An Approach for Validation of Digital Anti-Forensic Evidence

被引:4
|
作者
Shanmugam, Karthikeyan [1 ]
Powell, Roger [1 ]
Owens, Tom [1 ]
机构
[1] Brunel Univ, Uxbridge, Middx, England
来源
INFORMATION SECURITY JOURNAL | 2011年 / 20卷 / 4-5期
关键词
computer forensics; anti-forensics; digital evidence validation; forensic security model;
D O I
10.1080/19393555.2011.604667
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
e-crime is increasing and e-criminals are becoming better at masking their activities. The task of forensic data analysis is becoming more difficult and a systematic approach towards evidence validation is necessary. With no standard validation framework, the skills and interpretation of forensic examiners are unchecked. Standard practices in forensics have emerged in recent years, but none has addressed the development of a model of valid digital evidence. Various security and forensic models exist, but they do not address the validity of the digital evidence collected. Research has addressed the issues of validation and verification of forensic software tools but failed to address the validation of forensic evidence. The forensic evidence collected using forensic software tools can be questioned using an anti-forensic approach. The research presented in this paper is not intended to question the skills of forensic examiners in using forensic software tools but rather to guide forensic examiners to look at evidence in an anti-forensic way. This paper proposes a formal procedure to validate evidence of computer crime.
引用
收藏
页码:219 / 230
页数:12
相关论文
共 50 条
  • [1] Digital Image Forensic Approach to Counter the JPEG Anti-Forensic Attacks
    Kumar, Amit
    Singh, Gurinder
    Kansal, Ankush
    Singh, Kulbir
    [J]. IEEE ACCESS, 2021, 9 : 4364 - 4375
  • [2] Advanced manipulation of digital evidence using memory based anti-forensic tools
    Jahankhani, Hamid
    Beqiri, Elidon
    Revett, Kenneth
    [J]. 3RD INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, PROCEEDINGS, 2008, : 213 - +
  • [3] A System for Formal Digital Forensic Investigation Aware of Anti-Forensic Attacks
    Rekhis, Slim
    Boudriga, Noureddine
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (02) : 635 - 650
  • [4] ANTI-FORENSIC THREAT MODELING
    Hoelz, Bruno
    Maues, Marcelo
    [J]. ADVANCES IN DIGITAL FORENSICS XIII, 2017, 511 : 169 - 183
  • [5] A Hierarchical Visibility theory for formal digital investigation of anti-forensic attacks
    Rekhis, Slim
    Boudriga, Noureddine
    [J]. COMPUTERS & SECURITY, 2012, 31 (08) : 967 - 982
  • [6] Anti-forensic approach for JPEG compressed images with enhanced image quality and forensic undetectability
    Amit Kumar
    Ankush Kansal
    Kulbir Singh
    [J]. Multimedia Tools and Applications, 2020, 79 : 8061 - 8084
  • [7] Noninvasive Detection of Anti-Forensic Malware
    Guri, Mordehai
    Kedma, Gabi
    Sela, Tom
    Carmeli, Buky
    Rosner, Amit
    Elovici, Yuval
    [J]. PROCEEDINGS OF THE 2013 8TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE: THE AMERICAS (MALWARE), 2013, : 1 - 10
  • [8] Anti-forensic resilient memory acquisition
    Stuettgen, Johannes
    Cohen, Michael
    [J]. DIGITAL INVESTIGATION, 2013, 10 : S105 - S115
  • [9] Anti-forensic approach for JPEG compressed images with enhanced image quality and forensic undetectability
    Kumar, Amit
    Kansal, Ankush
    Singh, Kulbir
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (11-12) : 8061 - 8084
  • [10] Anti-Forensic Approach for Password Protection Using Fuzzy Fingerprint Vault
    Choi, Woo Yong
    Un, Sung Kyong
    [J]. 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTING AND CONVERGENCE TECHNOLOGY (ICCCT2012), 2012, : 643 - 646