Computational Intelligence in Digital Forensics: Forensic Investigation and Applications

Author(s):  
Promise Agbedanu ◽  
Anca Delia Jurcut

In this era of explosive growth in technology, the internet of things (IoT) has become the game changer when we consider technologies like smart homes and cities, smart energy, security and surveillance, and healthcare. The numerous benefits provided by IoT have become attractive technologies for users and cybercriminals. Cybercriminals of today have the tools and the technology to deploy millions of sophisticated attacks. These attacks need to be investigated; this is where digital forensics comes into play. However, it is not easy to conduct a forensic investigation in IoT systems because of the heterogeneous nature of the IoT environment. Additionally, forensic investigators mostly rely on evidence from service providers, a situation that can lead to evidence contamination. To solve this problem, the authors proposed a blockchain-based IoT forensic model that prevents the admissibility of tampered logs into evidence.


Author(s):  
Ruuhwan Ruuhwan ◽  
Imam Riadi ◽  
Yudi Prayudi

Perkembangan teknologi yang semakin pesat, dapat menimbulkan permasalahan bagi pengguna teknologi itu sendiri, semakin maju kehidupan masyarakat, maka kejahatan juga ikut semakin maju. Smartphone merupakan salah satu bentuk teknologi yang digunakan untuk melakukan penipuan melalui fasilitas Short Message Service (SMS). Pada saat smartphone yang digunakan untuk melakukan kejahatan maka smartphone tersebut dapat disita oleh aparat penegak hukum sebagai salah satu barang bukti. Cara pembuktian untuk mendapatkan bukti yang valid adalah dengan melakukan investigasi menggunakan pendekatan penanganan bukti digital yang dikenal dengan istilah Framework. Integrated Digital Forensics Investigation Framework versi 2 (IDFIF v2) merupakan framework terbaru yang telah dikembangkan sehingga dapat digunakan untuk proses investigasi smartphone.Kata kunci— Barang Bukti, Framework, IDFIF v2, Smartphone


2016 ◽  
Vol 4 (02) ◽  
Author(s):  
Haris Richard Adrian Taruma Selej

in the era of technology has greatly advanced, mobile phones have become a necessity and a means of communicating with each other. even though they are separated by a considerable distance, no longer need to spend the time to meet physically. This reason also makes the phone as the primary choice for criminals to communicate. communication used a variety of purposes, such as positive or negative. In 2010, digital forensic analyst team has examined such as network Puslabfor drugs, pornography, gambling, corruption, defamation, fraud, bribery, and others. Of these, as many as 118 types of mobile phones in the form of evidence. It means that offenders still consider mobile phones as a primary communication tool. Digital forensic analysts and investigators, it shall be able to anticipate these things, so that when there is evidence of mobile phone, which was confiscated from criminals, can be checked properly in accordance with the basic principles of digital forensics. This study uses DFIF (Digital Forensic Investigation Framework) smartphone investigation by searching for evidence of a conversation via text message. the results of the investigation evidence to prove the offender information, the information will be presented in the form of a forensic report which will be used as evidence in court.


2018 ◽  
Vol 8 (1) ◽  
Author(s):  
Hasan Binjuraid ◽  
Mazura Mat Din

With the advancement in computer technologies, cybercrimes advanced too. As in today’s world, the technology knowledge to attack a computer is less than ever, with the help of advanced tools that does most of the work. Digital forensic investigations are crucial in solving this type of crimes, and it must be done professionally. Computer registries play a big part in the digital forensic investigation, it can help find artifacts that are left by the cybercrimes, dates of the crimes on the computer system and the user at the time of the crime. In this research, interpretation of these artifacts is the main focus, committees and jurors are the focus of the interpretations of the registries. Two types of cases are subject to investigation in this research. BitTorrent clients’ use for downloading illegal o copyrighted content, and three clients are chosen for this digital forensic investigation uTorrent, Vuze and BitComet. Theft using USB storage devices is the second type of case, where there are three types of USB devices Mass Storage Class, Picture Transfer Protocol and Media Transfer Protocol, each type of USB devices leaves different artifacts behind during insertion and removal. A web based dashboard will be developed to help with the process of interpretation the artifacts found in the registry of the computer system. A categorization process of each cybercrime case will be conduct to evaluate the severity of the case depending on the artifacts found in the digital forensics investigation process. The research methodology will consist of three phases. The first phase will be information gathering including literature review, requirements gathering and dataset gathering for the research. Performing digital forensics analysis will be the second phase and it includes planning, identification and reconnaissance. Last phase will include result analysis and discussion.


Author(s):  
Andreas Mitrakas ◽  
Damián Zaitch

The steep increase of cyber crime has rendered digital forensics an area of paramount importance to keep cyber threats in check and invoke legal safety and security in electronic transactions. This chapter reviews certain legal aspects of forensic investigation, the overall legal framework in the EU and U.S. and additional self-regulatory measures that can be leveraged upon to investigate cyber crime in forensic investigations. This chapter claims that while full-scale harmonisation of forensic investigation processes across the EU and beyond is unlikely to happen in the foreseeable future, cross-border investigations can be greatly facilitated by initiatives aiming at mutual assistance arrangements based on a common understanding of threats and shared processes. Involving the users through self-regulation and accountability frameworks might also contribute to reducing risks in electronic communications that emanate from cyber criminal threats.


