Unveiling the Dynamic Landscape of Digital Forensics: The Endless Pursuit
Abstract
:1. Introduction
- An extensive analysis (the first of its kind, in our opinion) of the progression of computing, categorized into five distinct periods from the 1940s to the present day, grounded in significant technological advancements in Section 2.
- The evolution of the malicious use of computing technologies and the advancements in forensic science to combat these threats across different periods are discussed in Section 3, including:
- (a)
- The evolution from simple security to evidence recovery, computer forensics, digital evidence, and digital forensics, along with its emerging dimensions.
- (b)
- The metamorphosis of forensics tools, techniques, trainings, and facilities.
- (c)
- Some of the most talked-about forensics models/frameworks.
- (d)
- International initiatives and bodies dealing with digital forensics.
- The evolution of digital forensic approaches in various eras has been discussed in Section 4.
- Proposing an all-inclusive digital forensics process model that meets international standards and regulatory/legal requirements in Section 5.
- Identifying the shortfalls in previous forensic models/frameworks and drawing comparison with the proposed model in Section 6. Proposed model outperforms all the previous models.
2. Advancement in Computing
2.1. Dawn of Computers (Late 1940’s to Early 1970s)
2.2. Introduction of Personal Computers (Late 1970s to Late 1980s)
2.3. Growth of Personal Computers (1990s)
2.4. Introduction of Smart Phones and Portable Devices (2000 to 2009)
2.5. Ubiquitous Networks and Services (2010 Onward)
3. Trends in Misuse of Computing Technologies and Evolution of Digital Forensics
3.1. Trends in Misuses and Forensics-Late 1940’s to Early 1970s
3.2. Trends in Misuses and Forensics-Late 1970s to Late 1980s
3.2.1. Introduction of Laws for Computer Related Crimes
3.2.2. Emergence of Forensics Teams and Data Recovery Tools
3.2.3. First Ever Reported Case of Cyber Espionage
3.3. Trends in Misuses and Forensics-1990s
3.3.1. Standardization Efforts
- Technical Working Group Digital Evidence (TWGDE) In 1997, Federal Crime Laboratory Directors of U.S. constituted a Technical Working Group Digital Evidence (TWGDE) to deal with issues related to digital evidence, including drafting best practices document. In 1999, on recommendation of IOCE, this group was converted to a more elaborate Scientific Working Group Digital Evidence (SWGDE) [36,49].
- Forensic Computing Group (FCG) and Association of Chief Police Officers (ACPO) of UK The FCG of UK is the oldest organization in the world working on computer evidence. Under UK’s Association of Chief Police Officers (ACPO), this group was working on drafting guidelines for the safe handling of digital evidence including its seizure, acquisition, and examination [50]. These guidelines were eventually published in 1998 [51]. In 2015, ACPO was replaced by the National Police Chiefs’ Council (NPCC) [52].
- European Network of Forensic Science Institutes (ENFSI) In 1995, ENFSI was established, with the aim of strengthening cooperation between member European countries. In 1998, the Forensic Information Technology Working Group (FIT-WG) was established under ENFSI to work on the development and acceptance of guidelines, best practices, and standards related to information technology forensics [50].
- Technical Working Group for Electronic Crime Scene Investigation (TWGECSI) In 1998, TWGECSI was created by National Institute of Justice (NIJ), U.S. Department of Justice, to define the protocols for electronic investigations and prosecutions [53]. In 2001, Electronic Crime Scene Investigation: NIJ published a Guide for First Responders draughted by this group.
3.3.2. Forensics Trainings and Labs
3.3.3. Forensics Tools
3.3.4. From Computer Forensics to Digital Evidence
3.4. Trends in Misuses and Forensics-2000 to 2009
3.4.1. Improvements in Forensics Facilities
3.4.2. Forensics Models by Research Community/Academia
3.4.3. Metamorphosis of Forensics Tools
3.4.4. eDiscovery
- Information Management Phase This phase dealt with the actions required to enable the infrastructure for e-discovery.
- Identification This phase dealt with identifying potential evidence sources, along with their details.
- Preservation and Collection This phase dealt with preservation of evidence sources, identified in the second phase, from contamination, destruction, and collection of potential evidence relevant to the case.
- Processing, Review and Analysis This phase dealt with processing of acquired evidence by digital forensic investigators, result of the findings by legal experts and analysis of the result by attorneys for their relevance and quality.
- Production This phase dealt with delivery of investigation results to other relevant parties, in easy-to-understand format, through appropriate delivery mechanism.
- Presentation This phase dealt with the details of the presentation of evidence to the audience concerned, while ensuring compliance with the relevant legal requirements.
3.4.5. Emergence of Digital Forensics as a Profession
3.5. Trends in Misuses and Forensics-2010 Onward
3.5.1. Advancements in Forensics Models
Digital Forensics as a Service (DFaaS)
3.5.2. New Dimensions of Digital Forensics
Network Forensics
Cloud Forensics
IoT Forensics
Mobile Device Forensics
Privacy Concerns in Digital Forensics
3.5.3. Use of Artificial Intelligence (AI) and Machine Learning (ML) in Digital Forensics
- The efficacy and efficacy of the AI/ML models are dependent upon availability of training dataset; larger the better. However, the type and size of datasets required for training AL/ML models is not available, thereby questioning the quality and integrity of results produced by these models.
- Quantum of online data can be issue for AI/ML models, necessitating incorporation of scalability in proposed models.
- Draft standards for incorporating AI/ML in digital forensic investigations to ensure admissibility in a court of law.
- Deployment of AI/ML solutions can lead to ethical issues, violating the privacy of user data.
- AI/ML models may need to be continuously trained in order to deal with evolving threats.
3.5.4. Standardization Efforts
- ISO/IEC. It is amongst the leading organizations in this regard. Its ISO/IEC JTC 1 is dealing with Information Technology and its various sub-committees, working groups and advisory groups are working on different subjects including ISO/IEC JTC 1/WG 10 working on Internet of Things (IoT), WG11 working on smart cities, and ISO/IEC JTC 1/SC 38 working on cloud computing and distributed platforms. ISO/IEC 27050-1: 2019 is the ISO standard released in 2019, dealing with eDiscovery [152]. ISO/IEC 27043 is another standard released in 2015, dealing with security techniques of investigation principles and processes [153]. Consortium of Digital Forensic Specialists (CDFS) is another international consortium launched in 2011 in U.S. to refine the field of digital forensics through standardization, ethics, outreach and advocacy from a unified platform [154,155].
- Unified Cyber Ontology (UCO) by U.S. Department of Justice (DOJ). UCO was developed in 2011, with an aim to standardize and incorporate interoperability in findings/results of digital forensic investigation. In 2014, UCO was handed over to NIST and is now being updated by it [156].
- NIST’s Organization of Scientific Area Committees (OSAC) for Forensic Science. In order to address the lack of discipline specific forensic science standard, NIST, in collaboration with U.S. Department of Justice (DOJ), established OSAC in 2013. The OSAC took on the responsibility of developing technically sound standards and guidelines and promoting their use in the forensic science community [159]. In the same year, OSAC established a working group, named the Cyber Forensics Investigation Working Group (CFIWG), to work on standardization and interoperability of digital forensic tools and techniques. CFIWG started working on the Cyber-investigation Analysis Standard Expression (CASE), and its first version was released in 2017. CASE was developed as an advanced version of UCO and DFAX, offering flexibility, extensibility, and adaptability to represent information about digital evidence, including collection collected, extracted, analysed, and exchanged throughout the digital forensic process [160].
4. Evolution of Digital Forensics Approaches
4.1. Forensics Through System Audits (1945–1975)
4.2. Forensics by Network Administrators (1975–1990)
4.3. Forensics Through Data Recovery Tools (1984–1990)
4.4. Introduction of Computer Forensics (1990 Onward)
- Development of forensics tools, meeting the requirements of computer forensics, started in the 1990s, giving a new approach to the forensic process.
