Qualitative Assessment of Digital Forensic ToolsAuthor : Sakshi Singh and Suresh Kumar
Volume 9 No.1 January-June 2020 pp 25-32
Forensic science is a study of science to criminals and civil laws. Digital forensics is the part of forensic science relating to proof found in computers and advanced storage media. Forensic examiners gather, protect and break down logical confirmations over the span of examination. Digital information contains data as content, pictures, sound, video and so on. These days numerous cybercrime cases, for example, hacking, banking cheats, phishing, email spamming, etc., have developed which are connected with a computerized information. Since the digital investigation is turning into an expanding concern, numerous digital forensic tools have been created to manage the difficulties of exploring computerized wrongdoings. The motivation behind digital forensics strategies is to look, protect and extract data on advanced frameworks to discover potential confirmations to exhibit them in the courtroom. In this paper, we have discussed five kinds of forensics namely Network Forensics, Live Forensics, Cyber Forensics, Database Forensics, and Mobile Forensics. The paper depicts a list of digital forensic tools in detail and looks at them based on the characterized parameters to figure out which tool suits better for any investigation. The paper looks at network, database and mobile forensic tools and examines the silent features and uniqueness of each of the tools along with their functionalities.
Database forensics, Digital forensic tools, Forensic phases, Mobile forensics and Network forensics
- Mayank Lovanshi and Pratosh Bansal, “Comparative Study of Digital Forensic Tools” in Springer Nature Singapore, 2019.
- KhalequeMdAashiq Kamal, Mahmoud Alfadel and Munawaran SaiyaraMunia, “Memory Forensic Tools: Comparing Processing Time and left Artifacts on volatile memory”, International workshop on Computational Intelligence (IWCI), 2016.
- McCombie amd M. Warren, “Computer Forensic: An issue of definition”, 1st Australian Computer, Network and Information Forensics Conference, 2003.
- Phillip D. Dixon, “An Overview on computer Forensics”, IEEE, December 2005.
- Pratima Sharma, Kirti Jain, Bharti Nagpal and Tanvi, “REGEX: An Experimental Approach for Searching in Cyber Forensic”, IEEE Conference, March 2017.
- VarshakarbhariSanap and Vanita Mane, “Comparative Study and Digital Forensic Tools”, International Journal of Computer Applications, ICAST 2015.
- Priyanka Dhaka and Rahul Johari, “CRIB: Cyber Crime Investigation, Data Archival and analysis using Big Data Tool”, ICCCA
- Ed Crowley, “Information System Security Curricula Development”, ACM, October 2003.
- Matthew C. Stamm, Min Wu and K.J .Ray Liu, “Information Forensics: An Overview of the First Decade”, IEEE Access, May 2013.
- HamdaBariki, Mariam Hashmi and Ibrahim Baggili, “Defining a Standard of Reporting Digital Evidence Items in Computer Forensic Tools”, Institute of Computer Sciences, Social Informatics and Telecommunication Engineering, 2011.
- Charles Lim, Meily, Micsen and HerryAhmadi, “Forensic Analysis of USB Flash Drives in Educational Environment”, IEEE, 2014.
- Ahmed Ghafarian, “Forensic Analysis of Cloud Computing Services”, Science and information conference, 2015.
- GouthamiVelakanti and Aditya Katuri, “Enhancement of existing tools and Techniques for Computer Forensic Investigation”, International journal of computer science and information technologies, Vol. 5, No.1, pp. 161-164, 2014.
- Leonardo Carvajal, CihanVarol and Lei Chen, “Tools for Collecting Volatile Data: A survey Study”, IEEE