2016 ◽  
Vol 7 (4) ◽  
Author(s):  
Ruuhwan Ruuhwan ◽  
Imam Riadi ◽  
Yudi Prayudi

Abstract. The handling of digital evidence each and every digital data that can proof a determination that a crime has been committed; it may also give the links between a crime and its victims or crime and the culprit. How to verify a valid evidence is to investigate using the approach known as the Digital Forensic Examination Procedures. Integrated Digital Forensic Investigation Framework (IDFIF) is the latest developed method, so that it is interesting to further scrutinize IDFIF, particularly in the process of investigation of a smartphone. The current smartphone devices have similar functions with computers. Although its functions are almost the same as the computer, but there are some differences in the process of digital forensics handling between computer devices and smartphones. The digital evidence handling process stages need to overcome the circumstances that may be encountered by an investigator involving digital evidence particularly on electronic media and smartphone devices in the field. IDFIF needs to develop in such a way so it has the flexibility in handling different types of digital evidence.Keywords: digital evidence, IDFIF, investigation, smartphoneAbstraks. Penanganan bukti digital mencakup setiap dan semua data digital yang dapat menjadi bukti penetapan bahwa kejahatan telah dilakukan atau dapat memberikan link antara kejahatan dan korbannya atau kejahatan dan pelakunya. Cara pembuktian untuk mendapatkan bukti valid adalah dengan melakukaninvestigasi dengan pendekatan Prosedur Pemeriksaan Digital Forensic. Integrated Digital Forensics Investigation Framework (IDFIF) merupakan metode terbaru sehingga IDFIF ini menarik untuk diteliti lebih lanjut terutama dalam proses investigasi smartphone. Saat ini perangkat smartphone memiliki fungsi yang sama dengan komputer. Meskipun demikian, ada beberapa perbedaan dalam proses penanganan digital forensics diantara perangkat komputer dan smartphone. Tahapan proses penanganan barang bukti digital seharusnya dibuat untuk mengatasi keadaan umum yang mungkin dihadapi oleh investigator yangmelibatkan barang bukti digital terutama pada perangkat smartphone dan media elektronik terkait di lapangan. IDFIF perlu dikembangkan sehingga memiliki fleksibilitas dalam menangani berbagai jenis barang bukti digital.Kata Kunci: bukti digital, IDFIF, investigasi, smartphone


Author(s):  
Ludwig Englbrecht ◽  
Günther Pernul

Stricter policies, laws and regulations for companies on the handling of private information arise challenges in the handling of data for Digital Forensics investigations. This paper describes an approach that can meet necessary requirements to conduct a privacy-aware Digital Forensics investigation in an enterprise. The core of our approach is an entropy-based identification algorithm to detect specific patterns within files that can indicate non-private information. Therefore we combine various approaches with the goal to detect and exclude files containing sensitive information systematically. This privacy-preserving method can be integrated into a Digital Forensics examination process to prepare an image which is free from private as well as critical information for the investigation. We implemented and evaluated our approach with a prototype. The approach demonstrates that investigations in enterprises can be supported and improved by adapting existing algorithms and processes from related subject areas to implement privacy-preserving measures into an investigation process.


Author(s):  
Prof. Sachin Babulal Jadhav

Digital crimes are taking place over the entire world. For any digital crime which commit at any part of world, computer or any electronic devices are used. The devices which are used to commit the crime are useful evidences which must be identified and protected for further use. The crimes involving electronic devices are called as cyber-crime. To investigate such crimes, a scientific procedures needs to be followed. The data collection, analysis, preservation and presentation of digital evidence is must in order investigate the cybercrime. This paper highlights the practices that are used worldwide in the investigation process of cyber-crime. Keywords: Digital Forensics, Analysis, Investigation, models of investigation.


2008 ◽  
pp. 1681-1700
Author(s):  
Andreas Mitrakas ◽  
Damián Zaitch

The steep increase of cyber crime has rendered digital forensics an area of paramount importance to keep cyber threats in check and invoke legal safety and security in electronic transactions. This chapter reviews certain legal aspects of forensic investigation, the overall legal framework in the EU and U.S. and additional self-regulatory measures that can be leveraged upon to investigate cyber crime in forensic investigations. This chapter claims that while full-scale harmonisation of forensic investigation processes across the EU and beyond is unlikely to happen in the foreseeable future, cross-border investigations can be greatly facilitated by initiatives aiming at mutual assistance arrangements based on a common understanding of threats and shared processes. Involving the users through self-regulation and accountability frameworks might also contribute to reducing risks in electronic communications that emanate from cyber criminal threats.


Sign in / Sign up

Export Citation Format

Share Document