- Computer forensics became a proper science, requiring handling by expert computer forensics investigators in specialized labs. In order to meet these requirements, specialized computer labs and training centres starting establishing from 1993 onward.
- Following the footsteps of forensics science, efforts started in 1993 to standardize the procedures and techniques for computer forensics.
- In order to meet various regulatory requirements and take standardization efforts a step further, work on Accreditation & Certifications started in 1995.
4.5. Digital Evidence and Digital Forensics (1998 Onward)
4.6. Forensics Models (2000 Onward)
4.7. eDiscovery (2006)
4.8. New Dimensions and Approaches of Digital Forensics (2010s Onward)
5. An All-Inclusive Digital Forensics Process Model
5.1. Preparation and Readiness Phase
- i
- Initial assessment of the expected crime scene.
- ii
- Obtaining search warrants to carry out the forensic investigation.
- iii
- Obtaining the necessary authorizations and approvals from competent authorities.
- iv
- Planning and strategy for carrying out the forensic investigation.
- v
- Study of laws applicable to the investigation of digital forensics concerned.
- vi
- Ensuring operational readiness of investigators to carry out digital forensic investigations.
- vii
- Infrastructure readiness for conducting forensic investigations (aka forensic readiness).
- viii
- Ensuring requisite capabilities with investigators, like Honeypots and similar tools, to deal with booby trap and remote killing of computing machines.
- ix
- Ensuring awareness amongst the investigators, as well as the entire organization.
- x
- Issuance of notification regarding initialization of forensic investigations.
5.2. Securing Crime Scene Phase
- i
- Securing crime scene to avoid any contamination that may leads to compromise of integrity.
- ii
- Documenting the crime scene, to ensure availability of requisite information during next phases.
5.3. Survey & Recognition Phase
- i
- Identifying potential sources of evidences at crime scene.
- ii
- Preserving potential sources of evidences from contamination, to avoid raising integrity issues.
- iii
- Formulating acquisition plan keeping in view the potential sources of evidence.
5.4. Acquisition Phase
- i
- Collecting evidences from potential sources.
- ii
- If potential source is assumed to contain privileged information (encrypted or privacy data), filtering of source is to be carried out and its acquisition is to be carried out as per latest legislation/local laws e.g., obtain legal permission/warrant, if applicable, to collect evidence from said device (same may be added in Preparation and Readiness Phase). However, if legal permission/warrant is not available, evidences can not be collected from concerned sources.
- iii
- Ensuring integrity of evidence during acquisition of evidence from concerned sources.
- iv
- Documenting each activity being performed on Evidence, to ensure maintenance of Chain of Custody of evidences.
5.5. Preservation Phase
- i
- Maintaining multiple copies of digital evidence and ensuring their integrity as per the latest legislation/local laws.
- ii
- If privileged information (having encrypted or privacy data) is encountered during Acquisition Phase, then its preservation is to be carried out as per latest legislation/local laws, e.g., keeping evidence carrying privileged data, separate. If compliance to regulatory requirements is not possible due to technical limitations, it cannot be preserved/further processed.
- iii
- Ensuring appropriate labeling and packaging of evidence, to facilitate investigators in next phases.
- iv
- Ensuring safe transportation of evidence to avoid compromise of integrity during transportation.
- v
- Ensuring safe storage of evidence to avoid compromise of its integrity.
- vi
- Documenting each activity that is performed on evidence for the maintenance of the chain of custody.
5.6. Examination Phase
- i
- Examining and extraction of information from evidences by forensic experts.
- ii
- Documenting each activity being performed on Evidence, for maintenance of Chain of Custody.
5.7. Analysis Phase
- i
- Technical review of results of examination and reconstruction of cyber crime by investigators, to reach a conclusion as to what actually happened at the crime scene.
- ii
- Generating various hypothesis based on results.
5.8. Information Sharing Phase
- i
- Being part of Forensics Investigation activities, this phase comprises sharing of information between law enforcement agencies, to obtain comprehensive criminal profile of the suspect/suspected activities.
5.9. Presentation Phase
- i
- Preparation of report carrying summary of investigation process and conclusions drawn during the investigation process. This report should use words and terms which can easily be understood by the court of concerned authority.
- ii
- Testify before a court of law or concerned authority.
- iii
- Presenting proofs to defend the conclusions drawn during the investigation process.
5.10. Results Phase
- i
- Documenting the result of presentation phase for future reference.
- ii
- Archiving of the investigation process for future reference.
- iii
- Sharing of investigations with the concerned authorities to facilitate them in updating procedures and records.
5.11. Review Phase
- i
- Analysis of the investigation process and results to improve the investigation process for future use.
- ii
- Appropriate disposal of evidence, ensuring privacy, intellectual property rights, business secrets.
6. Findings/Discussion
6.1. Comparison with ESDFIM
- ESDFIM misses the step regarding awareness of the incident and investigation amongst the investigators and the entire organization, and issuance of notification regarding start of investigation process, as included in Preparation and Readiness Phase of proposed model.
- ESDFIM does not include the requirement to formulate an acquisition plan after identifying the potential sources of evidence at the crime scene. With the latest development in computing technologies and widespread adoption of technical gadgetry in daily life, investigators need to formulate an acquisition plan after the survey of crime scene, to cater for new devices which may not have been planned earlier. The same is covered in Survey & Recognition Phase of the proposed model.
- ESDFIM is silent on handling of privileged information expected to be contained in potential source, as included in the Acquisition Phase of the proposed model. This has emerged as a critical requirement in the context of latest privacy-related standards and laws like GDPR, CCPA and CPRA (discussed in Section 3.5.2).
- ESDFIM specifies the need to maintain the chain of custody when collecting evidence, yet it fails to guarantee this during transportation. This aspect is addressed in the Preservation Phase of the proposed model.
- ESDFIM does not specify the requirement of sharing the results of investigations with other investigating bodies. Keeping in view the fast evolving nature of technologies, sharing of investigation results amongst investigation community can be of great benefit. Same has been covered in the Result Phase of the proposed model.
- ESDFIM does not specify the disposal of evidence after completion of the investigation process. Since some of the evidence can contain privileged information (related to privacy, proprietary or business secrets etc), its secure disposal is a critical issue with legal bindings. The same has been covered in the Review Phase of the proposed model.
6.2. Comparison with HEIM
- HEIM does not include numerous important steps of Preparation & Readiness Phases of the proposed model including initial assessment of expected crime scene, planning and strategy to carry out investigation, ensuring requisite capabilities with investigators to deal with booby traps and remote interference with potential evidence and awareness about investigation within organization.
- Similar to ESDFIM, HEIM does not explicitly mandate the creation of an acquisition plan after determining potential evidence sources at a crime scene. This aspect is addressed in the Survey & Recognition phase of the proposed model.
- Similar to ESDFIM, HEIM does not address how to manage privileged information likely to be present in potential sources, as outlined in the Acquisition and Preservation phases of the proposed model.
- HEIM neither spells out the requirement to ensure integrity of evidence nor asks for maintenance of Chain of Custody in any step, which are a mandatory requirement and mentioned in the proposed model.
- Obtaining and maintaining multiple copies of digital evidence are critical requirements in any forensic investigation process. HEIM does not include these steps. Same is covered in Preservation Phase of the proposed model.
- Examination and analysis are two distinct activities, former to be carried out at crime scene and latter to be done under laboratory environments. HEIM has combined these activities into examination step. Moreover, reconstruction of crime also falls part of Analysis but HEIM has included it in conclusion step.
- Sharing of forensic investigation activities with law enforcement agencies to obtain criminal profile of suspect mentioned in Information Sharing Phase of the proposed model, is missing on HEIM.
