Advancing Automation in Digital Forensic Investigation

Authors

  • Sathwara Prerna  School of Information Technology, Artificial Intelligence, and Cyber Security , Rashtriya Raksha University, Gandhinagar, Gujarat, India
  • Dr. Chandresh Parekh  Dean of School of Information Technology, Artificial Intelligence, and Cyber Security Rashtriya Raksha University, Gandhinagar, Gujarat, India
  • Priyank Parmar  Assistant Professor, School of Information Technology, Artificial Intelligence, and Cyber Security Rashtriya Raksha University, Gandhinagar, Gujarat, India

DOI:

https://doi.org//10.32628/IJSRSET218370

Keywords:

Forensic investigation, Digital evidence.

Abstract

This paper represents the thoroughly technical approach to carry out forensics investigation in web applications or computer systems which combines and provided digital evidence from the particular computing device. The main objective is to recover and investigate the material found in digital devices related to cybercrime and maintain the integrity of the evidence collected. The main motive of the scanner is to investigate the system or application and process a stronger result/report of each vulnerable system or application effectively. This tool is the Open source that is used to perform some forensics investigation tasks which is helpful to the investigator to do their job and generate digital evidence which can be used by a court of law.

References

  1. Sameer H Mahant, B B Meshram ”NTFS Deleted Files Recovery: Forensics View”, IRACST- International Journal Of Computer Science and Information Technology & Security (IJCSITS), ISSN:2249-9555 Vol.2, No.3, June 2012.
  2. 2014Tariq Ahamad Ahanger, Port Scan – A Security Concern, International Journal of Engineering and Innovative Technology(IJEIT), ISSN-2277-3754, Volume 3 Issue 10 April.
  3. Nmap Network Scanning Guide – Gordon Lyon.
  4. Erhan Akbal, Fatma Günes, and Ayhan Akbal. 2016. Digital Forensic Analyses of Web Browser Records. JSW 11, 7 (2016)
  5. Online "Volatility Framework" Github
  6. Online “Volatility Framework – Volatile memory extraction utility framework”
  7. Balogh, Š., & Pondelik, M. (2011, September). In Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems (Vol. 2, pp. 759-763). IEEE.
  8. Kaur, M., Kaur, N., & Khurana, S. (2016). A literature review on cyber forensic and its analysis tools. International Journal of Advanced Research in Computer and Communication Engineering, 5(1), 23-28.
  9. Marrington, A., Mohay, G., Morarji, H., & Clark, A. (2010, February). A model for computer profiling. In 2010 International Conference on Availability, Reliability, and Security (pp. 635-640). IEEE.
  10. Maximilian Bielecki and Gerald Quirchmayr, "A prototype which supports computer
  11. forensic analysis in combination with the expected knowledge level of an attacker to achieve more efficient investigation results", International Conference on Availability, Reliability, and Security. PP. no:696- 701,2010.
  12. Kaur, M., Kaur, N., & Khurana, S. (2016). A literature review on cyber forensic and its analysis tools. International Journal of Advanced Research in Computer and Communication Engineering, 5(1), 23-28.
  13. Ani, U. P. D., & Agbanusi, N. C. (2014). A comparative assessment of computer security incidence handling. Journal of Advances in Mathematics and Computer Science, 3120- 3134.

Downloads

Published

2021-06-30

Issue

Section

Research Articles

How to Cite

[1]
Sathwara Prerna, Dr. Chandresh Parekh, Priyank Parmar, " Advancing Automation in Digital Forensic Investigation, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 8, Issue 3, pp.378-382, May-June-2021. Available at doi : https://doi.org/10.32628/IJSRSET218370