Primordial Fingerprinting Techniques from the Perspective of Digital Forensic Requirements

被引:0
|
作者
Yogesh, Patil Rachana [1 ]
Satish, Devane R. [2 ]
机构
[1] AC Patil Coll Engn, Dept Comp Engn, Navi Mumbai, India
[2] Datta Meghe Coll Engn, Dept Informat Technol, Bombay, Maharashtra, India
关键词
Cybercrime; Device Fingerprinting; Forensic Investigation; Network Forensics;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The techniques of device fingerprinting are used by many researchers for the purpose of user tracking or software licensing and user authentication. As most of the current fingerprinting approaches are using the software related parameters of the device which can be easily modified by the user. These existing solutions are not suitable for device fingerprinting from the perspective of network forensic investigation. The main objective of forensic investigation is to collect the evidences of the cybercrime in forensically sound manner to prove the role of criminal in the crime. To prove the crime in the court of law the reliable and relevant evidence against the criminal is very important. The most crucial evidence is the true identity of the device used for doing the cybercrime. To uniquely identify the real source of the crime device fingerprinting is the paramount solution. The up-to-date analysis is required to construct the new techniques for fingerprinting the physical devices, which will satisfy all the legal requirements and can be used as evidence in the court of law to prove the crime. The major objective of this paper is thus to provide a detailed analytical review of features and techniques of feature extraction that is used in existing device fingerprinting techniques.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Users' Fingerprinting Techniques from TCP Traffic
    Vassio, Luca
    Giordano, Danilo
    Trevisan, Martino
    Mellia, Marco
    Couto da Silva, Ana Paula
    BIG-DAMA '17: PROCEEDINGS OF THE 2017 WORKSHOP ON BIG DATA ANALYTICS AND MACHINE LEARNING FOR DATA COMMUNICATION NETWORKS, 2017, : 49 - 54
  • [22] Requirements for Achieving Digital Forensic Readiness in the Cloud Environment Using an NMB Solution
    Kebande, Victor
    Venter, Hein
    PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2016), 2016, : 399 - 406
  • [23] Age Estimation with DNA: From Forensic DNA Fingerprinting to Forensic (Epi) Genomics: A Mini-Review
    Parson, Walther
    GERONTOLOGY, 2018, 64 (04) : 326 - 332
  • [24] Digital forensic Techniques for finding the Hidden Database using Analytical Strategies
    Shirbhate, Dhiraj D.
    Gupta, S. R.
    2015 IEEE INTERNATIONAL CONFERENCE ON INFORMATION PROCESSING (ICIP), 2015, : 21 - 26
  • [25] Using Digital Forensic Techniques to Identify Contract Cheating: A Case Study
    Clare Johnson
    Ross Davies
    Journal of Academic Ethics, 2020, 18 : 105 - 113
  • [26] Forensic techniques for classifying scanner, computer generated and digital camera images
    Khanna, Nitin
    Chiu, George T-C
    Allebach, Jan P.
    Delp, Edward J.
    2008 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING, VOLS 1-12, 2008, : 1653 - +
  • [27] Using Digital Forensic Techniques to Identify Contract Cheating: A Case Study
    Johnson, Clare
    Davies, Ross
    JOURNAL OF ACADEMIC ETHICS, 2020, 18 (02) : 105 - 113
  • [28] Modern technology in forensic anthropology. Digital techniques in casework and research
    Kettner, M.
    Graw, M.
    Schmidt, P.
    RECHTSMEDIZIN, 2013, 23 (02) : 92 - 96
  • [29] An Aspect of Internet of Things Security: Analysis of Digital Fingerprinting of Generic Twitter Sessions by Using Forensic Tool
    Aslam, Ayesha
    Maher, Sehreen Manzoor
    Kanwal, Laraib
    Shah, Munam Ali
    2019 25TH IEEE INTERNATIONAL CONFERENCE ON AUTOMATION AND COMPUTING (ICAC), 2019, : 268 - 272
  • [30] Exhibitionism from a medical and forensic medical perspective
    Grunthal, Max
    NERVENARZT, 1930, 3 (07): : 438 - 439