- Similar to ESDFIM, HEIM does not specify the disposal of evidence after the completion of the investigation process. The same has been covered in the Review Phase of the proposed model.
7. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Digital Forensics; Technical Report; Computer Security Resource Center: Gaithersburg, MD, USA, 2017.
- Kent, K.; Chevalier, S.; Grance, T. Guide to integrating forensic techniques into incident. In Guide to Integrating Forensic Techniques into Incident Response 800-86; NIST: Gaithersburg, MD, USA, 2006. [Google Scholar]
- Palmer, G.L. Forensic analysis in the Digital World. Int. J. Digit. Evid. 2002, 1, 1–6. [Google Scholar]
- Rohatgi, S.; Shrivastava, S. Combating Cybercrimes with Digital Forensics. In Advancements in Cybercrime Investigation and Digital Forensics; Apple Academic Press: Palm Bay, FL, USA, 2024; pp. 97–113. [Google Scholar]
- Goldstine, H.H.; Goldstine, A. The electronic numerical integrator and computer (eniac). Math. Tables Other Aids Comput. 1946, 2, 97–110. [Google Scholar] [CrossRef]
- Brinkman, W.F.; Haggan, D.E.; Troutman, W.W. A history of the invention of the transistor and where it will lead us. IEEE J. Solid State Circuits 1997, 32, 1858–1865. [Google Scholar] [CrossRef]
- Pollitt, M. A history of digital forensics. In Proceedings of the IFIP International Conference on Digital Forensics, Hong Kong, China, 4–6 January 2010; Springer: Berlin/Heidelberg, Germany, 2010; pp. 3–15. [Google Scholar]
- McPherson, S.S. Tim Berners-Lee: Inventor of the World Wide Web; Twenty-First Century Books, The Rosen Publishing Group, Inc.: New York, NY, USA, 2009. [Google Scholar]
- Porterfield, J. Tim Berners-Lee; The Rosen Publishing Group, Inc.: New York, NY, USA, 2015. [Google Scholar]
- Saxena, A.N. Invention of Integrated Circuits: Untold Important Facts; World Scientific: Singapore, 2009. [Google Scholar]
- Schulz, M. The end of the road for silicon? Nature 1999, 399, 729–730. [Google Scholar] [CrossRef]
- Betker, M.R.; Fernando, J.S.; Whalen, S.P. The history of the microprocessor. Bell Labs Tech. J. 1997, 2, 29–56. [Google Scholar] [CrossRef]
- Bardini, T. Bootstrapping: Douglas Engelbart, Coevolution, and the Origins of Personal Computing; Stanford University Press: Redwood City, CA, USA, 2000. [Google Scholar]
- Mims, F.M., III. The tenth anniversary of the Altair 8800. Comput. Electron. 1985, 23, 58–82. [Google Scholar]
- Green, S. Apple; Bellwether Media: Hopkins, MN, USA, 2015. [Google Scholar]
- Bride, E. The IBM Personal Computer: A Software-Driven Market. Computer 2011, 44, 34–39. [Google Scholar] [CrossRef]
- Leiner, B.M.; Cerf, V.G.; Clark, D.D.; Kahn, R.E.; Kleinrock, L.; Lynch, D.C.; Postel, J.; Roberts, L.G.; Wolff, S.S. The past and future history of the Internet. Commun. ACM 1997, 40, 102–108. [Google Scholar] [CrossRef]
- Berners-Lee, T.; Cailliau, R.; Luotonen, A.; Nielsen, H.F.; Secret, A. The world-wide web. Commun. ACM 1994, 37, 76–82. [Google Scholar] [CrossRef]
- Max Roser, H.R.; Ortiz-Ospina, E. Internet. Our World in Data. 2015. Available online: https://ourworldindata.org/internet (accessed on 26 June 2024).
- Zeadally, S.; Siddiqui, F.; Baig, Z. 25 years of bluetooth technology. Future Internet 2019, 11, 194. [Google Scholar] [CrossRef]
- Thomas, J. The History of WiFi. Available online: https://purple.ai/blogs/history-wifi/ (accessed on 25 May 2014).
- Dahlman, E.; Parkvall, S.; Skold, J.; Beming, P. 3G Evolution: HSPA and LTE for Mobile Broadband; Academic Press: Cambridge, MA, USA, 2010. [Google Scholar]
- Yu, A. USB Flash Disks: Say Goodbye to Floppy Disks. Available online: https://www.cityu.edu.hk/its/news/2003/12/31/usb-flash-disks-say-goodbye-floppy-disks (accessed on 10 December 2003).
- Kim, J.; Baratto, R.A.; Nieh, J. pTHINC: A thin-client architecture for mobile wireless web. In Proceedings of the 15th International Conference on World Wide Web, Scotland, UK, 23–26 May 2006; pp. 143–152. [Google Scholar]
- Murugesan, S. Understanding Web 2.0. IT Prof. 2007, 9, 34–41. [Google Scholar] [CrossRef]
- Shahid, M.; Ahmad, B.; Khan, M.R. English Language Learners as Digital Content Creators: An Exploration of Social Networking on the Perceived Development of Language Skills. Comput. Assist. Lang. Learn. Electron. J. 2024, 25, 46–63. [Google Scholar]
- Etemadi, M.; Abkenar, S.B.; Ahmadzadeh, A.; Kashani, M.H.; Asghari, P.; Akbari, M.; Mahdipour, E. A systematic review of healthcare recommender systems: Open issues, challenges, and techniques. Expert Syst. Appl. 2023, 213, 118823. [Google Scholar] [CrossRef]
- Satyanarayanan, M. A brief history of cloud offload: A personal journey from odyssey through cyber foraging to cloudlets. Getmobile Mob. Comput. Commun. 2015, 18, 19–23. [Google Scholar] [CrossRef]
- Wang, L.; Von Laszewski, G.; Younge, A.; He, X.; Kunze, M.; Tao, J.; Fu, C. Cloud computing: A perspective study. New Gener. Comput. 2010, 28, 137–146. [Google Scholar] [CrossRef]
- Zareen, M.S.; Tariq, M. Internet of things (IoT): The next paradigm shift but whats the delay? In Proceedings of the 17th IEEE International Multi Topic Conference 2014, Karachi, Pakistan, 8–10 December 2014; IEEE: New York, NY, USA, 2014; pp. 143–148. [Google Scholar]
- Carton, B.; Mongardini, J.; Li, Y. Smartphones Drive New Global Tech Cycle, but Is Demand Peaking? Available online: https://blogs.imf.org/2018/02/08/smartphones-drive-new-global-tech-cycle-but-is-demand-peaking/ (accessed on 8 February 2018).
- Guevarra, L.M. E-Commerce: The Past, Present, and Future. Available online: https://www.spiralytics.com/blog/past-present-future-ecommerce/ (accessed on 6 September 2018).
- Nofer, M.; Gomber, P.; Hinz, O.; Schiereck, D. Blockchain. Bus. Inf. Syst. Eng. 2017, 59, 183–187. [Google Scholar] [CrossRef]
- Makhdoom, I.; Abolhasan, M.; Abbas, H.; Ni, W. Blockchain’s adoption in IoT: The challenges, and a way forward. J. Netw. Comput. Appl. 2019, 125, 251–279. [Google Scholar] [CrossRef]
- Gartner. Gartner Forecasts Global Devices Installed Base to Reach 6.2 Billion Units in 2021 Gartner Forecasts Global Devices Installed Base to Reach 6.2 Billion Units in 2021. Available online: https://www.gartner.com/en/newsroom/press-releases/2021-04-01-gartner-forecasts-global-devices-installed-base-to-reach-6-2-billion-units-in-2021 (accessed on 1 April 2021).
