Advertisement

Forensic Investigation Processes for Cyber Crime and Cyber Space

  • K. K. Sindhu
  • Rupali Kombade
  • Reena Gadge
  • B. B. Meshram
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 216)

Abstract

Computers are an integral part of our life. A significant percentage of today’s transactions and processes take place using the computer and Internet. People have readily adopted Internet technology and innocently trust it while using it with the ignorance of the limitations and threats to the system security. With the advance of technology, equally or more advanced form of crimes started emerging. Different types of cyber attacks from various sources may adversely affect computers, software, a network, an agency’s operations, an industry, or the Internet itself. Thus companies and their products aim to take assistance of legal and computer forensics. Digital forensics deals with computer-based evidence to determine who, what, where, when, and how crimes are being committed. Computer and network forensics has evolved to assure proper presentation of cyber crime evidentiary data into court. Forensic tools and techniques are an integral part of criminal investigations used to investigate suspect systems, gathering and preserving evidence, reconstructing or simulating the event, and assessing the current state of an event. In this paper we deliberate on two aspects; first, various types of crimes in the cyber space and various sources of cyber attacks, and second, investigation processes for various cyber attacks with the help of digital forensic tools like WinHex [1].

Keywords

Cyber crime Cyber space Digital forensic Network forensic File system forensic Email forensic 

References

  1. 1.
  2. 2.
    Carrier, B.D., Spafford, E.H.: Categories of digital investigation analysis techniques based on the computer history model. J. Digit Invest. Sci. 3S, S121–S130 (2006)Google Scholar
  3. 3.
    Di Pietro, R., Verde, N.V.: Digital forensic techniques and tools chapter 17 of security handbook of electronic security and digital forensicsGoogle Scholar
  4. 4.
    Choi, J., Savoldi, A., Gubian, P., Lee, S., Lee, S.: Live forensic analysis of a compromised Linux system using LECT (Linux Evidence Collection Tool) 2008 IEEEGoogle Scholar
  5. 5.
    Arasteh, A.R., Debbabi, M., Sakha, A., Saleh, M.: Analyzing multiple logs for forensic evidence. Digit. Invest. J. Sci. 4S, S82–S91 (2007)Google Scholar
  6. 6.
    Casey, E.: Network traffic as a source of evidence: tool strengths, weaknesses, and future needs. Digit. Invest. J. 9–148 (2003)Google Scholar

Copyright information

© Springer India 2014

Authors and Affiliations

  • K. K. Sindhu
    • 1
  • Rupali Kombade
    • 1
  • Reena Gadge
    • 1
  • B. B. Meshram
    • 1
  1. 1.Computer DepartmentVeermata Jijabai Technological InstituteMumbaiIndia

Personalised recommendations