Cyber Forensic Science to Diagnose Digital Crimes- A study

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2017 by IJCTT Journal
Volume-50 Number-2
Year of Publication : 2017
Authors : B. V. Prasanthi, Prathyusha Kanakam, S Mahaboob Hussain
  10.14445/22312803/IJCTT-V50P119

MLA

B. V. Prasanthi, Prathyusha Kanakam, S Mahaboob Hussain "Cyber Forensic Science to Diagnose Digital Crimes- A study". International Journal of Computer Trends and Technology (IJCTT) V50(2):107-113, August 2017. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Crimes in this digital world are of different types and the one among is Cyber-crime. As everything is digitized, there is rapid increase in use of internet and at the same time more number of cyber-crimes happens that raised by the attackers. Some of the cyber-attacks are hacking, banking frauds, and email spamming etc. In order to investigate these fraudulent activities, the investigation agencies (enforcement law) should make use of technology which is a crucial part. Digital forensic investigation is a branch of cyber forensics in which scientific methods and tools are used ,that allows the prevention and analysis of digital evidence, that to be produced in a court of law. This paper explores the detailed explanation of existing digital forensics tools and its uses which assists to probe the evidence.

References
[1] Richard III GG, Roussev V. Next-generation digital forensics. Communications of the ACM. 2006 Feb 1;49(2):76-80.
[2] Rogers MK, Seigfried K. The future of computer forensics: a needs analysis survey. Computers & Security. 2004 Feb 29;23(1):12-6.
[3] Khanuja HK, Adane DS. A framework for database forensic analysis. Computer Science & Engineering. 2012 Jun 1;2(3):27.
[4] Carrier B. Defining digital forensic examination and analysis tools using abstraction layers. International Journal of digital evidence. 2003 Jan;1(4):1-2.
[5] Kent, Karen, et al. "Guide to integrating forensic techniques into incident response." NIST Special Publication 10 (2006): 800-86.
[6] Breeuwsma, Marcel, et al. "Forensic data recovery from flash memory." Small Scale Digital Device Forensics Journal 1.1 (2007): 1-17.
[7] Prasanthi, B. V. "Cyber Forensic Tools: A Review." International Journal of Engineering Trends and Technology (IJETT) 41.Number-5 (2016): 6..
[8] Lessard, Jeff, and Gary Kessler. "Android Forensics: Simplifying Cell Phone Examinations." (2010).
[9] Sekar, Vyas, et al. "Toward a framework for internet forensic analysis." ACM HotNets-III. 2004.
[10] Dolan-Gavitt, Brendan. "Forensic analysis of the Windows registry in memory." digital investigation 5 (2008): S26-S32.
[11] Gunestas, Murat, Duminda Wijesekera, and Anoop Singhal. "Forensic web services." IFIP International Conference on Digital Forensics. Springer US, 2008: 163-176.
[12] S Mahaboob Hussain, Prathyusha Kanakam, A.S.N. Chakravarthy, "Inhibiting Cognitive Bias in Forensic Investigation Using DNA Smart Card with IOT", International Journal of Control Theory and Applications 10 (14), 251-255, 2017.
[13] Prasanthi, B. V., et al. "Palm Vein Biometric Technology:An Approach to Upgrade Security in ATM Transactions." International Journal of Computer Applications 112.9 (2015).
[14] Prasanthi, B. V., et al. "Security Enhancement of ATM System with Fingerprint and DNA Data." International Journal of Advanced Research in Computer Science and Software Engineering (2014).

Keywords
Digital Forensics, Crimes, Cyber-Attacks, Cyber-Forensics, Forensic Science, Security, Forensic Tools.