Advances in computer forensics

Summary Constant developments in information technology and communication have posed challenges for those policing cyber crimes. Due to the application of computer used to investigate computer-based crime has led to development of a new field called computer forensics. This paper discusses the research category in computer forensics and identifies key research issues of each of the category. Hopefully this paper would provide foundation and new ideas for the researcher to better understand the concepts of computer forensic. The outcome presents in this paper came from thoroughly review of recent computer forensic literatures.

[1]  Nicole Beebe,et al.  A hierarchical, objectives-based framework for the digital investigations process , 2005, Digit. Investig..

[2]  Gregory A. Hall,et al.  Toward Defining the Intersection of Forensics and Information Technology , 2005, Int. J. Digit. EVid..

[3]  Eoghan Casey,et al.  Digital Evidence and Computer Crime , 2000 .

[4]  George M. Mohay,et al.  Gender-preferential text mining of e-mail discourse , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..

[5]  Lawrence A. Presley,et al.  Recovering and Examining Computer Forensic Evidence , 2000 .

[6]  Dulal C. Kar,et al.  Computer forensics: a critical need in computer science programs , 2005 .

[7]  Malcolm W. Corney,et al.  Analysing e-mail text authorship for forensic purposes , 2003 .

[8]  S. Ford,et al.  Hard evidence from computers , 1997 .

[9]  Lee Garber,et al.  Computer Forensics: High-Tech Law Enforcement , 2001, Computer.

[10]  Mark Pollitt,et al.  Computer Forensics Education , 2003, IEEE Secur. Priv..

[11]  Jesse D. Kornblum The Linux Kernel and the Forensic Acquisition of Hard Discs with an Odd Number of Sectors , 2004, Int. J. Digit. EVid..

[12]  Rodney McKemmish,et al.  What is forensic computing , 1999 .

[13]  P. Sommer Downloads, Logs and Captures: Evidence from Cyberspace , 1997 .

[14]  Chet Hosmer,et al.  Can Digital Evidence Endure the Test of Time , 2002 .

[15]  Ahmed Patel,et al.  Finite state machine approach to digital event reconstruction , 2004, Digit. Investig..

[16]  M. P. F. C. A. J. Sammes BSc,et al.  Forensic Computing , 2000, Practitioner Series.

[17]  S. Avramov-Zamurovic,et al.  Hard disk interface used in computer forensic science , 2004, Proceedings of the 21st IEEE Instrumentation and Measurement Technology Conference (IEEE Cat. No.04CH37510).

[18]  Robert Slade Software Forensics : Collecting Evidence from the Scene of a Digital Crime , 2004 .

[19]  Chet Hosmer Proving the Integrity of Digital Evidence with Time , 2002, Int. J. Digit. EVid..

[20]  Seamus O. Ciardhuáin,et al.  An Extended Model of Cybercrime Investigations , 2004, Int. J. Digit. EVid..

[21]  Bill Nelson,et al.  Guide to Computer Forensics and Investigations , 2003 .

[22]  Eugene H. Spafford,et al.  A digital investigation process model , 2004 .

[23]  Stephen G. MacDonell,et al.  Forensics : : old methods for a new science , 2004 .

[24]  Warren G. Kruse,et al.  Computer Forensics: Incident Response Essentials , 2001 .

[25]  Brian D. Carrier,et al.  Defining event reconstruction of digital crime scenes. , 2004, Journal of forensic sciences.

[26]  George M. Mohay,et al.  Computer and Intrusion Forensics , 2003 .

[27]  Olivier de Vel,et al.  Mining E-mail Authorship , 2000 .

[28]  Kevin Mandia,et al.  Incident Response & Computer Forensics , 2003 .

[29]  Megan Carney,et al.  The Trojan Made Me Do It: A First Step in Statistical Based Computer Forensics Event Reconstruction , 2004, Int. J. Digit. EVid..

[30]  Henry B. Wolfe Encountering Encrypted Evidence (potential) , 2002 .

[31]  Eric Cole,et al.  Taking a lesson from stealthy rootkits , 2004, IEEE Security & Privacy Magazine.

[32]  Peter Stephenson Modeling of Post-Incident Root Cause Analysis , 2003, Int. J. Digit. EVid..

[33]  M. B. Mukasey,et al.  Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition , 2008 .

[34]  Bruce Schneier,et al.  Secure audit logs to support computer forensics , 1999, TSEC.

[35]  William H. Allen Computer Forensics , 2005, IEEE Secur. Priv..

[36]  Paul Turner,et al.  Intrusion detection: issues and challenges in evidence acquisition , 2004 .

[37]  Eoghan Casey Practical Approaches to Recovering Encrypted Digital Evidence , 2002, Int. J. Digit. EVid..

[38]  Michael S. Greenberg,et al.  Network Forensics Analysis , 2002, IEEE Internet Comput..

[39]  Gregg H. Gunsch,et al.  An Examination of Digital Forensic Models , 2002, Int. J. Digit. EVid..

[40]  Hal Berghel The discipline of Internet forensics , 2003, CACM.