Abstract
The digital technologies are grown in such way that they are also leading to growth in digital crimes. The aim of digital forensics is to collect, analyze and present evidence related to digital crime and in front of court of law. There are several methods and tools in evidence collection and analysis. This paper gives a survey on digital forensic evidence collection and analysis. Recently, the cloud forensics has become very interesting area of research, as cloud computing is a collection of computer resources and services that can be easily implemented and managed, generally over the Internet. It also discusses about the challenges to be faced in evidence collection and its analysis.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ali, Khidir M. 2012. Digital Forensics Best Practices and Managerial Implications. In Fourth International Conference on Computational Intelligence, Communication Systems and Networks, IEEE.
Daniel, Larry, Lars Daniel. 2011. Digital Forensics for Legal Professionals, Understanding Digital Evidence from the Warrant to the Courtroom. Syngress Publishing.
Ieong, Ricci S.C. 2006. FORZA—Digital Forensics Investigation Framework That Incorporate Legal Issues. 3: 29–36.
22 Popular Computer Forensics Tools: https://resources.infosecinstitute.com/computer-forensics-tools/#gref.InfosecResources. 26 Mar 2018.
Yusoff, Yunus, Roslan, Ismail, and Zainuddin, Hassan. 2011. Common Phases of Computer Forensics Investigation Models. International Journal of Computer Science & Information Technology (IJCSIT) 3 (3).
Varol, Asaf, Yeşim Ülgen Sönmez. 2017. Review of Evidence Analysis and Reporting Phases in Digital Forensics Process. In International Conference on Computer Science and Engineering (UBMK), IEEE.
Pollitt, M.M. 1995. Computer Forensics: An Approach to Evidence in Cyberspace. In Proceeding of the National Information Systems Security Conference. 2: 487–491, Baltimore, MD.
Pollitt, M.M. 2007. An Ad Hoc Review of Digital Forensic Models. In Proceeding of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE’07). Washington, USA.
Palmer, G. 2001. DTR-T001-01 Technical Report. A Road Map for Digital Forensic Research. In Digital Forensics Workshop (DFRWS), Utica, NY.
Reith, M., C. Carr, and G. Gunsh. 2002. An Examination of Digital Forensics Models. International Journal of Digital Evidence 1 (3): 1–2.
Carrier, B., and E.H. Spafford. 2003. Getting Physical with the Digital Investigation Process. International Journal of Digital Evidence 2 (2): 1–20.
Baryamereeba, V. and F. Tushabe. 2004. The Enhanced Digital Investigation Process Model. In Proceeding of Digital Forensic Research Workshop, Baltimore, MD.
Rogers, M.K., J. Goldman, R. Mislan, T. Wedge and S. Debrota. 2006. Computer Forensic Field Triage Process Model. Journal of Digital Forensics, Security and Law 27–40.
Forensic Examination of Digital Evidence: A Guide for Law Enforcement. 2004. Available online at: https://www.ncjrs.gov/pdffiles1/nij/199408.pdf.
Patil, Priya S., A. S., Kapse. 2018. Survey on Different Phases of Digital Forensics Investigation Models. International Journal of Innovative Research in Computer and Communication Engineering.
Cyber Secure India. http://www.cybersecureindia.in/cybergallery/disk-tools-data-capture/.
What-When-How, in Depth Tutorials. http://what-when-how.com/windows-forensic-analysis/registry-analysis-windows-forensic-analysis-part-1.
Best Forensic Email analysis software. https://www.thetoptens.com/best-forensic-email-analysis-software/.
Common Mobile Forensics tools and Techniques. https://resources.infosecinstitute.com/category/computerforensics/introduction/mobile-forensics/common-mobile-forensics-tools-and-techniques/#gref. Infosec Resources. 2018.
Hawkings, Peter. 2002. Macintosh Forensic Analysis Using OS X. SANS Institute Reading Room site.
Sira, Rommel. 2003. Network Forensics Analysis Tools: An Overview of an Emerging Technology. GSEC. Available online from: https://www.giac.org/paper/gsec/2478/network-forensics-analysis-tools-overview-emerging-technology/104303. SANS Institute.
Cankaya, Ebru Celikel, and Brad Kupka. 2016. A Survey of Digital Forensics Tools for Database Extraction, In 2016 Future Technologies Conference (FTC), IEEE.
Fahdi, M.L., N.L., Clarke, S.M., Furnell. 2013. Challenges to Digital Forensics: A Survey of Researchers & Practitioners Attitudes and Opinions. [Online]. P1. Available from:Â http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6641058.
Conlan, K., I. Baggili, and F. Breitinger. 2016. Anti-forensics: Furthering Digital Forensic Science Through a New Extended Granular Taxonomy. Digital Investigation 18: S66–S75.
Rekhis, S., N., Boudriga. 2010. Formal Digital Investigation of Anti-forensic Attacks. [Online]. P34. Available from:Â http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5491959.
Bui, S., Enyeart, M., and Luong, J. Issues in Computer Forensics. [Online]. P 7. Available from:Â http://www.cse.scu.edu/~jholliday/COEN150sp03/projects/Forensic%20Investigation.pdf.
Pichan, Ameer. 2015. Cloud Forensics: Technical Challenges, Solutions and Comparative Analysis. Digital Investigation. 13: 38–57.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Mohammmed, S., Sridevi, R. (2020). A Survey on Digital Forensics Phases, Tools and Challenges. In: Raju, K., Govardhan, A., Rani, B., Sridevi, R., Murty, M. (eds) Proceedings of the Third International Conference on Computational Intelligence and Informatics . Advances in Intelligent Systems and Computing, vol 1090. Springer, Singapore. https://doi.org/10.1007/978-981-15-1480-7_20
Download citation
DOI: https://doi.org/10.1007/978-981-15-1480-7_20
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-1479-1
Online ISBN: 978-981-15-1480-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)