Digital Forensic Analysis of Cybercrimes: Best Practices and Methodologies

This paper reviews the existing methodologies and best practices for digital investigations phases like collecting, evaluating and preserving digital forensic evidence and chain of custody of cybercrimes. Cybercriminals are adopting new strategies to launch cyberattacks within modified and ever changing digital ecosystems, this article proposes that digital investigations must continually readapt to tackle cybercrimes and prosecute cybercriminals, working in international collaboration networks, sharing prevention knowledge and lessons learned. The authors also introduce a compact cyber forensics model for diverse technological ecosystems called Cyber Forensics Model in Digital Ecosystems CFMDE. Transferring the knowledge, international collaboration, best practices and adopting new digital forensic tools, methodologies and techniques will be hereinafter paramount to obtain digital evidence, enforce organizational cybersecurity policies, mitigate security threats, fight anti-forensics practices and indict cybercriminals. The global Digital Forensics community ought to constantly update current practices to deal with cybercriminality and foreseeing how to prepare to new technological environments where change is always constant.

[1]  Amir Mohamed Talib,et al.  Towards a Comprehensive Ontology Based-Investigation for Digital Forensics Cybercrime , 2015 .

[2]  Jonathan Ham,et al.  Network Forensics: Tracking Hackers through Cyberspace , 2012 .

[3]  Shahrin Sahib,et al.  Mapping Process of Digital Forensic Investigation Framework , 2008 .

[4]  Warren G. Kruse,et al.  Computer Forensics: Incident Response Essentials , 2001 .

[5]  Ahmad Ashari,et al.  A Proposed Digital Forensics Business Model to Support Cybercrime Investigation in Indonesia , 2015 .

[6]  Sundresan Perumal Digital Forensic Model Based On Malaysian Investigation Process , 2009 .

[7]  Ankit Agarwal,et al.  Systematic Digital Forensic Investigation Model , 2011 .

[8]  Marcus K. Rogers,et al.  Computer Forensics Field Triage Process Model , 2006, J. Digit. Forensics Secur. Law.

[9]  Walter Stechele,et al.  Default Reasoning for Forensic Visual Surveillance based on Subjective Logic and Its Comparison with L-Fuzzy Set Based Approaches , 2011, Int. J. Multim. Data Eng. Manag..

[10]  Isaca Transforming Cybersecurity: Using COBIT 5 , 2013 .

[11]  Venansius Baryamureeba,et al.  The Enhanced Digital Investigation Process Model , 2004 .

[12]  Md Rezaul Karim,et al.  The Influencing Factors Associated with Ketosis-Prone Type 2 Diabetes Mellitus: A Syndrome of Diabetes Mellitus , 2018 .

[13]  Avinash J. Agrawal,et al.  A Digital Forensics Investigation Model for Social Networking Site , 2016, ICTCS.

[14]  Petar Cisar,et al.  Cybercrime and Digital Forensics – Technologies and Approaches , 2014 .

[15]  Bryanna Hahn Fox,et al.  Federal Bureau of Investigation (FBI) , 2015 .

[16]  Gregg H. Gunsch,et al.  An Examination of Digital Forensic Models , 2002, Int. J. Digit. EVid..

[17]  Nilakshi Jain,et al.  Digital forensic framework using feedback and case history keeper , 2015, 2015 International Conference on Communication, Information & Computing Technology (ICCICT).

[18]  Zainuddin Hassan,et al.  COMMON PHASES OF COMPUTER FORENSICS INVESTIGATION MODELS , 2011 .

[19]  Ricci S. C. Ieong,et al.  FORZA - Digital forensics investigation framework that incorporate legal issues , 2006, Digit. Investig..

[20]  Vishal R. Ambhire Digital Forensic Tools , 2012 .

[21]  Seamus O. Ciardhuáin,et al.  An Extended Model of Cybercrime Investigations , 2004, Int. J. Digit. EVid..

[22]  Eoghan Casey,et al.  Digital Evidence and Computer Crime , 2000 .

[23]  Nicole Beebe,et al.  A hierarchical, objectives-based framework for the digital investigations process , 2005, Digit. Investig..

[24]  Jan H. P. Eloff,et al.  Framework for a Digital Forensic Investigation , 2006, ISSA.

[25]  B. B. Meshram,et al.  Digital Forensics and Cyber Crime Datamining , 2012, J. Information Security.

[26]  Rajdeep Niyogi,et al.  A Generic Framework for Network Forensics , 2010 .

[27]  Timothy Grance,et al.  Guide to Integrating Forensic Techniques into Incident Response , 2006 .

[28]  M. Khatir,et al.  Two-Dimensional Evidence Reliability Amplification Process Model for Digital Forensics , 2008, 2008 Third International Annual Workshop on Digital Forensics and Incident Analysis.

[29]  Jp Venter Process flows for cyber forensic training and operations , 2006 .

[30]  Budi Arief,et al.  Understanding Cybercrime from Its Stakeholders' Perspectives: Part 1--Attackers , 2015, IEEE Security & Privacy.