scispace - formally typeset
Search or ask a question
Topic

Digital forensics

About: Digital forensics is a research topic. Over the lifetime, 4270 publications have been published within this topic receiving 49676 citations. The topic is also known as: digital forensic science & Digital forensics.


Papers
More filters
Proceedings ArticleDOI
05 Sep 2005
TL;DR: A classification schema is proposed for all traceback methods in order to assess and combine their benefits so as to provide enough information for digital forensics analyses, thus getting -the right way- one step closer to the actual attacker.
Abstract: The traceback problem is one of the hardest in information security and has always been the utmost solution to holding attackers accountable for their actions. This paper presents a brief overview of the traceback problem, while discussing the features of software, network and computer forensics. In the rest of this paper, various traceback mechanisms are examined while categorized according to their features and modes of operation. Finally, we propose a classification schema for all traceback methods in order to assess and combine their benefits so as to provide enough information for digital forensics analyses, thus getting -the right way- one step closer to the actual attacker.

17 citations

Proceedings ArticleDOI
28 Jun 2010
TL;DR: The consequential outcomes for students emerging from a baccalaureate degree in Digital Forensics are explored, as are some of the grand questions for digital forensics research.
Abstract: Digital Forensics is an emerging discipline within the computing sciences that exhibits both commonalities and uniquenesses with other computing disciplines. This paper seeks to delineate the domain space of Digital Forensics through an evaluation of the knowledge areas represented in existing Digital Forensics academic offerings and an assessment of the relative importance of those knowledge areas. The consequential outcomes for students emerging from a baccalaureate degree in Digital Forensics are explored, as are some of the grand questions for digital forensics researchThis paper calls for the development of a critical mass of researchers, academics and educators interested in Digital Forensics in order that coherent research agendas, curricula and pedagogical concerns can be addressed.

17 citations

Proceedings ArticleDOI
04 May 2018
TL;DR: This paper presents a novel methodology that provides courts of law with sound digital evidences, having a confidence level expressed in metrics and ordered through a timeline.
Abstract: When digital evidence is presented in front of a court of law, it is seldom associated with a scientific evaluation of its relevance, or significance. When experts are challenged about the validity of the digital evidence, the general answer is "yes, to a reasonable degree of scientific certainty". Which means all and nothing at the same time, since no scientific metric is volunteered. In this paper we aim at providing courts of law with weighted digital evidence. Each digital evidence is assigned with a confidence rating that eventually helps juries and magistrates in their endeavor. This paper presents a novel methodology in order to: -Provide digital forensics experts with the ability to form a digital evidence chain, the Digital Evidence Inventory (DEI), in a way similar to an evidence "block chain", in order to capture evidence; -Give experts the ability to rate the level of confidence for each evidence in a Forensics Confidence Rating (FCR) structure; -Provide experts with a Global Digital Timeline (GDT) to order evidence through time. As a result, this methodology provides courts of law with sound digital evidences, having a confidence level expressed in metrics and ordered through a timeline. The objective of this work is to add a reliable pinch of scientific certainty when dealing with digital evidence.

17 citations

Journal ArticleDOI
17 Mar 2017
TL;DR: An Encapsulated Approach of Forensic (EAF) model is extended, which engulfs all the phases of digital investigation in detail, and gives an orderly, organised and scrupulous step-by-step procedure from identification of facts and evidences to presentation of results by the investigator in front of investigating organisation.
Abstract: Universally, the security and forensic workforce keeps up tab through newest technology of attack tools and modus operandi adopted by attackers. There is a plethora of free tools available, but they aid in enforcing the security mechanisms and analysing the attack traffic only to a certain measure. With every passing day, size of internet manifolds and so does the kind and nature of attacks. Thus, it has become difficult to analyse crime that is related with computer, as it is multiplying as fast as the web of internet itself. Digital forensic investigation is the systematic restitution of evidences/proofs collected as an outcome of exploration of concrete happenings based on digital data. After evaluating all the historical approaches used in the existing models, their pros and cons are elicited and an Encapsulated Approach of Forensic (EAF) model (proposed earlier) is extended, which engulfs all the phases of digital investigation in detail. It gives an orderly, organised and scrupulous step-by-step procedure, from identification of facts and evidences to presentation of results by the investigator in front of investigating organisation.

17 citations

Book ChapterDOI
13 Jun 2019
TL;DR: This research presents an experimental model and prototype to exploit digital evidence in Internet of Things by building a solid case thanks to the non-repudiable, immutable, identifiable as current and authentic properties of data logged into the blockchain.
Abstract: This research presents an experimental model and prototype to exploit digital evidence in Internet of Things (IoT). The novelty of this research is to consider new data privacy mechanisms that should be implemented in IoT, in compliance with the GDPR regulation, and their impact on digital forensic processes. The testbed is an innovative project for car navigation [1, 2], GDPR compatible, which offers users the possibility to submit their GPS position into a blockchain for obtaining road traffic information and alternative paths. The vehicles are communicating among themselves through IoTs and circumvent the use of third-party services. We propose a solution for forensic investigations of such a service by building a solid case thanks to the non-repudiable, immutable, identifiable as current and authentic properties of data logged into the blockchain. This solution applies to criminal and insurance cases, where law enforcement and individuals need to prove their claims.

17 citations


Network Information
Related Topics (5)
Authentication
74.7K papers, 867.1K citations
84% related
Encryption
98.3K papers, 1.4M citations
81% related
Cryptography
37.3K papers, 854.5K citations
81% related
Server
79.5K papers, 1.4M citations
77% related
Mobile computing
51.3K papers, 1M citations
76% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20243
2023205
2022552
2021267
2020339
2019343