Skip to main content

Spiral Model for Digital Forensics Investigation

  • Conference paper
  • First Online:
Security in Computing and Communications (SSCC 2017)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 746))

Included in the following conference series:

  • 1041 Accesses

Abstract

Digital forensics is the scientific analysis of digital crimes. It is analogous to physical crime scene investigation, which usually consists of collecting evidences, storing them at a proper place, documenting them, creating a hypothesis for the crime scene to analyze the situation, and presenting them before the court of law for jurisdiction. But, while dealing with things digitally, a proper framework is needed which should be applicable for all the crime scenes and for all the digital devices like mobile phones and computers, etc. This paper proposes a framework based on the spiral model of software development, which consist of risk analysis factor also for providing flexibility so that it can overcome all the drawbacks of previous methodologies. The biggest advantage of this method is its ability to plan next phase as per the outcome of previous phase because of its agile functioning and spiral behavior, to perform investigation as quickly as possible. It covers all the phases in the form of different iterations. Hence, this paper proposed a generic framework to perform digital forensics smoothly without any drawback at all.

Please note that the LNCS Editorial assumes that all authors have used the western naming convention, with given names preceding surnames. This determines the structure of the names in the running heads and the author index.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Pollitt, M.M.: Computer forensics: an approach to evidence in cyberspace. In: National Information System Security Conference (1995)

    Google Scholar 

  2. Farmer, D., Venema, W.: Computer Forensics Analysis Class Handouts (1999)

    Google Scholar 

  3. Mandia, K., Prosisse, C.: Incident Response. Osbourne/McGraw-Hill (2001)

    Google Scholar 

  4. Technical Working Group for Electrical Crime Scene Investigation. Electronic Crime Scene Investigation: A Guide for First Responders (2001)

    Google Scholar 

  5. Digital Forensics Research Workshop. A Road Map for Digital Forensics Research (2001)

    Google Scholar 

  6. Reith, M., Carr, C., Gunsch, G.: An examination of digital forensic models. Int. J. Digit. Evid. 1(3), 1–12 (2002)

    Google Scholar 

  7. Carrier, B., Spafford, E.: Getting physical with the investigative process. Int. J. Digital Evidence (2003)

    Google Scholar 

  8. Stephenson, P.: A Comprehesive Approach to Digital Incident Investigation. Elsevier Information Security Technical report (2003)

    Google Scholar 

  9. Ciardhuain, S.O.: An extended model of cybercrime investigations. Int. J. Digit. Evid. 3(1), 1–22 (2004)

    Google Scholar 

  10. Baryamureeba, V., Tushabe, F.: The enhanced digital investigation process model. In: DFRWS (2004)

    Google Scholar 

  11. Beebe, N., Clark, J.: A hierarchical objectives based framework for the digital investigations process. In: DFRWS (2004)

    Google Scholar 

  12. Carrier, B., Spafford, E.: An event based digital forensic investigation framework. In: DFRWS (2004)

    Google Scholar 

  13. Rubin, G., Yun, C., Gaertner, M.: Case-relevance information investigation: binding computer intelligence to the current computer forensic framework. Int. J. Digit. Evid. 4(1), 1–13 (2005)

    Google Scholar 

  14. Erbacher, R.F., Christensen, K., Sunderberg, A.: Visual forensic techniques and processes (2006)

    Google Scholar 

  15. Kohn, M., Eloff, J.H.P., Olivier, M.S.: Framework for a digital forensic investigation. In: Proceedings of Inforation Security South Africa (ISSA) (2006)

    Google Scholar 

  16. Kent, K., Chevalier, S., Grance, T., Dang, H.: Guide to Integrating Forensics into Incident Response. NIST Special Publication 800-86 (2006)

    Google Scholar 

  17. Rogers, M.K., Goldman, J., Mislan, R., Wedge, T., Debrota, S.: Computer forensics field triage process model. In: Conference on Digital Forensics Security and Law (2006)

    Google Scholar 

  18. Freiling, F., Schwittay, B.: A common process model for incident response and computer forensics. In: Conference on IT Incident Management and IT Forensics (2007)

    Google Scholar 

  19. Perumal, S.: Digital Forensic Model based on Malaysian Investigative Process (2009)

    Google Scholar 

  20. Cohen, F.: Toward a science of digital forensic evidence examination. In: Chow, K.-P., Shenoi, S. (eds.) DigitalForensics 2010. IFIP IAICT, vol. 337, pp. 17–35. Springer, Heidelberg (2010). doi:10.1007/978-3-642-15506-2_2

    Chapter  Google Scholar 

  21. Agarwal, A., Gupta, M., Gupta, S., Gupta, C.: Systematic digital forensic investigation model. Int. J. Comput. Sci. Secur. 5(1), 118–131 (2011)

    Google Scholar 

  22. Jones, A., Vidalis, S., Abouzakhar, N.: Information security and digital forensics in the world of cyber physical systems. In: Eleventh International Conference on Digital Information Management (2016)

    Google Scholar 

  23. Jones, J., Etzkorn, L.: Analysis of digital forensics live system acquisition methods to achieve optimal evidence preservation. In: Southeast con (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hitesh Hasija .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kothari, S., Hasija, H. (2017). Spiral Model for Digital Forensics Investigation. In: Thampi, S., Martínez Pérez, G., Westphall, C., Hu, J., Fan, C., Gómez Mármol, F. (eds) Security in Computing and Communications. SSCC 2017. Communications in Computer and Information Science, vol 746. Springer, Singapore. https://doi.org/10.1007/978-981-10-6898-0_26

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-6898-0_26

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-6897-3

  • Online ISBN: 978-981-10-6898-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics