Cyber Forensics Tools: A Review on Mechanism and Emerging Challenges

With the development of technology, "Data", also interpreted as "Information" has become a major role played in the field of Cyber Forensics. One of the most crucial incidents which needs data to be important is, when it is taken as evidence in cyber-crimes. These crimes can be occurring in the fields of digital media and network in many instances related to crime scenes. Crime and forensic both investigators need the help of digital forensics to investigate in order to identify, whether the victim has committed a crime or not. Therefore, it is a requirement for an investigator to use a suitable, accurate, affordable and a reliable cyber forensic tool for the forensics investigations conducted with respect to crimes. Many researchers have done experiments on different functionalities, a forensic tool should have and have come up with various tools specifically for each branch in cyber forensics. Furthermore, with time, these cyber forensic tools have been identified with drawbacks due to the invasion of crimes, especially related to the sophisticated technology expansion. Therefore, the acquiring process of forensics tools is in lack of advanced features to detect evidence. This paper describes on some timely Digital Forensics tools and discusses emerging challenges in advanced areas of Digital Forensics.

[1]  Matt Bishop,et al.  Investigating the Implications of Virtual Machine Introspection for Digital Forensics , 2009, 2009 International Conference on Availability, Reliability and Security.

[2]  K. K. Arthur An Investigation Into Computer Forensic Tools , 2004, ISSA.

[3]  K. Inman,et al.  Principles and Practice of Criminalistics: The Profession of Forensic Science , 2000 .

[4]  Pedro Ramos Brandao Forensics and Digital Criminal Investigation Challenges in Cloud Computing and Virtualization , 2019 .

[5]  Minglu Li,et al.  An In-VM Measuring Framework for Increasing Virtual Machine Security in Clouds , 2010, IEEE Security & Privacy.

[6]  Mahesh Shirole,et al.  Comparative analysis of commercial and open source mobile device forensic tools , 2016, 2016 Ninth International Conference on Contemporary Computing (IC3).

[7]  Kathryn C. Seigfried-Spellar,et al.  File Toolkit for Selective Analysis & Reconstruction (FileTSAR) for Large-Scale Networks , 2018, 2018 IEEE International Conference on Big Data (Big Data).

[8]  Ebru Celikel Cankaya,et al.  A survey of digital forensics tools for database extraction , 2016, 2016 Future Technologies Conference (FTC).

[9]  Alexandru Vulpe,et al.  Mobile devices forensic platform for malware detection , 2019 .

[10]  Xiaohua Feng,et al.  Challenges in ROS Forensics , 2019, 2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI).

[11]  Shahrzad Zargari,et al.  Cloud Forensics: Concepts, Issues, and Challenges , 2012, 2012 Third International Conference on Emerging Intelligent Data and Web Technologies.

[12]  Michael N. Johnstone,et al.  Seven Pitfalls of Using Data Science in Cybersecurity , 2020, Data Science in Cybersecurity and Cyberthreat Intelligence.

[13]  Tobias Eggendorfer,et al.  Challenges of Network Forensic Investigation in Virtual Networks , 2016, J. Cyber Secur. Mobil..

[14]  Mohsen Guizani,et al.  Software-Defined Network Forensics: Motivation, Potential Locations, Requirements, and Challenges , 2016, IEEE Network.

[15]  Silvia Uribe Mayoral,et al.  Recommendation techniques in forensic data analysis: a new approach , 2015 .

[16]  Sherali Zeadally,et al.  Mobile Forensics: Advances, Challenges, and Research Opportunities , 2017, IEEE Security & Privacy.

[17]  B. B. Meshram,et al.  Digital Forensics and Cyber Crime Datamining , 2012, J. Information Security.

[18]  Song Wang,et al.  Security and Forensics in the Internet of Things: Research Advances and Challenges , 2020, 2020 Workshop on Emerging Technologies for Security in IoT (ETSecIoT).

[19]  Ali Dehghantanha,et al.  Greening Cloud-Enabled Big Data Storage Forensics: Syncany as a Case Study , 2018, IEEE Transactions on Sustainable Computing.

[20]  Mansoor Alam,et al.  A Deep Learning Approach for Network Intrusion Detection System , 2016, EAI Endorsed Trans. Security Safety.

[21]  Eoghan Casey,et al.  Handbook of Computer Crime Investigation: Forensic Tools and Technology , 2001 .

[22]  Amjad Zareen,et al.  Notice of Violation of IEEE Publication PrinciplesMobile Phone Forensics: Challenges, Analysis and Tools Classification , 2010, 2010 Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering.

[23]  Steven J. Vaughan-Nichols,et al.  New Approach to Virtualization Is a Lightweight , 2006, Computer.

[24]  Josh Jones,et al.  Analysis of digital forensics live system acquisition methods to achieve optimal evidence preservation , 2016, SoutheastCon 2016.