- Whitcomb, C.M. An historical perspective of digital evidence: A forensic scientist’s view. Int. J. Digit. Evid. 2002, 1, 7–15. [Google Scholar]
- Nelson, B.; Phillips, A.; Steuart, C. Guide to Computer Forensics and Investigations; Cengage Learning: Boston, MA, USA, 2014. [Google Scholar]
- Sommer, P. The future for the policing of cybercrime. Comput. Fraud. Secur. 2004, 2004, 8–12. [Google Scholar] [CrossRef]
- About the High Technology Crime Investigation Association (HTCIA). Available online: https://htcia.org/about/ (accessed on 21 August 2024).
- Department of Homeland Security United States Secret Service. US Secret Service (USSS) Electronic Crimes Special Agent Program (ECSAP) Directives, 2010–2015. Available online: https://www.governmentattic.org/35docs/USSSecsapd_2010-2015.pdf (accessed on 14 December 2018).
- Seized Computer Evidence Recovery Specialist. Available online: https://www.fletc.gov/seized-computer-evidence-recovery-specialist (accessed on 23 May 2024).
- Jaishankar, K. Cyber victimology: A new sub-discipline of the twenty-first century victimology. In An International Perspective on Contemporary Developments in Victimology: A Festschrift in Honor of Marc Groenhuijsen; Springer: Berlin/Heidelberg, Germany, 2020; pp. 3–19. [Google Scholar]
- IACIS History. Available online: https://www.iacis.com/about/history/ (accessed on 28 February 2024).
- Collier, P.A.; Spaul, B.J. A forensic methodology for countering computer crime. Artif. Intell. Rev. 1992, 6, 203–215. [Google Scholar] [CrossRef]
- Stoll, C. The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage; Simon and Schuster: New York, NY, USA, 2005. [Google Scholar]
- Garfinkel, S.L. Digital forensics research: The next 10 years. Digit. Investig. 2010, 7, S64–S73. [Google Scholar] [CrossRef]
- Noblett, M.G.; Pollitt, M.M.; Presley, L.A. Recovering and examining computer forensic evidence. Forensic Sci. Commun. 2000, 2, 1–13. [Google Scholar]
- Snyder, K.V. The Development of Current Digital Forensics Policies and Federal Legislation. Ph.D. Thesis, University of Colorado at Denver, Denver, CO, USA, 2021. [Google Scholar]
- Pollitt, M.M. The very brief history of digital evidence standards. In Proceedings of the Working Conference on Integrity and Internal Control in Information Systems, Bonn, Germany, 11–12 November 2002; Springer: Berlin/Heidelberg, Germany, 2002; pp. 137–143. [Google Scholar]
- Citeseer. Report on Digital Evidence. In Proceedings of the 13th INTERPOL Forensic Science Symposium, Lyon, France, 16–19 October 2001. [Google Scholar]
- Horsman, G. ACPO principles for digital evidence: Time for an update? Forensic Sci. Int. Rep. 2020, 2, 100076. [Google Scholar] [CrossRef]
- About Us. Available online: https://www.npcc.police.uk/About-Us/about-us/ (accessed on 26 September 2024).
- National Institute of Justice. Technical Working Group for Electronic Crime Scene Investigation. In Electronic Crime Scene Investigation: A Guide for First Responders; US Department of Justice, National Institute of Justice (U.S.): Washington, DC, USA, 2001. [Google Scholar]
- European Committee on Crime Problems (CDPC) Bureau (CDPC-BU)-Strasbourg, 21–22 November 1996, Meeitng Report. Available online: https://rm.coe.int/09000016804d6d2d (accessed on 25 November 2023).
- SWGDE. Digital Evidence: Standards and Principles Scientific Working Group on Digital Evidence (SWGDE) International Organization on Digital Evidence (IOCE). Available online: https://archives.fbi.gov/archives/about-us/lab/forensic-science-communications/fsc/april2000/swgde.htm (accessed on 23 October 1999).
- FSAB. About the FSAB. Available online: http://thefsab.org (accessed on 24 January 2024).
- Jones, G.R. Forensic Accreditation Board: An Accreditation Program for Forensic Specialty Programs. Available online: https://nij.ojp.gov/library/publications/forensic-accreditation-board-accreditation-program-forensic-specialty-programs (accessed on 3 December 2003).
- Sanju. F.A.C.T. (The Forensic Association of Computer Technologists). Available online: https://www.hiox.org/3300-fact.php (accessed on 28 May 2024).
- ASCLD/LAB. Guidelines for Forensics Laboratory Management Practices; Technical Report; American Society of Crime Laboratory Directors (ASCLD): Garner, NC, USA, 1994. [Google Scholar]
- Computer Technology Investigators Network. Available online: https://ctin.org (accessed on 12 July 2024).
- Specht, J. The Origins and Evolution of DC3; Technical Report; Office of Special Investgations: Quantico, VA, USA, 2020. [Google Scholar]
- DC3 HISTORY. Available online: https://www.dc3.mil/About-DC3/History/ (accessed on 12 June 2023).
- DC3 Chronological History. Available online: https://www.dc3.mil/Portals/100/Documents/DC3/DC3_Home/About_History/History (accessed on 28 May 2019).
- SafeBack3.0. Available online: http://www.forensics-intl.com/safeback.html (accessed on 15 April 2023).
- EnCase Forensic. Available online: https://security.opentext.com/encase-forensic (accessed on 25 April 2023).
- Jones, G.M.; Winster, S.G. An Insight into Digital Forensics: History, Frameworks, Types and Tools; Cyber Security and Digital Forensics: Hoboken, NJ, USA, 2022; pp. 105–125. [Google Scholar]
- Pollitt, M.M. Principles, practices, and procedures: An approach to standards in computer forensics. In Proceedings of the Second International Conference on Computer Evidence, Montreal, QC, Canada, 14–16 August 1995; pp. 10–15. [Google Scholar]
- Stoyanova, M.; Nikoloudakis, Y.; Panagiotakis, S.; Pallis, E.; Markakis, E.K. A survey on the internet of things (IoT) forensics: Challenges, approaches, and open issues. IEEE Commun. Surv. Tutorials 2020, 22, 1191–1221. [Google Scholar] [CrossRef]
- Palmer, G. A road map for digital forensic research. In Proceedings of the First Digital Forensic Research Workshop, Utica, NY, USA, 7–8 August 2001; pp. 27–30. [Google Scholar]
- About Us. Available online: https://dfrws.org/about-us/ (accessed on 26 April 2023).
- Brill, A.E.; Pollitt, M.; Morgan Whitcomb, C. The evolution of computer forensic best practices: An update on programs and publications. J. Digit. Forensic Pract. 2006, 1, 3–11. [Google Scholar] [CrossRef]
- NIST. National Software Reference Library (NSRL). Available online: https://www.nist.gov/itl/ssd/software-quality-group/national-software-reference-library-nsrl (accessed on 18 November 2019).
- ITL History Timeline 1950-Present. Available online: https://www.nist.gov/itl/about-itl/itl-history-timeline (accessed on 18 August 2020).
- NIST. Computer Forensics Tool Testing Program (CFTT). Available online: https://www.nist.gov/itl/ssd/software-quality-group/computer-forensics-tool-testing-program-cftt (accessed on 15 November 2019).
