Topic
Digital forensics
About: Digital forensics is a research topic. Over the lifetime, 4270 publications have been published within this topic receiving 49676 citations. The topic is also known as: digital forensic science & Digital forensics.
Papers published on a yearly basis
Papers
More filters
••
05 Sep 2005
TL;DR: A classification schema is proposed for all traceback methods in order to assess and combine their benefits so as to provide enough information for digital forensics analyses, thus getting -the right way- one step closer to the actual attacker.
Abstract: The traceback problem is one of the hardest in information security and has always been the utmost solution to holding attackers accountable for their actions. This paper presents a brief overview of the traceback problem, while discussing the features of software, network and computer forensics. In the rest of this paper, various traceback mechanisms are examined while categorized according to their features and modes of operation. Finally, we propose a classification schema for all traceback methods in order to assess and combine their benefits so as to provide enough information for digital forensics analyses, thus getting -the right way- one step closer to the actual attacker.
17 citations
••
28 Jun 2010
TL;DR: The consequential outcomes for students emerging from a baccalaureate degree in Digital Forensics are explored, as are some of the grand questions for digital forensics research.
Abstract: Digital Forensics is an emerging discipline within the computing sciences that exhibits both commonalities and uniquenesses with other computing disciplines. This paper seeks to delineate the domain space of Digital Forensics through an evaluation of the knowledge areas represented in existing Digital Forensics academic offerings and an assessment of the relative importance of those knowledge areas. The consequential outcomes for students emerging from a baccalaureate degree in Digital Forensics are explored, as are some of the grand questions for digital forensics researchThis paper calls for the development of a critical mass of researchers, academics and educators interested in Digital Forensics in order that coherent research agendas, curricula and pedagogical concerns can be addressed.
17 citations
••
04 May 2018
TL;DR: This paper presents a novel methodology that provides courts of law with sound digital evidences, having a confidence level expressed in metrics and ordered through a timeline.
Abstract: When digital evidence is presented in front of a court of law, it is seldom associated with a scientific evaluation of its relevance, or significance. When experts are challenged about the validity of the digital evidence, the general answer is "yes, to a reasonable degree of scientific certainty". Which means all and nothing at the same time, since no scientific metric is volunteered. In this paper we aim at providing courts of law with weighted digital evidence. Each digital evidence is assigned with a confidence rating that eventually helps juries and magistrates in their endeavor. This paper presents a novel methodology in order to: -Provide digital forensics experts with the ability to form a digital evidence chain, the Digital Evidence Inventory (DEI), in a way similar to an evidence "block chain", in order to capture evidence; -Give experts the ability to rate the level of confidence for each evidence in a Forensics Confidence Rating (FCR) structure; -Provide experts with a Global Digital Timeline (GDT) to order evidence through time. As a result, this methodology provides courts of law with sound digital evidences, having a confidence level expressed in metrics and ordered through a timeline. The objective of this work is to add a reliable pinch of scientific certainty when dealing with digital evidence.
17 citations
••
17 Mar 2017TL;DR: An Encapsulated Approach of Forensic (EAF) model is extended, which engulfs all the phases of digital investigation in detail, and gives an orderly, organised and scrupulous step-by-step procedure from identification of facts and evidences to presentation of results by the investigator in front of investigating organisation.
Abstract: Universally, the security and forensic workforce keeps up tab through newest technology of attack tools and modus operandi adopted by attackers. There is a plethora of free tools available, but they aid in enforcing the security mechanisms and analysing the attack traffic only to a certain measure. With every passing day, size of internet manifolds and so does the kind and nature of attacks. Thus, it has become difficult to analyse crime that is related with computer, as it is multiplying as fast as the web of internet itself. Digital forensic investigation is the systematic restitution of evidences/proofs collected as an outcome of exploration of concrete happenings based on digital data. After evaluating all the historical approaches used in the existing models, their pros and cons are elicited and an Encapsulated Approach of Forensic (EAF) model (proposed earlier) is extended, which engulfs all the phases of digital investigation in detail. It gives an orderly, organised and scrupulous step-by-step procedure, from identification of facts and evidences to presentation of results by the investigator in front of investigating organisation.
17 citations
••
13 Jun 2019
TL;DR: This research presents an experimental model and prototype to exploit digital evidence in Internet of Things by building a solid case thanks to the non-repudiable, immutable, identifiable as current and authentic properties of data logged into the blockchain.
Abstract: This research presents an experimental model and prototype to exploit digital evidence in Internet of Things (IoT). The novelty of this research is to consider new data privacy mechanisms that should be implemented in IoT, in compliance with the GDPR regulation, and their impact on digital forensic processes. The testbed is an innovative project for car navigation [1, 2], GDPR compatible, which offers users the possibility to submit their GPS position into a blockchain for obtaining road traffic information and alternative paths. The vehicles are communicating among themselves through IoTs and circumvent the use of third-party services. We propose a solution for forensic investigations of such a service by building a solid case thanks to the non-repudiable, immutable, identifiable as current and authentic properties of data logged into the blockchain. This solution applies to criminal and insurance cases, where law enforcement and individuals need to prove their claims.
17 citations