of computational intelligence technique in different focus areas of forensic studies. This aims to build stronger connection between computer scientists and forensic field experts. This book, Computational Intelligence in Digital Forensics: Forensic Investigation and Applications, is the first volume in the Intelligent Systems Reference Library series. The book presents original research results and innovative applications of computational intelligence in digital forensics. This edited volume contains seventeen chapters and presents the latest state-of-the-art advancement of Computational Intelligence in Digital Forensics; in both theoretical and application papers related to novel discovery in intelligent forensics. The chapters are further organized into three sections: (1) Introduction, (2) Forensic Discovery and Investigation, which discusses the computational intelligence technologies employed in Digital Forensic, and (3) Intelligent Forensic Science Applications, which encompasses the applications of computational intelligence in Digital Forensic, such as human anthropology, human biometrics, human by products, drugs, and electronic devices.

18 citations

Proceedings ArticleDOI
06 Jan 2014
TL;DR: Wang et al. as discussed by the authors proposed a "Concealment" technique to enhance the security of non-protected (Class D) data that is at rest on iOS devices.
Abstract: With increasing popularity of smart mobile devices such as iOS devices, security and privacy concerns have emerged as a salient area of inquiry. A relatively under-studied area is anti-mobile forensics to prevent or inhibit forensic investigations. In this paper, we propose a "Concealment" technique to enhance the security of non-protected (Class D) data that is at rest on iOS devices, as well as a "Deletion" technique to reinforce data deletion from iOS devices. We also demonstrate how our "Insertion" technique can be used to insert data into iOS devices surreptitiously that would be hard to pick up in a forensic investigation.

18 citations

Proceedings ArticleDOI
25 Apr 2016
TL;DR: An investigation of the positive impact of digital forensics in combating cybercrimes is discussed and useful remarks on open research issues are provided for further investigation activities.
Abstract: The recent development in Information Communication Technology (ICT) has made changes in every aspect in our life. These changes are clearly reflected in cyberspace-related areas. The positive influence of cyberspace on knowledge, trade and business, and communication is undoubtable. However, there is a dark side of cyberspace deteriorates its peaceful usage that is cybercrimes. Cybercrimes are defined as any illegal activities practiced by or done via cyberspace and its electronic environment. Unlike "traditional" crimes, cybercrimes present a real dilemma due to the fact that criminals' identity may be hidden or fraud in virtual domain. The concept of digital forensics have come to the existence in an attempt of formulating possible ways for cybercrimes investigation and analysis process. In this paper, we deplore the concept of digital forensics in the context of cybercrimes. An investigation of the positive impact of digital forensics in combating cybercrimes is discussed and useful remarks on open research issues are provided for further investigation activities.

18 citations


Network Information
Related Topics (5)
Authentication
74.7K papers, 867.1K citations
84% related
Encryption
98.3K papers, 1.4M citations
81% related
Cryptography
37.3K papers, 854.5K citations
81% related
Server
79.5K papers, 1.4M citations
77% related
Mobile computing
51.3K papers, 1M citations
76% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20243
2023205
2022552
2021267
2020339
2019343