Qualitative Assessment of Digital Forensic Tools

Authors

  • Sakshi Singh Department of Computer Science and Engineering, Ambedkar Institute Of Advanced Communication Technologies & Research New Delhi, Delhi, India.
  • Suresh Kumar Department of Computer Science and Engineering, Ambedkar Institute Of Advanced Communication Technologies & Research New Delhi, Delhi, India.

DOI:

https://doi.org/10.51983/ajes-2020.9.1.2372

Keywords:

Database forensics, Digital forensic tools,, Forensic phases, Mobile forensics and Network forensics

Abstract

Forensic science is a study of science to criminals and civil laws. Digital forensics is the part of forensic science relating to proof found in computers and advanced storage media. Forensic examiners gather, protect and break down logical confirmations over the span of examination. Digital information contains data as content, pictures, sound, video and so on. These days numerous cybercrime cases, for example, hacking, banking cheats, phishing, email spamming, etc., have developed which are connected with a computerized information. Since the digital investigation is turning into an expanding concern, numerous digital forensic tools have been created to manage the difficulties of exploring computerized wrongdoings. The motivation behind digital forensics strategies is to look, protect and extract data on advanced frameworks to discover potential confirmations to exhibit them in the courtroom. In this paper, we have discussed five kinds of forensics namely Network Forensics, Live Forensics, Cyber Forensics, Database Forensics, and Mobile Forensics. The paper depicts a list of digital forensic tools in detail and looks at them based on the characterized parameters to figure out which tool suits better for any investigation. The paper looks at network, database and mobile forensic tools and examines the silent features and uniqueness of each of the tools along with their functionalities.

References

M. Lovanshi and P. Bansal, "Comparative Study of Digital Forensic Tools," in Springer Nature Singapore, 2019.

K. M. A. Kamal, M. Alfadel, and M. S. Munia, "Memory Forensic Tools: Comparing Processing Time and left Artifacts on volatile memory," in International Workshop on Computational Intelligence (IWCI), 2016.

S. McCombie and M. Warren, "Computer Forensic: An issue of definition," in 1st Australian Computer, Network and Information Forensics Conference, 2003.

P. D. Dixon, "An Overview on computer Forensics," IEEE, December 2005.

P. Sharma, K. Jain, B. Nagpal, and Tanvi, "REGEX: An Experimental Approach for Searching in Cyber Forensic," in IEEE Conference, March 2017.

V. Sanap and V. Mane, "Comparative Study and Digital Forensic Tools," in International Journal of Computer Applications, ICAST 2015.

P. Dhaka and R. Johari, "CRIB: Cyber Crime Investigation, Data Archival and analysis using Big Data Tool," in ICCCA 2006.

E. Crowley, "Information System Security Curricula Development," ACM, October 2003.

M. C. Stamm, M. Wu, and K. J. R. Liu, "Information Forensics: An Overview of the First Decade," IEEE Access, May 2013.

H. Bariki, M. Hashmi, and I. Baggili, "Defining a Standard of Reporting Digital Evidence Items in Computer Forensic Tools," Institute of Computer Sciences, Social Informatics and Telecommunication Engineering, 2011.

C. Lim, M. Micsen, and H. Ahmadi, "Forensic Analysis of USB Flash Drives in Educational Environment," IEEE, 2014.

A. Ghafarian, "Forensic Analysis of Cloud Computing Services," Science and Information Conference, 2015.

G. Velakanti and A. Katuri, "Enhancement of existing tools and Techniques for Computer Forensic Investigation," International Journal of Computer Science and Information Technologies, vol. 5, no. 1, pp. 161-164, 2014.

L. Carvajal, C. Varol, and L. Chen, "Tools for Collecting Volatile Data: A survey Study," IEEE, 2013.

Wireshark, "Introduction," [Online]. Available: https://www.wireshark.org/docs/wsug_html_chunked/ChapterIntroduction.html.

Tenable, "Nessus 4.4 User Guide," [Online]. Available: https://www.tenable.com/sites/drupal.dmz.tenablesecurity.com/files/uploads/documents/nessus_4.4_user_guide.pdf.

Xplico, [Online]. Available: https://www.xplico.org/archives/540.

Cuckoo, [Online]. Available: https://buildmedia.readthedocs.org/media/pdf/cuckoo/latest/cuckoo.pdf.

Forensics Wiki, [Online]. Available: https://www.forensicswiki.org/wiki/Forensic_Toolkit.

BitPim, [Online]. Available: https://searchmobilecomputing.techtarget.com/definition/BitPim.

X-Ways Forensics, [Online]. Available: https://www.x-ways.net/winhex/forensics.html.

Helix, [Online]. Available: https://www.pcquest.com/forensic-analysis-helix/.

SANS, "Helix 3 Pro First Impressions," [Online]. Available: https://digital-forensics.sans.org/blog/2009/11/20/helix-3-pro-first-impressions.

O'Reilly, "Instant Wireshark Starter," [Online]. Available: https://learning.oreilly.com/library/view/instant-wireshark-starter/9781849695640/ch01s04.html.

Network World, "What is Nmap: Why you need this network mapper," [Online]. Available: https://www.networkworld.com/article/3296740/what-is-nmap-why-you-need-this-network-mapper.html.

Downloads

Published

05-04-2020

How to Cite

Singh, S., & Kumar, S. (2020). Qualitative Assessment of Digital Forensic Tools. Asian Journal of Electrical Sciences, 9(1), 25–32. https://doi.org/10.51983/ajes-2020.9.1.2372