- IFIP. Factsheet WG 11.9 Digital Forensics; Technical Report; International Federation for Information Processing: Laxenburg, Austria, 2006. [Google Scholar]
- Kruse, W.G., II; Heiser, J.G. Computer Forensics: Incident Response Essentials; Pearson Education: Quarry Bay, Hong Kong, 2001. [Google Scholar]
- Reith, M.; Carr, C.; Gunsch, G. An examination of digital forensic models. Int. J. Digit. Evid. 2002, 1, 1–12. [Google Scholar]
- Carrier, B.; Spafford, E.H. Getting physical with the digital investigation process. Int. J. Digit. Evid. 2003, 2, 1–20. [Google Scholar]
- Carrier, B.; Spafford, E. An event-based digital forensic investigation framework. In Digital Investigation; Center for Education and Research in Information Assurance and Security: West Lafayette, IN, USA, 2004. [Google Scholar]
- Baryamureeba, V.; Tushabe, F. The enhanced digital investigation process model. In Proceedings of the Digital Forensic Research Conference, Baltimore, MD, USA, 11–13 August 2004. [Google Scholar]
- Mohay, G.M. Computer and Intrusion Forensics; Artech House: Norwood, MA, USA, 2003. [Google Scholar]
- Ciardhuáin, S.Ó. An Extended Model of Cybercrime Investigations. Int. J. Digit. Evid. 2004, 3, 1–22. [Google Scholar]
- Rogers, M.K.; Goldman, J.; Mislan, R.; Wedge, T.; Debrota, S. Computer forensics field triage process model. J. Digit. Forensics Secur. Law 2006, 1, 2. [Google Scholar] [CrossRef]
- Freiling, F.C.; Schwittay, B. A common process model for incident response and computer forensics. In IMF 2007: IT-Incident Management & IT-Forensics; Bastian Schwittay Symantec (Deutschland) GmbH: Gelsenkirchen, Germany, 2007. [Google Scholar]
- Perumal, S. Digital Forensic Model based on Malaysian Investigation Process. Int. J. Comput. Sci. Netw. Secur. 2009, 9, 38–44. [Google Scholar]
- OpenText Security Overview. Available online: https://security.opentext.com (accessed on 25 April 2023).
- Sommer, P. Forensic science standards in fast-changing environments. Sci. Justice 2010, 50, 12–17. [Google Scholar] [CrossRef] [PubMed]
- Wiki, F. Helix LiveCD. Available online: https://forensics.fandom.com/wiki/Helix_LiveCD (accessed on 25 April 2023).
- History of The Sleuthkit. Available online: http://www.sleuthkit.org/sleuthkit/history.php (accessed on 25 April 2023).
- Sleuthkit/Sleuthkit. Available online: https://github.com/sleuthkit/sleuthkit/releases?after=sleuthkit-3.1.2 (accessed on 25 April 2023).
- Sleuthkit/Autopsy. Available online: https://github.com/sleuthkit/autopsy/releases?after=autopsy-3.0.0 (accessed on 25 April 2023).
- History of Autopsy. Available online: http://www.sleuthkit.org/autopsy/history.php (accessed on 25 April 2023).
- Daniel, L.E.; Daniel, L.E. Chapter 5-Overview of Digital Forensics Tools. In Digital Forensics for Legal Professionals; Daniel, L.E., Daniel, L.E., Eds.; Syngress: Boston, MA, USA, 2012; pp. 33–39. [Google Scholar] [CrossRef]
- Rothstein, B.J.; Hedges, R.J.; Wiggins, E.C. Managing Discovery of Electronic Information: A Pocket Guide for Judges; Federal Judicial Center Publication: Ottawa, ON, Canada, 2007. [Google Scholar]
- Reporting from the EDRM Mid-Year Meeting-CloudNine. Available online: https://cloudnine.com/ediscoverydaily/electronic-discovery/reporting-from-the-edrm-mid-year-meeting/ (accessed on 24 August 2021).
- EDRM Model|EDRM. Available online: https://edrm.net/edrm-model/ (accessed on 18 August 2021).
- Billard, D. An extended model for e-discovery operations. In Proceedings of the IFIP International Conference on Digital Forensics, Orlando, FL, USA, 26–28 January 2009; Springer: Berlin/Heidelberg, Germany, 2009; pp. 277–287. [Google Scholar]
- Conrad, J.G. E-Discovery revisited: The need for artificial intelligence beyond information retrieval. Artif. Intell. Law 2010, 18, 321–345. [Google Scholar] [CrossRef]
- Conrad, J.G. E-Discovery Revisited: A Broader Perspective for Ir Researchers; Research & Development Thomson Legal & Regulatory: St. Paul, MN, USA, 2007. [Google Scholar]
- Grobler, C.; Louwrens, C.; von Solms, S.H. A multi-component view of digital forensics. In Proceedings of the 2010 International Conference on Availability, Reliability and Security, Krakow, Poland, 15–18 February 2010; IEEE: New York, NY, USA, 2010; pp. 647–652. [Google Scholar]
- Alharbi, S.; Weber-Jahnke, J.; Traore, I. The proactive and reactive digital forensics investigation process: A systematic literature review. In Proceedings of the International Conference on Information Security and Assurance, Brno, Czech Republic, 15–17 August 2011; Springer: Berlin/Heidelberg, Germany, 2011; pp. 87–100. [Google Scholar]
- Agarwal, A.; Gupta, M.; Gupta, S.; Gupta, S.C. Systematic digital forensic investigation model. Int. J. Comput. Sci. Secur. (IJCSS) 2011, 5, 118–131. [Google Scholar]
- National Institute of Justice; U.S. Department of Justice. Forensic Examination of Digital Evidence: A Guide for Law Enforcement; Technical Report; U.S. Department of Justice: Washington, DC, USA, 2004.
- Kyei, K.; Zavarsky, P.; Lindskog, D.; Ruhl, R. A review and comparative study of digital forensic investigation models. In Proceedings of the International Conference on Digital Forensics and Cyber Crime, Lafayette, IN, USA, 25–26 October 2012; Springer: Berlin/Heidelberg, Germany, 2012; pp. 314–327. [Google Scholar]
- Ademu, I.O.; Imafidon, C.O.; Preston, D.S. A new approach of digital forensic model for digital forensic investigation. Int. J. Adv. Comput. Sci. Appl. 2011, 2, 175–178. [Google Scholar]
- Martini, B.; Choo, K.K.R. An integrated conceptual digital forensic framework for cloud computing. Digit. Investig. 2012, 9, 71–80. [Google Scholar] [CrossRef]
- Vlachopoulos, K.; Magkos, E.; Chrissikopoulos, V. A model for hybrid evidence investigation. Int. J. Digit. Crime Forensics (IJDCF) 2012, 4, 47–62. [Google Scholar] [CrossRef]
- Kohn, M.D.; Eloff, M.M.; Eloff, J.H. Integrated digital forensic process model. Comput. Secur. 2013, 38, 103–115. [Google Scholar] [CrossRef]
- Lee, J.; Hong, D. Pervasive forensic analysis based on mobile cloud computing. In Proceedings of the 2011 Third International Conference on Multimedia Information Networking and Security, Shanghai, China, 4–6 November 2011; IEEE: New York, NY, USA, 2011; pp. 572–576. [Google Scholar]
- Pilli, E.S.; Joshi, R.; Niyogi, R. A generic framework for network forensics. Int. J. Comput. Appl. 2010, 1, 11. [Google Scholar] [CrossRef]
- Caviglione, L.; Wendzel, S.; Mazurczyk, W. The future of digital forensics: Challenges and the road ahead. IEEE Secur. Priv. 2017, 15, 12–17. [Google Scholar] [CrossRef]
- Herman, M.; Iorga, M.; Salim, A.M.; Jackson, R.H.; Hurst, M.R.; Leo, R.; Lee, R.; Landreville, N.M.; Mishra, A.K.; Wang, Y.; et al. NIST Cloud Computing Forensic Science Challenges; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2020; pp. 10–70.
