Digital Forensic Investigation Tools and Procedures

Full Text (PDF, 507KB), PP.39-48

Views: 0 Downloads: 0

Author(s)

K. K. Sindhu 1,* B.B. Meshram 1

1. Shah And Anchor Kutchhi Engg College. Mumbai, India, Veermata Jijabai Technological Institute, Mumbai, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2012.04.05

Received: 26 Jul. 2011 / Revised: 22 Nov. 2011 / Accepted: 11 Jan. 2012 / Published: 8 May 2012

Index Terms

Digital Forensic Investigation, Digital forensic tools, Cyber crime, Storage media forensic

Abstract

Due to the significance of Data, in this new age, its’ security has become a major issue in the I.T. industry. Cyber attacks from various sources are demanding its prevention in the new era of information security. Digital forensic is a relatively new fields that is the collection, analysis and documentation of a Cyber attacks. It is becoming increasingly important as criminals aggressively expand the use of technology in their enterprise of illegal activities. Digital forensics investigators have access to a wide variety of tools, both commercial and open source, which assist in the preservation and analysis of digital evidence. A small percentage of cyber criminals being convicted confirm the difficulty in detection of digital crime and its consequent procedural proving in the court of law. An established forensic analyst mines the crucial evidence from susceptible locations to comprehend attacker’s intension. The typical goal of an investigation is to collect evidence using generally acceptable methods in order to make the evidence is accepted and admitted on the court. Efficient digital Tools and procedures are needed to effectively search for, locate, and preserve all types of electronic evidence. Main focus of this paper is the complete investigation procedure of storage media. Our paper also explains emerging cyber crimes and its digital forensic investigation procedures using digital forensic tools and techniques.

Cite This Paper

K. K. Sindhu, B. B. Meshram, "Digital Forensic Investigation Tools and Procedures", International Journal of Computer Network and Information Security(IJCNIS), vol.4, no.4, pp.39-48, 2012. DOI:10.5815/ijcnis.2012.04.05

Reference

[1]H. Achi, A. Hellany & M. Nagrial. Network Security Approach for Digital Forensics Analysis 2008 IEEE.
[2]Stephen K. Brannon, and Thomas Song Computer Forensics: Digital Forensic Analysis Methodology. Computer Forensics Journal January 2008 Volume 56
[3]Cheong Kaiwee. Analysis of Hidden Data in NTFS File system. Whitepaper.
[4]Mamoun, Alazab, Sitalakshmi Venktraman, Paul Watters. Effective Digital forensic Analysis of the NTFS Disk Image. Ubicc Journal, vol 4.
[5]Timothy R. Leschke. Cyber Dumpster-Diving: $Recycle.Bin Forensics for Windows 7 and Windows Vista.
[6]Keith J. Jones Forensic Analysis of Microsoft Windows Recycle Bin Records.
[7]Gao Qinquan,Wu shunxiang. Research of Recycle Bin Forensic Analysis Platform Based On XML Techniques.
[8]Brian Carrier . File system Forensic Analysis. Publisher addison Wesley Professional .publication Date. March 17, 2005.
[9]Karen Kent, Suzanne Chevaller, Tim Grance, Hung Dang. Guide to Integrating Forensic Techniques into incident response.
[10]http://www.WinHex.com