Advertisement

An Advance Approach of Aggregation and Archival of Digital Forensic Information on Windows-Based Environment

  • Premal C. PatelEmail author
  • B. K. SharmaEmail author
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 797)

Abstract

Cyber-crimes are mostly done using a computer, and then, all the criminals attempt to remove proof after committing an attack. So, that is perplexing duty to find evidences from a group of machines, and there is an essential to find that mischievous activity by applying new approach to decrease hard work afforded by digital forensic investigators (DFIs). The purpose of this exploration is to deliver ordinary practical approach in order to store forensics information which further provides better consequence of forensic investigation process. Information should archive in the particular format so we can categorize those data based on their object.

Keywords

Cyber-crime DFXML Evidence Suspicious Cyber-forensics Evidences Clustering Digital forensic File metadata 

References

  1. 1.
    Panchal EP (2013) Extraction of persistence and volatile forensics evidences from computer system. Int J Comput Trends Technol (IJCTT) 4(5):964–968. ISSN 2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group
  2. 2.
    Yagnik SB (2013) Requirements to build a system that uses machine learning based approach for analysis of forensic data. Int J Comput Trends Technol (IJCTT) 4(4):927–932. ISSN 2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group
  3. 3.
    Mattmann CA, Yang GH Multimedia metadata-based forensics in human trafficking web data. http://infosense.cs.georgetown.edu/publication/83.pdf
  4. 4.
    Patel PC (2013) Aggregation of digital forensics evidences. Int J Comput Trends Technol (IJCTT) 4(4):881–884. ISSN 2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group
  5. 5.
    Garfinkel S (2012) Digital forensics XML and the DFXML toolset. Elsevier Digit Invest 8(3–4):161–174CrossRefGoogle Scholar
  6. 6.
    Dey N, Santhi, V (eds) (2017) Intelligent techniques in signal processing for multimedia security. Springer International PublishingGoogle Scholar
  7. 7.
    Giura P, Memon N (2010) An efficient storage infrastructure for network forensics and monitoring. Polytechnic Institute of NYU, Six MetroTech Center, Brooklyn, NYGoogle Scholar
  8. 8.
    Ashor AS, Dey N (2017) Security of multimedia contents: a brief. In: Intelligent techniques in signal processing for multimedia security. Springer International Publishing, pp 3–14Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Computer Science and Engineering DepartmentRai UniversityAhmedabadIndia
  2. 2.Bhartiya Gyanpeeth MahavidyalayaUjjainIndia

Personalised recommendations