- Zareen, M.S.; Waqar, A.; Aslam, B. Digital forensics: Latest challenges and response. In Proceedings of the 2013 2nd National Conference on Information Assurance (NCIA), Rawalpindi, Pakistan, 11–12 December 2013; IEEE: New York, NY, USA, 2013; pp. 21–29. [Google Scholar]
- Alex, M.E.; Kishore, R. Forensics framework for cloud computing. Comput. Electr. Eng. 2017, 60, 193–205. [Google Scholar] [CrossRef]
- Khan, A.A.; Shaikh, A.A.; Laghari, A.A.; Rind, M.M. Cloud forensics and digital ledger investigation: A new era of forensics investigation. Int. J. Electron. Secur. Digit. Forensics 2023, 15, 1–23. [Google Scholar] [CrossRef]
- Zhang, W.E.; Sheng, Q.Z.; Mahmood, A.; Tran, D.H.; Zaib, M.; Hamad, S.A.; Aljubairy, A.; Alhazmi, A.A.F.; Sagar, S.; Ma, C. The 10 Research Topics in the Internet of Things. In Proceedings of the 2020 IEEE 6th International Conference on Collaboration and Internet Computing (CIC), Atlanta, GA, USA, 1–3 December 2020; pp. 34–43. [Google Scholar] [CrossRef]
- Ryan, P.J.; Watson, R.B. Research Challenges for the Internet of Things: What Role Can or Play? Systems 2017, 5, 24. [Google Scholar] [CrossRef]
- Alenezi, A.; Atlam, H.; Alsagri, R.; Alassafi, M.; Wills, G. IoT forensics: A state-of-the-art review, callenges and future directions. In Proceedings of the 4th International Conference on Complexity, Future Information Systems and Risk (COMPLEXIS 2019), Heraklion, Greece, 2–4 May 2019. [Google Scholar]
- Oriwoh, E.; Jazani, D.; Epiphaniou, G.; Sant, P. Internet of Things Forensics: Challenges and approaches. In Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, Austin, TX, USA, 20–23 October 2013; pp. 608–615. [Google Scholar] [CrossRef]
- Janarthanan, T.; Bagheri, M.; Zargari, S. IoT Forensics: An Overview of the Current Issues and Challenges. In Digital Forensic Investigation of Internet of Things (IoT) Devices; Montasari, R., Jahankhani, H., Hill, R., Parkinson, S., Eds.; Springer International Publishing: Cham, Switzerland, 2021; pp. 223–254. [Google Scholar] [CrossRef]
- Do, Q.; Martini, B.; Choo, K.K.R. Cyber-physical systems information gathering: A smart home case study. Comput. Netw. 2018, 138, 1–12. [Google Scholar] [CrossRef]
- Awasthi, A.; Read, H.O.; Xynos, K.; Sutherland, I. Welcome pwn: Almond smart home hub forensics. Digit. Investig. 2018, 26, S38–S46. [Google Scholar] [CrossRef]
- Dorai, G.; Houshmand, S.; Baggili, I. I know what you did last summer: Your smart home Internet of Things and your iPhone forensically ratting you out. In Proceedings of the 13th International Conference on Availability, Reliability and Security, Hamburg, Germany, 27–30 August 2018; pp. 1–10. [Google Scholar]
- Guidelines on Mobile Device Forensics. Available online: https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-101r1.pdf (accessed on 14 September 2024).
- Tamma, R.; Skulkin, O.; Mahalik, H.; Bommisetty, S. Practical Mobile Forensics: Forensically Investigate and Analyze IOS, Android, and Windows 10 Devices; Packt Publishing: Birmingham, UK, 2020. [Google Scholar]
- BlackBerry 10 and BlackBerry OS Services FAQ—End of Life. Available online: https://www.blackberry.com/us/en/support/devices/end-of-life (accessed on 24 September 2024).
- Fernando, V. Cyber Forensics Tools: A Review on Mechanism and Emerging Challenges. In Proceedings of the 2021 11th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Paris, France, 19–21 April 2021; IEEE: New York, NY, USA, 2021; pp. 1–7. [Google Scholar]
- Lwin, H.H.; Aung, W.P.; Lin, K.K. Comparative analysis of Android mobile forensics tools. In Proceedings of the 2020 IEEE Conference on Computer Applications (ICCA), Yangon, Myanmar, 27–28 February 2020; IEEE: New York, NY, USA, 2020; pp. 1–6. [Google Scholar]
- Al-Dhaqm, A.; Abd Razak, S.; Ikuesan, R.A.; Kebande, V.R.; Siddique, K. A review of mobile forensic investigation process models. IEEE Access 2020, 8, 173359–173375. [Google Scholar] [CrossRef]
- ISO/IEC. ISO/IEC 29100:2024; Information Technology–Security Techniques–Privacy Framework. International Organization for Standardization and International Electrotechnical Commission: Geneva, Switzerland, 2024. Available online: https://www.iso.org/standard/85938.html (accessed on 11 October 2024).
- General Data Protection Regulation (GDPR)—Official Legal Text. Available online: https://gdpr-info.eu/ (accessed on 11 December 2021).
- CCPA and CPRA—iapp.org. Available online: https://iapp.org/resources/topics/ccpa-and-cpra/ (accessed on 13 November 2021).
- Goldman, E. An introduction to the california consumer privacy act (ccpa). In Santa Clara University Legal Studies Research Paper; Santa Clara University: Santa Clara, CA, USA, 2020. [Google Scholar]
- Morgenstern, M.; Fähndrich, J.; Honekamp, W. Ontology in the Digital Forensics Domain: A Scoping Review. In Proceedings of the INFORMATIK 2022, Virtual Event, 22–23 November 2022; Demmler, D., Krupka, D., Federrath, H., Eds.; Gesellschaft für Informatik: Bonn, Germany, 2022; pp. 71–80. [Google Scholar] [CrossRef]
- Mohammad, R.M. A neural network based digital forensics classification. In Proceedings of the 2018 IEEE/ACS 15th International Conference on Computer Systems and Applications (AICCSA), Aqaba, Jordan, 28 October–1 November 2018; IEEE: New York, NY, USA, 2018; pp. 1–7. [Google Scholar]
- Tallón-Ballesteros, A.J.; Riquelme, J.C. Data mining methods applied to a digital forensics task for supervised machine learning. In Computational Intelligence in Digital Forensics: Forensic Investigation and Applications; Springer: Berlin/Heidelberg, Germany, 2014; pp. 413–428. [Google Scholar]
- de Andrade Silva, J.; Hruschka, E.R. An experimental study on the use of nearest neighbor-based imputation algorithms for classification tasks. Data Knowl. Eng. 2013, 84, 47–58. [Google Scholar] [CrossRef]
- Bhushan, H.H.B.; Florance, S.M. An overview on handling anti forensic issues in android devices using forensic automator tool. In Proceedings of the 2022 IEEE International Conference on Signal Processing, Informatics, Communication and Energy Systems (SPICES), Thiruvananthapuram, India, 10–12 March 2022; IEEE: New York, NY, USA, 2022; Volume 1, pp. 425–430. [Google Scholar]
- Zhang, Q.; Yang, L.T.; Chen, Z.; Li, P. A survey on deep learning for big data. Inf. Fusion 2018, 42, 146–157. [Google Scholar] [CrossRef]
- Al Neaimi, M.; Al Hamadi, H.; Yeun, C.Y.; Zemerly, M.J. Digital forensic analysis of files using deep learning. In Proceedings of the 2020 3rd International Conference on Signal Processing and Information Security (ICSPIS), Dubai, United Arab Emirates, 25–26 November 2020; IEEE: New York, NY, USA, 2020; pp. 1–4. [Google Scholar]
- Krizhevsky, A.; Sutskever, I.; Hinton, G.E. ImageNet classification with deep convolutional neural networks. Commun. ACM 2017, 60, 84–90. [Google Scholar] [CrossRef]
