Qualitative Assessment of Digital Forenisc Tools S
Total Page:16
File Type:pdf, Size:1020Kb
Vidyabharati International Interdisciplinary Research Journal 10(1) 12 - 2 3 ISSN 2319-4979 ___________________________________________________________________________ QUALITATIVE ASSESSMENT OF DIGITAL FORENISC TOOLS S. Singh1 and S. Kumar2 Ambedkar Institute of Advanced Communication Technologies& Research, Delhi, India [email protected], [email protected] ___________________________________________________________________________ ABSTRACT Forensic science is a study of science to criminals and civil laws. Digital forensics is the part of forensic science relating to proof found in computers and advanced storage media. Forensic examiners gather, protect and break down logical confirmations over the span of examination. Digital information contains data as content, pictures, sound, video and so on. These days numerous cybercrime cases, for example, hacking, banking cheats, phishing, email spamming, etc., have developed which are connected with a computerized information. Since the digital investigation is turning into an expanding concern, numerous digital forensic tools have been created to manage the difficulties of exploring computerized wrongdoings. The motivation behind digital forensics strategies is to look, protect and extract data on advanced frameworks to discover potential confirmations to exhibit them in the courtroom. In this paper, we have discussed five kinds of forensics namely Network Forensics, Live Forensics, Cyber Forensics, Database Forensics, and Mobile Forensics. The paper depicts a list of digital forensic tools in detail and looks at them based on the characterized parameters to figure out which tool suits better for any investigation. The paper looks at network, database and mobile forensic tools and examines the silent features and uniqueness of each of the tools along with their functionalities. __________________________________________________________________________________________ Keywords: Database forensics, Digital forensic tools, Forensic phases, Mobile forensics and Network forensics Introduction 5. Mobile Forensics Digital forensics is the utilization of Since there are number of digital forensic investigation and analysis strategies to branches but we are working on Network assemble and secure proof from a certain forensics, Database forensics and Mobile computerized device in a manner that is forensics in this paper. reasonable for introducing in an official Network Forensics: Network forensics is a courtroom. The purpose of digital forensics branch of advanced digital forensic is to perform a structural investigation while identifying with the observing and maintaining a reputed chain of evidence to investigation of computer system traffic to uncover what exactly happened on a digital collect network traffic data, legitimate proof device and who was responsible for it. We or interruption recognition. The significant can say that digital forensics is a logical objective of the forensics of the network is methodology of safeguarding, procuring, to gather proof from the network traffic. It extracting, removing and representing attempts to investigate traffic information evidence that originates from the advanced collected from various websites and sources like PC, mobile, camera and so network equipment, for example, IDS and forth. firewalls. It screens on the system to Digital forensic incorporates a few sub- distinguish assaults and examine the idea of branches with the investigation of different attacks. It is also the way of distinguishing sorts of devices, media or artifacts. These interruption examples concentrating on branches are: attackers' exercises. Network forensic manages unstable and dynamic data. 1. Network Forensics Database Forensics: Database forensic is 2. Live Forensics the part of digital forensic and its database 3. Cyber Forensics legal investigation and related metadata. It focuses on experimentally interrogating the 4. Database Forensics __________________________________________________________________________________ March 2020 12 www.viirj.org Vidyabharati International Interdisciplinary Research Journal 10(1) ISSN 2319-4979 ___________________________________________________________________________ failed database and by attempting to remake sniffing and so on. Khaleque Md Aashiq the metadata and page data from inside an Kamal [2] looked at memory forensic Tools informational index. In this digital forensic, based on-time processing and left artifacts the read-only technique is utilized when of volatile memory. He analyzed the interfacing with a database to guarantee that variation in Tool time processing in terms of no information is undermined. distinct volatile memory size. With his experimentation, he proved that the Mobile Forensics: Mobile forensics is the processing time ’x’ of the tool does not recovery research of computerized proof increase by expanding the memory size 'x' from a cell phone under forensic conditions. times. S Mc Combie and M. Warren [3] The objective of mobile crime scene focuses on different methodologies to investigation is the act of using sound characterize computer forensics at the most philosophies for the securing of information fundamental level. They additionally contained inside the internal memory of a depicted various models like the Lucent cell phone and related media giving the model, KPMG model, Miter model, etc. and capacity to precisely report one's methodologies that have been created in discoveries. Mobile device forensics is an computer forensic fields. Pratima Sharma[4] advancing claim to fame in the field of played out an experiment using a computerized legal sciences. The procedure prodiscover tool to decrease the search of Mobile device forensics is separated into space by recognizing and separating the three fundamental classes namely, a seizure known documents to accelerate the that preserves the proof, Acquisition which searching procedure of evidence is the way toward recovering the identification. She looked into the image information from the gadget and the third files to know the area of interest within one is an assessment that examines the documents, erased records, and slack recovered information. documents. The experimental result The paper is structured as follows: Section 2 demonstrated that REGEX looks covers the previous comparative analysis empowered to get yield with only one hunt and work done related to digital forensics. rather than numerous endeavours in less Section 3 digital forensic process is time. Varsha Sanap and Vanita Mane [5] described with various phases. Section 4 displayed a correlation of three scientific covers the methodologies followed during instruments WinHex, Active record the comparative analysis. Section 5 gives a Recovery and Prodiscover Basic based on detailed description of forensic tools that are the parameters, for example, document categorized into network forensics, database assessment, log assessment, memory dump forensics, and mobile forensics. Section 6 investigation and so on. They additionally presents all the identified parameters based explored a contextual investigation of on which the comparative analysis is done. pornography. Priyanka Dhaka and Rahul Section 7 consists of a comparative analysis Johari [6] proposed a thought and strategy table of all the selected tools and Section 8 of utilizing digital- crime investigation tool describes the conclusion and future work. to extract the information which produced a record and sent the information in big data Literature Review tool, for example, MongoDB to oversee Numerous authors have given a relative enormous information and removed the investigation of various forensic tools. structured informational collection. Hamda Mayank Lovanshi and Paritosh Bansal [1] Bariki, Mariam Hashmi and Ibrahim Baggili clarified a comparative study on digital [7] present a standard information forensic tools, for example, desktop, live prerequisite for digital evidence products and network forensic tools based on the that could be used with computer forensic parameters like imaging, seizer, packet- tools to create reports. The principles __________________________________________________________________________________ March 2020 13 www.viirj.org Vidyabharati International Interdisciplinary Research Journal 10(1) ISSN 2319-4979 ___________________________________________________________________________ proposed secure the essential data on the preparation of tool, methods, court case, the sources of evidence, the intrigue orders and backing of the executives are and the custody chain of digital evidence. pictured. The author Charles Lim, Meily, Nicsen and c. Approach Strategy: In this stage, the HerryAhamdi[8] did experimental research improvement of the technique that will that aimed to reveal the rest of the data amplify the accumulation of untainted inside USB flash drives. The exploration proof while limiting the effect to the demonstrated that there were plentiful victim is done. delicate data recouped from the USB flash drives and the data was related to the d. Conservation Phase: In this stage, educational institute, individual and isolation, verifying and saving of the government. condition of physical and digital evidence takes place. Digital Forensic Process e. Accumulation Phase: In this stage, the The digital forensic process has the chronicle of the Physical scene, use of following eight components- standardized and duplicated digital IDENTIFICATION evidence and acknowledged method takes