Download, Copy, Distribute, Print, Search, Or Link to the Full Texts of Khaled A
Total Page:16
File Type:pdf, Size:1020Kb
Volume 8, Issue 4 2019 ISSN: 2305-0012 (online) International Journal of Cyber-Security and Digital Forensics 2019 ` Overview Editors-in-Chief The International Journal of Cyber-Security and Digital Forensics (IJCSDF) is a knowledge resource for practitioners, scientists, and researchers Dragan Perakovic, University of Zagreb, Croatia among others working in various fields of Cyber Security, Privacy, Trust, Digital Forensics, Hacking, and Cyber Warfare. We welcome original contributions as high quality technical papers (full and short) describing original unpublished results of theoretical, empirical, conceptual or experimental research. All submitted papers will be peer-reviewed by Editorial Board members of the editorial board and selected reviewers and those accepted will be published in the next volume of the journal. Ali Sher, American University of Ras Al Khaimah, UAE Altaf Mukati, Bahria University, Pakistan As one of the most important aims of this journal is to increase the Andre Leon S. Gradvohl, State University of Campinas, Brazil usage and impact of knowledge as well as increasing the visibility and Azizah Abd Manaf, Universiti Teknologi Malaysia, Malaysia ease of use of scientific materials, IJCSDF does NOT CHARGE authors for Bestoun Ahmed, University Sains Malaysia, Malaysia any publication fee for online publishing of their materials in the journal Carl Latino, Oklahoma State University, USA and does NOT CHARGE readers or their institutions for accessing to the Dariusz Jacek Jakóbczak, Technical University of Koszalin, Poland published materials! Duc T. Pham, University of Bermingham, UK E.George Dharma Prakash Raj, Bharathidasan University, India Elboukhari Mohamed, University Mohamed First, Morocco Eric Publisher Atwell, University of Leeds, United Kingdom The Society of Digital Information and Wireless Communications Eyas El-Qawasmeh, King Saud University, Saudi Arabia Ezendu Ariwa, London Metropolitan University, United Kingdom Miramar Tower, 13 Nathan Road, Tsim Sha Tsui, Kowloon, Hong Kong Fouzi Harrag, UFAS University, Algeria Genge Bela, University of Targu Mures, Romania Further Information Guo Bin, Institute Telecom & Management SudParis, France Website: http://sdiwc.net/ijcsdf, Email: [email protected], Hadj Hamma Tadjine, Technical university of Clausthal, Germany Hassan Tel.: (202)-657-4603 - Inside USA; 001(202)-657-4603 - Outside USA. Moradi, Qualcomm Inc., USA Isamu Shioya, Hosei University, Japan Permissions Jacek Stando, Technical University of Lodz, Poland International Journal of Cyber-Security and Digital Forensics (IJCSDF) is Jan Platos, VSB-Technical University of Ostrava, Czech Republic an open access journal which means that all content is freely available Jose Filho, University of Grenoble, France without charge to the user or his/her institution. Users are allowed to Juan Martinez, Gran Mariscal de Ayacucho University, Venezuela Kaikai Xu, University of Electronic Science and Technology of China, China read, download, copy, distribute, print, search, or link to the full texts of Khaled A. Mahdi, Kuwait University, Kuwait the articles in this journal without asking prior permission from the Ladislav Burita, University of Defence, Czech Republic publisher or the author. This is in accordance with the BOAI definition of Maitham Safar, Kuwait University, Kuwait open access. Majid Haghparast, Islamic Azad University, Shahre-Rey Branch, Iran Martin J. Dudziak, Stratford University, USA Disclaimer Mirel Cosulschi, University of Craiova, Romania Monica Vladoiu, PG University of Ploiesti, Romania Statements of fact and opinion in the articles in the International Journal Nan Zhang, George Washington University, USA of Cyber-Security and Digital Forensics (IJCSDF) are those of the Noraziah Ahmad, Universiti Malaysia Pahang, Malaysia respective authors and contributors and not of the International Journal Pasquale De Meo, University of Applied Sciences of Porto, Italy of Cyber-Security and Digital Forensics (IJCSDF) or The Society of Digital Paulino Leite da Silva, ISCAP-IPP University, Portugal Information and Wireless Communications (SDIWC). Neither The Society Piet Kommers, University of Twente, The Netherlands of Digital Information and Wireless Communications nor International Radhamani Govindaraju, Damodaran College of Science, India Ramadan Journal of Cyber-Security and Digital Forensics (IJCSDF) make any Elaiess, University of Benghazi, Libya representation, express or implied, in respect of the accuracy of the material in this journal and cannot accept any legal responsibility or Rasheed Al-Zharni, King Saud University, Saudi Arabia liability as to the errors or omissions that may be made. The reader Talib