- Hasan, R.; Raghav, A.; Mahmood, S.; Hasan, M.A. Artificial intelligence based model for incident response. In Proceedings of the 2011 International Conference on Information Management, Innovation Management and Industrial Engineering, Shenzhen, China, 26–27 November 2011; IEEE: New York, NY, USA, 2011; Volume 3, pp. 91–93. [Google Scholar]
- Du, X.; Le, Q.; Scanlon, M. Automated artefact relevancy determination from artefact metadata and associated timeline events. In Proceedings of the 2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), Dublin, Ireland, 15–19 June 2020; IEEE: New York, NY, USA, 2020; pp. 1–8. [Google Scholar]
- Toraskar, T.; Bhangale, U.; Patil, S.; More, N. Efficient computer forensic analysis using machine learning approaches. In Proceedings of the 2019 IEEE Bombay Section Signature Conference (IBSSC), Mumbai, India, 26–28 July 2019; IEEE: New York, NY, USA, 2019; pp. 1–5. [Google Scholar]
- Mosli, R.; Li, R.; Yuan, B.; Pan, Y. Automated malware detection using artifacts in forensic memory images. In Proceedings of the 2016 IEEE Symposium on Technologies for Homeland Security (HST), Waltham, MA, USA, 10–11 May 2016; IEEE: New York, NY, USA, 2016; pp. 1–6. [Google Scholar]
- Lashkari, A.H.; Li, B.; Carrier, T.L.; Kaur, G. Volmemlyzer: Volatile memory analyzer for malware classification using feature engineering. In Proceedings of the 2021 Reconciling Data Analytics, Automation, Privacy, and Security: A Big Data Challenge (RDAAPS), Hamilton, ON, Canada, 18–19 May 2021; IEEE: New York, NY, USA, 2021; pp. 1–8. [Google Scholar]
- Liew, S.P.; Ikeda, S. Detecting adversary using Windows digital artifacts. In Proceedings of the 2019 IEEE International Conference on Big Data (Big Data), Los Angeles, CA, USA, 9–12 December 2019; IEEE: New York, NY, USA, 2019; pp. 3210–3215. [Google Scholar]
- Känzig, N.; Meier, R.; Gambazzi, L.; Lenders, V.; Vanbever, L. Machine learninģ-based detection of C&C channels with a focus on the locked shields cyber defense exercise. In Proceedings of the 2019 11th International Conference on Cyber Conflict (CyCon), Tallinn, Estonia, 28–31 May 2019; IEEE: New York, NY, USA, 2019; Volume 900, pp. 1–19. [Google Scholar]
- Ali, R.R.; Mohamad, K.M.B.; Mostafa, S.A.; Zebari, D.A.; Jubair, M.A.; Alouane, M.T.H. A meta-heuristic method for reassemble bifragmented intertwined JPEG image files in digital forensic investigation. IEEE Access 2023, 11, 111789–111800. [Google Scholar] [CrossRef]
- Dimitriadis, A.; Lontzetidis, E.; Kulvatunyou, B.; Ivezic, N.; Gritzalis, D.; Mavridis, I. Fronesis: Digital forensics-based early detection of ongoing cyber-attacks. IEEE Access 2022, 11, 728–743. [Google Scholar] [CrossRef]
- Tankard, C. Advanced persistent threats and how to monitor and deter them. Netw. Secur. 2011, 2011, 16–19. [Google Scholar] [CrossRef]
- ISO/IEC 27050-1:2019; Information Technology—Electronic Discovery—Part 1: Overview and Concepts. International Organization for Standardization and International Electrotechnical Commission: Geneva, Switzerland, 2019. Available online: https://www.iso.org/standard/78647.html (accessed on 26 September 2021).
- ISO/IEC 27043:2015; Information Technology—Security Techniques—Incident Investigation Principles and Processes. International Organization for Standardization and International Electrotechnical Commission: Geneva, Switzerland, 2015. Available online: https://www.iso.org/standard/44407.html (accessed on 26 September 2024).
- SANS Digital Forensics and Incident Response Blog|Consortium of Digital Forensic Specialists Is Launched; Will Focus on Standards and Advocacy|SANS Institute. Available online: https://www.sans.org/blog/consortium-of-digital-forensic-specialists-is-launched-will-focus-on-standards-and-advocacy/ (accessed on 26 September 2024).
- CDFS-Advocacy. Available online: https://cdfs.org/advocacy (accessed on 26 September 2024).
- Turchi, F.; Giardiello, G. Developing a Judicial Cross-Check System for Case Searching and Correlation Using a Standard for the Evidence. In European Law Enforcement Research Bulletin; CEPOL: Budapest, Hungary, 2023; p. Nr–6. [Google Scholar]
- Casey, E.; Back, G.; Barnum, S. Leveraging CybOX™ to standardize representation and exchange of digital forensic information. Digit. Investig. 2015, 12, S102–S110. [Google Scholar] [CrossRef]
- Casey, E.; Barnum, S.; Griffith, R.; Snyder, J.; van Beek, H.; Nelson, A. Advancing coordinated cyber-investigations and tool interoperability using a community developed specification language. Digit. Investig. 2017, 22, 14–45. [Google Scholar] [CrossRef] [PubMed]
- Jones, J.P.; Getz, A.; Sirk, D. Organization of Scientific Area Committees (OSAC) for Forensic Science. In Encyclopedia of Forensic Sciences, 3rd ed.; Houck, M.M., Ed.; Elsevier: Oxford, UK, 2023; pp. 17–33. [Google Scholar] [CrossRef]
- Casey, E.; Barnum, S.; Griffith, R.; Snyder, J.; van Beek, H.; Nelson, A. The Evolution of Expressing and Exchanging Cyber-Investigation Information in a Standardized Form; Number 39, Handling and Exchanging Electronic Evidence Across Europe; Springer: New York, NY, USA, 2018. [Google Scholar] [CrossRef]
Digital Forensics Process/Aspect | Impact of AI/ML | Solutions |
---|---|---|
Data Examination | Fast Data Sifting, Speedy Data Classification (including Encoded Data) | [135,136,137,138,139,140,141] |
Analysis | Fast Data Analysis, Pattern Recognition | [142,143,144,145,146,147,148,149,150] |
Chain of Custody | Preservation of Integrity of Investigations | [151] |
Ser | Year | Digital Forensics | Stimulus |
---|---|---|---|
1 | 1945–1975 | System Audits | Security of system |
2 | 1975–1990 | Investigations by | a. Cyber Espionage |
Network Admin | b. Computer related crimes | ||
3 | 1984–1990 | Data Recovery Tools | With increase in use of personal computers, requirement of recovering of deleted information |
4 | 1992 onward | Computer Forensics | With explosive growth in use of personal computers, requirement to standard their forensics process including acquiring, preserving, retrieving and presenting data stored on computer media |
5 | 1990s | Forensics Tools | a. Increase in computer related crimes |
6 | 1993 onward | Forensics Labs/Trainings | b. Requirement of safe handling of evidence including secure acquisition, examination, presentation, transportation, chain of custody and integrity |
7 | 1993 onward | Standardization Efforts | c. Requirement to ensure quality and consistency of forensics specialists |
d. Emergence of online computer crimes | |||
8 | 1995 onward | Accreditation & Certifications | e. Valid and reliable data recovery methods |
f. Requirement of well established principle of examination, elaborate policies and practices and well documented procedures and techniques for forensics investigation | |||
9 | 1998 | Digital Evidence | Evidences stored and transmitted in digital form (cell phones, digital audio storage media for digital audio, video evidence, fax machines etc) |
