Toward Understanding the Challenges and Countermeasures in Computer Anti-Forensics

Author(s):  
Kamal Dahbur ◽  
Bassil Mohammad

The term computer anti-forensics (CAF) generally refers to a set of tactical and technical measures intended to circumvent the efforts and objectives of the field of computer and network forensics (CF). Many scientific techniques, procedures, and technological tools have evolved and effectively applied in the field of CF to assist scientists and investigators in acquiring and analyzing digital evidence for the purpose of solving cases that involve the use or misuse of computer systems. CAF has emerged as a CF counterpart that plants obstacles throughout the path of computer investigations. The purpose of this paper is to highlight the challenges introduced by anti-forensics, explore various CAF mechanisms, tools, and techniques, provide a coherent classification for them, and discuss their effectiveness. Moreover, the authors discuss the challenges in implementing effective countermeasures against these techniques. A set of recommendations are presented with future research opportunities.

2011 ◽  
Vol 1 (3) ◽  
pp. 22-35 ◽  
Author(s):  
Kamal Dahbur ◽  
Bassil Mohammad

The term computer anti-forensics (CAF) generally refers to a set of tactical and technical measures intended to circumvent the efforts and objectives of the field of computer and network forensics (CF). Many scientific techniques, procedures, and technological tools have evolved and effectively applied in the field of CF to assist scientists and investigators in acquiring and analyzing digital evidence for the purpose of solving cases that involve the use or misuse of computer systems. CAF has emerged as a CF counterpart that plants obstacles throughout the path of computer investigations. The purpose of this paper is to highlight the challenges introduced by anti-forensics, explore various CAF mechanisms, tools, and techniques, provide a coherent classification for them, and discuss their effectiveness. Moreover, the authors discuss the challenges in implementing effective countermeasures against these techniques. A set of recommendations are presented with future research opportunities.


2020 ◽  
Vol 14 ◽  
Author(s):  
Meghna Dhalaria ◽  
Ekta Gandotra

Purpose: This paper provides the basics of Android malware, its evolution and tools and techniques for malware analysis. Its main aim is to present a review of the literature on Android malware detection using machine learning and deep learning and identify the research gaps. It provides the insights obtained through literature and future research directions which could help researchers to come up with robust and accurate techniques for classification of Android malware. Design/Methodology/Approach: This paper provides a review of the basics of Android malware, its evolution timeline and detection techniques. It includes the tools and techniques for analyzing the Android malware statically and dynamically for extracting features and finally classifying these using machine learning and deep learning algorithms. Findings: The number of Android users is expanding very fast due to the popularity of Android devices. As a result, there are more risks to Android users due to the exponential growth of Android malware. On-going research aims to overcome the constraints of earlier approaches for malware detection. As the evolving malware are complex and sophisticated, earlier approaches like signature based and machine learning based are not able to identify these timely and accurately. The findings from the review shows various limitations of earlier techniques i.e. requires more detection time, high false positive and false negative rate, low accuracy in detecting sophisticated malware and less flexible. Originality/value: This paper provides a systematic and comprehensive review on the tools and techniques being employed for analysis, classification and identification of Android malicious applications. It includes the timeline of Android malware evolution, tools and techniques for analyzing these statically and dynamically for the purpose of extracting features and finally using these features for their detection and classification using machine learning and deep learning algorithms. On the basis of the detailed literature review, various research gaps are listed. The paper also provides future research directions and insights which could help researchers to come up with innovative and robust techniques for detecting and classifying the Android malware.


2017 ◽  
Vol 37 (4) ◽  
pp. 117-141 ◽  
Author(s):  
Krista Fiolleau ◽  
Theresa Libby ◽  
Linda Thorne

SUMMARY As the scope of the audit continues to broaden (Cohen, Krishnamoorthy, and Wright 2017), research questions in management control and internal control are beginning to overlap. Even so, there is little overlap between these fields in terms of published research to date. The purpose of this paper is to take a step in bridging the gap between the management control and the internal control literatures. We survey relevant findings from the extant management control literature published between 2003 and 2016 on dysfunctional behavior and the ways in which it might be mitigated. We then use the fraud triangle as an organizing framework to consider how the management control literature might help to address audit risk factors identified in SAS 99/AU SEC 316 (AICPA 2002). The outcome of our analysis is meant to identify and classify the extant management control literature of relevance to research on internal control in a manner that researchers new to the management control literature will find accessible. We conclude with a set of future research opportunities that can help to broaden the scope of current research in internal control.


2018 ◽  
Vol 2018 ◽  
pp. 1-13 ◽  
Author(s):  
Jessica Beltrán ◽  
Mireya S. García-Vázquez ◽  
Jenny Benois-Pineau ◽  
Luis Miguel Gutierrez-Robledo ◽  
Jean-François Dartigues

An opportune early diagnosis of Alzheimer’s disease (AD) would help to overcome symptoms and improve the quality of life for AD patients. Research studies have identified early manifestations of AD that occur years before the diagnosis. For instance, eye movements of people with AD in different tasks differ from eye movements of control subjects. In this review, we present a summary and evolution of research approaches that use eye tracking technology and computational analysis to measure and compare eye movements under different tasks and experiments. Furthermore, this review is targeted to the feasibility of pioneer work on developing computational tools and techniques to analyze eye movements under naturalistic scenarios. We describe the progress in technology that can enhance the analysis of eye movements everywhere while subjects perform their daily activities and give future research directions to develop tools to support early AD diagnosis through analysis of eye movements.


Author(s):  
Ari Riswanto

The purpose of this study is to find out things related to dynamic marketing capabilities seen from the aspect of concepts supported by all theories and also foregoing studies have been published in reputable international journals, besides this study is completed to bring up research opportunities can be done by future researchers. The method used in researchers is to conduct an in-depth study related to the variable dynamic marketing capabilities in existing literature, both books and journals that have been published internationally and online versions. As for what is interesting and being the novelty from the results of this study are in this article revealed opportunities can be done more distant by doing further research that has not been done by previous researchers.    


Sign in / Sign up

Export Citation Format

Share Document