Mohammad, University of Botswana, Botswana should make his/her own evaluation as to the appropriateness or Tutut Herawan, University Malaysia Pahang, Malaysia otherwise of any experimental technique described. Velayutham Pavanasam, Adhiparasakthi Engineering College, India Viacheslav Wolfengagen, JurInfoR-MSU Institute, Russia Waralak V. Siricharoen, University of the Thai Chamber of Commerce, Thailand Copyright © 2019 sdiwc.net, All Rights Reserved Wen-Tsai Sung, National Chin-Yi University of Technology, Taiwan Wojciech Zabierowski, Technical University of Lodz, Poland The issue date is Dec. 2019 Su Wu-Chen, Kaohsiung Chang Gung Memorial Hospital, Taiwan Yasin Kabalci, Nigde University, Turkey Yoshiro Imai, Kagawa University, Japan Zanifa Omary, Dublin Institute of Technology, Ireland Zuqing Zhu, University of Science and Technology of China, China ISSN: 2305-0012 (online) International Journal of Cyber-Security and Digital Forensics 2019 Volume 8, Issue 4 A Comparative Study of the Performance of Open-Source and Proprietary Disk Forensic Tools in Recovery of Anti- Forensically Doctored Data ...................................................................................................................................... 250 Author/s: Sonu Mandecha, Kumarshankar Raychaudhuri, M. George Christopher A Digital Forensic Approach for Examination and Analysis of Frozen Hard Disk of Virtual Machine ....................... 262 Author/s: M. George Christopher, Kumarshankar Raychaudhuri Network Attack Detection Method Based on Their Time - Frequency Decomposition ..............................................273 Author/s: Dimitris Sklavounos, Spiros Chountasis, Aloysius Edoh Recognizing Illegitimate Access Points Based on Static Features: a Case Study in a Campus Wifi Network.......... 279 Author/s: Franklin Tchakounte, Michael Nakoe, Blaise Omer Yenke, Kalum Priyanath Udagepola Forensic Analysis in Cloud Storage with Live Forensics in Windows (Adrive Case Study) .......................................292 Author/s: Tri Rochmadi, Dadang Heksaputra A Study on Metasploit Payloads ............................................................................................................................... 298 Author/s: Afrozulla Khan Z, Balajinarayan B International Journal of Cyber-Security and Digital Forensics (IJCSDF) 8(4): 250-261 The Society of Digital Information and Wireless Communications (SDIWC), 2019 ISSN: 2305-0011 A Comparative Study of the Performance of Open-Source and Proprietary Disk Forensic Tools in Recovery of Anti-Forensically Doctored Data 1Sonu Mandecha, 2Kumarshankar Raychaudhuri, 3M. George Christopher 1,2LNJN National Institute of Criminology and Forensic Science, Ministry of Home Affairs Govt. of India 3State Forensic Science Laboratory, Madiwala, Bengaluru, India ABSTRACT 1 INTRODUCTION Digital Forensics is the technique used for the According to Dr. Debarati Halder and Dr. K. investigation of crimes related to computers and other Jaishankar (2011), cybercrime is defined as “An digital or electronic devices such as mobile phones, act of offence committed against individuals or tablets etc. It includes different stages such as group of individuals with a criminal motive to collection, extraction, preservation, examination, intentionally harm the reputation of the victim or analysis and documentation of data from different cause physical or mental harm, or loss, to the digital storage devices such as hard disks, USB victim directly or indirectly, using modern thumb drives, CDs, DVDs etc. In order to evade the telecommunication networks such as internet and digital forensic tools, the criminals or perpetrators mobile phones [1]. Cyber-crime can be use methods and techniques to hide the data or committed using computer as a tool or target. destroy the evidence, which is known as Anti- Forensics. In this research work, our aim is to use For investigation of the cyber-crime incidents, open-source and proprietary disk forensic tools to evidential data is identified and collected from attempt in recovering anti-forensically doctored data. computer systems and/or other digital storage Various anti-forensic tools and techniques are used media at crime scene or laboratory, scientifically for hiding data items or manipulating their metadata examined and analysed using various software properties, onto digital exhibits such as USB thumb drive. After performing anti-forensics, the exhibit is applications and hardware tools, so that it can be examined and analysed using different types of disk made admissible in the court of law. This entire forensic tools in an effort to recover the traces of process from the crime scene to the court room is hidden and manipulated data items. Lastly, a defined as Digital Forensic Investigation [2,3]. comparative analysis is done to determine