10 | 2001 | Digital Forensics | a. Requirement to have scientifically derived and proven methods to deal with complex and variety of digital evidences including their preservation, collection, validation, identification, analysis, interpretation, documentation and presentation |
b. Forensic results shall be reliable and admissible in court of law | |||
11 | 2000 onward | Forensics Models | Refinement of procedures and frameworks of digital forensics |
12 | 2006 | eDiscovery | Declaration of digital information as form of evidence for acceptance in a court of law |
13 | 2010 onward | New Dimensions of Digital Forensics (Network Forensics, Cloud Forensics, IoT Forensics, Smart Phones) Forensics etc. | a. New Technologies |
b. New paradigms (Ubiquitous Networks and Services) | |||
c. Growing size of storage media with increasing variety in hardware interfaces | |||
d. Increase in use of cloud services | |||
e. Use of embedded flash storage | |||
f. RAM based malwares | |||
g. Exponential increase in variety of operating systems and file formats | |||
h. Use of encryption | |||
i. Legal issues |
Preparation 5.1 i-x * | Securing the Crime Scene 5.2 i-ii * | Survey and Recognition 5.3 i-iii * | Acquisition 5.4 i-iv * | Preservation 5.5 i-vi * | Examination 5.6 i-ii * | Analysis 5.7 i-ii * | Info. Sharing 5.8 i * | Presentation 5.9 i-iii * | Result 5.10 i-iii * | Review 5.11 i-ii * | ||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
DFIM-2001 | Acquiring Evidence | Authenticating Evidence | Analyzing Evidence | |||||||||||||
ii | i | i, ii, iii | i-v | i, ii | ||||||||||||
FPM-2001 | Collection | Examination | Analysis | Reporting | ||||||||||||
i | i-iii | ii, v | i, v | i | i, ii | |||||||||||
DFRW Model-2001 | Identification | Collection | Preservation | Examination | Analysis | Presentation | Decision | |||||||||
i | i, iii | i, iv, v | i | i | i, ii, iii | i | ||||||||||
ADFM-2002 | Identification | Preparation | Preservation | Approach Strategy | Collection | Examination | Analysis | Presentation | Returning Evidence | |||||||
i | ii-iv, vi | i | ii, iii | i | i | i | i | i | ii | |||||||
IDIPM-2003 | Readiness | Deployment | Physical Crime Scene Investigations | Digital Crime Scene Investigation | Review | |||||||||||
iv, v | i, ii, iii | i, ii | i, ii | iii | i, ii, iii | i-v | i | i | i | i | ||||||
CFSAP-2003 | Secure | Analysis | Present | |||||||||||||
i | i | i, ii | i | i | i, ii | i, ii, iii | ||||||||||
EDIPM-2004 | Readiness | Deployment | Submission | |||||||||||||
i, ii | i, ii, iii | i-v | i | i | i | Review | ||||||||||
iv, vi | i, ii, iii | i, ii | Traceback | Dynamite | ||||||||||||
i, ii | i | i | i | i | i | i | ||||||||||
EMCI-2004 | Awareness | • Authorization • Planning • Notification | Search and Identification of Evidence | • Collection • Transport • Storage | Examination | Hypothesis | • Presentation • Proof & Defence | Dissemination | ||||||||
ix | ii, iii, iv, v, viii | i-iii | i-iii | ii, iii, iv | i | i, ii | i, iii | iii | ||||||||
NIST’s Forens. Process-2006 | Collection | Examination | Analysis | Reporting | ||||||||||||
i, ii | i-iii | i, ii | i | i | i | |||||||||||
CPMIRCF- 2007 | Pre-Analysis (Pre-incident Preparation, Detection, Initial Response, Response Strategy) | Analysis (Live Response, Forensics Duplication, Data Recovery, Harvesting, Reduction and Organization and Analysis) | Post Analysis (Report Generation and Resolution | |||||||||||||
i, iv-vii, ix, x | i, ii | i-iii | i, v | i, ii | i, ii | i | i-iii | |||||||||
DFM-MIP- 2009 | Planning | Identification | Reconnaissance | • Transport • Storage | Analysis | • Result • Proof & Defence | Diffusion of Information | |||||||||
ii, iii | i | i, ii, iii | i, ii | i, ii, iii, iv | i | i, ii | i, iii | ii, iii | ||||||||
GPMNF-2010 | Preparation & Authorization | Incident Detection & Response | Collection of Network Traces | Protection and Preservation | Examination | Analysis | Investigation and Attribution | Presentation and Review | ||||||||
iii, iv, vi | i, ii (Network Forens.) | i-iii | i-iii | i-iii | i, iv, v | i, ii | i, ii | i | i | i-iii | i-iii | i | ||||
DFMF-2010/ PRDIP-2011 | ActDF/ReDF: Incident Response & Confirmation | ReDF: Physical Investigation | ActDF: Evidence Acquisition ReDF:Digital Investigation | ActDF:Analysis | ReDF:Incident Reconst. (ActDF:Ltd.) | ReDF:Present Findings | ActDF/ReDF: Incident Closure | |||||||||
i-iv, vi, viii, ix | i, ii | i-iii | i-iii | i-v | i, ii | i | i, ii | i-iii | i, ii | |||||||
DFMDFI-2011 | First Tier – Preparation (Identification, Authorization & Communication) | Second Tier – Interaction (Collection, Preservation and Documentation) | Third Tier- Reconst. (Examination, Exploratory testing, and Analysis) | Fourth Tier–Presentation (Result, Review, Report) | ||||||||||||
i-iv, vi, vii, x | i | i-iii | ii-v | i | i-iii | i | i | i | ||||||||
SDFIM- 2011 | Preparation | • Securing the Scene • Survey & Recognition • Docu. of Scene • Comm. Shielding | Evidence Collection | Preservation | Examination | Analysis | Presentation | Result & Review | ||||||||
i-vii, x | i, ii | i, ii | i, ii | i-v | i | i, ii | i, ii, iii | i | i | |||||||
ICDFFCC- 2012 | Evidence Source Identification and Preservation | Collection | Examination and Analysis | Reporting and Presentation | ||||||||||||
i, iv, viii | i, ii | i-iii | i-iii | i, ii | i, ii | i-iii | i | |||||||||
ESDFIM-2013 | Preparation | Acquisition and Preservation Phase | Examination and Analysis Phase | Information Sharing Phase | Presentation Phase | Review Phase | ||||||||||
i-viii | i, ii | i-ii | i, iii, iv | i, iii-v | i, ii | i, ii | i | i-iii | i, ii | i | ||||||
HEIM-2013 | Preparation (Notification, Authorization, Preparation) | Crime Scene Investigation (Preservation, Identification, Collection, Examination, Transportation) | Lab Examination (Examination, Secure Storage, Report Generation) | Conclusion (Reconstruction, Dissemination) | ||||||||||||
ii, iii, v-vii, x | i, ii | i, ii | i | iii, v | iv | i | i | i-iii | i-iii | i |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Zareen, M.S.; Aslam, B.; Tahir, S.; Rasheed, I.; Khan, F. Unveiling the Dynamic Landscape of Digital Forensics: The Endless Pursuit. Computers 2024, 13, 333. https://doi.org/10.3390/computers13120333
Zareen MS, Aslam B, Tahir S, Rasheed I, Khan F. Unveiling the Dynamic Landscape of Digital Forensics: The Endless Pursuit. Computers. 2024; 13(12):333. https://doi.org/10.3390/computers13120333
Chicago/Turabian StyleZareen, Muhammad Sharjeel, Baber Aslam, Shahzaib Tahir, Imran Rasheed, and Fawad Khan. 2024. "Unveiling the Dynamic Landscape of Digital Forensics: The Endless Pursuit" Computers 13, no. 12: 333. https://doi.org/10.3390/computers13120333
APA StyleZareen, M. S., Aslam, B., Tahir, S., Rasheed, I., & Khan, F. (2024). Unveiling the Dynamic Landscape of Digital Forensics: The Endless Pursuit. Computers, 13(12), 333. https://doi.org/10.3390/computers13120333