A Literature review on Cyber Forensic and its Analysis tools

With the advancement in cyber area, frequent use of internet and technologies leads to cyber attacks. Digital forensic is opted for acquiring electronic information and investigation of malicious evidence found in system or on network in such a manner that makes it admissible in court. It is also used to recover lost information in a system. The recovered information is used to prosecute a criminal. Number of crimes committed against an internet and malware attacks over the digital devices have increased. Memory analysis has become a critical capability in digital forensics because it provides insight into the system state that should not be represented by traditional media analysis. In this paper, we study the details of cyber forensics and also provide the vital information regarding distinctive tools operate in digital forensic process. It includes forensic analysis of encrypted drives, disk analysis, analysis toolkit, volatile memory analysis, captures and analyzes packets on network.

[1]  Misha Pavel,et al.  The exploration & forensic analysis of computer usage data in the elderly , 2009, 2009 Annual International Conference of the IEEE Engineering in Medicine and Biology Society.

[2]  Stefan Balogh,et al.  Capturing encryption keys for digital analysis , 2011, Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems.

[3]  Wei Chen,et al.  The analysis and design of Linux file system based on computer forensic , 2010, 2010 International Conference On Computer Design and Applications.

[4]  Gerald Quirchmayr,et al.  A Prototype for Support of Computer Forensic Analysis Combined with the Expected Knowledge Level of an Attacker to More Efficiently Achieve Investigation Results , 2010, 2010 International Conference on Availability, Reliability and Security.

[5]  George M. Mohay,et al.  A Model for Computer Profiling , 2010, 2010 International Conference on Availability, Reliability and Security.

[6]  Siu-Ming Yiu,et al.  Protecting Digital Data Privacy in Computer Forensic Examination , 2011, 2011 Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering.

[7]  Sriram Raghavan,et al.  A study of forensic & analysis tools , 2013, 2013 8th International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE).

[8]  Yongge Wang,et al.  Fast and Secure Magnetic WORM Storage Systems , 2003, Second IEEE International Security in Storage Workshop.

[9]  B. Ramani,et al.  Towards successful forensic recovery of bitlocked volumes , 2011, 2011 6th International Conference on System of Systems Engineering.

[10]  Simson L. Garfinkel,et al.  Digital forensics research: The next 10 years , 2010, Digit. Investig..

[11]  Aleksandra Mileva,et al.  Computer forensic analisys of some web attacks , 2014, World Congress on Internet Security (WorldCIS-2014).

[12]  Ajeet Singh Poonia,et al.  Live forensics analysis: Violations of business security policy , 2014, 2014 International Conference on Contemporary Computing and Informatics (IC3I).

[13]  Keyu Jiang,et al.  An Analysis System for Computer Forensic Education, Training, and Awareness , 2012, 2012 International Conference on Computing, Measurement, Control and Sensor Network.

[14]  James B. D. Joshi,et al.  A Similarity based Technique for Detecting Malicious Executable files for Computer Forensics , 2006, 2006 IEEE International Conference on Information Reuse & Integration.

[15]  Shaheed Zulfikar,et al.  Triage in Live Digital Forensic Analysis , 2013 .

[17]  Alec Yasinsac,et al.  Policies to Enhance Computer and Network Forensics , 2001 .

[18]  Yu Zhou,et al.  The forensic analysis of encrypted Truecrypt volumes , 2014, 2014 IEEE International Conference on Progress in Informatics and Computing.

[19]  Eduardo R. Hruschka,et al.  Document Clustering for Forensic Computing: An Approach for Improving Computer Inspection , 2011, 2011 10th International Conference on Machine Learning and Applications and Workshops.

[20]  Sangjin Lee,et al.  Applying a Stepwise Forensic Approach to Incident Response and Computer Usage Analysis , 2009, 2009 2nd International Conference on Computer Science and its Applications.