Advancing Automation in Digital Forensic Investigation
DOI:
https://doi.org/10.32628/IJSRSET218370Keywords:
Forensic investigation, Digital evidence.Abstract
This paper represents the thoroughly technical approach to carry out forensics investigation in web applications or computer systems which combines and provided digital evidence from the particular computing device. The main objective is to recover and investigate the material found in digital devices related to cybercrime and maintain the integrity of the evidence collected. The main motive of the scanner is to investigate the system or application and process a stronger result/report of each vulnerable system or application effectively. This tool is the Open source that is used to perform some forensics investigation tasks which is helpful to the investigator to do their job and generate digital evidence which can be used by a court of law.
References
- Sameer H Mahant, B B Meshram ”NTFS Deleted Files Recovery: Forensics View”, IRACST- International Journal Of Computer Science and Information Technology & Security (IJCSITS), ISSN:2249-9555 Vol.2, No.3, June 2012.
- 2014Tariq Ahamad Ahanger, Port Scan – A Security Concern, International Journal of Engineering and Innovative Technology(IJEIT), ISSN-2277-3754, Volume 3 Issue 10 April.
- Nmap Network Scanning Guide – Gordon Lyon.
- Erhan Akbal, Fatma Günes, and Ayhan Akbal. 2016. Digital Forensic Analyses of Web Browser Records. JSW 11, 7 (2016)
- Online "Volatility Framework" Github
- Online “Volatility Framework – Volatile memory extraction utility framework”
- Balogh, Š., & Pondelik, M. (2011, September). In Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems (Vol. 2, pp. 759-763). IEEE.
- Kaur, M., Kaur, N., & Khurana, S. (2016). A literature review on cyber forensic and its analysis tools. International Journal of Advanced Research in Computer and Communication Engineering, 5(1), 23-28.
- Marrington, A., Mohay, G., Morarji, H., & Clark, A. (2010, February). A model for computer profiling. In 2010 International Conference on Availability, Reliability, and Security (pp. 635-640). IEEE.
- Maximilian Bielecki and Gerald Quirchmayr, "A prototype which supports computer
- forensic analysis in combination with the expected knowledge level of an attacker to achieve more efficient investigation results", International Conference on Availability, Reliability, and Security. PP. no:696- 701,2010.
- Kaur, M., Kaur, N., & Khurana, S. (2016). A literature review on cyber forensic and its analysis tools. International Journal of Advanced Research in Computer and Communication Engineering, 5(1), 23-28.
- Ani, U. P. D., & Agbanusi, N. C. (2014). A comparative assessment of computer security incidence handling. Journal of Advances in Mathematics and Computer Science, 3120- 3134.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.