Digital forensics in cyber security - recent trends, threats, and opportunities

Mohammed I. Alghamdi

Abstract


The rapid technological advancement has led the entire world to shift towards digital domain. However, this transition has also result in the emergence of cybercrimes and security breach incidents that threatens the privacy and security of the users. Therefore, this paper aimed at examining the use of digital forensics in countering cybercrimes, which has been a critical breakthrough in cybersecurity. The paper has analyzed the most recent trends in digital forensics, which include cloud forensics, social media forensics, and IoT forensics. These technologies are helping the cybersecurity professionals to use the digital traces left by the data storage and processing to keep data safe, while identifying the cybercriminals. However, the research has also observed specific threats to digital forensics, which include technical, operational and personnel-related challenges. The high complexity of these systems, large volume of data, chain of custody, the integrity of personnel, and the validity and accuracy of digital forensics are major threats to its large-scale use. Nevertheless, the paper has also observed the use of USB forensics, intrusion detection and artificial intelligence as major opportunities for digital forensics that can make the processes easier, efficient, and safe.

Full Text:

PDF

References


[[1] E. A. Gollub, “Recent trends in digital text forensics and its evaluation,” In International Conference of the Cross-Language Evaluation Forum for European Languages, pp. pp. 282-302, (2013), September.

A. Aminnezhad and A. Dehghantanha, “A survey on privacy issues in digital forensics,” nternational Journal of Cyber-Security and Digital Forensics (IJCSDF), vol. 3, no. 4, pp. 183-199, (2014).

F. Dezfouli and A. Dehghantanha, “Digital forensics trends and future,” International Journal of Cyber-Security and Digital Forensics (IJCSDF), vol. 3, no. 4, pp. 183-199, (2014).

B. K. Sharma, M. A. Joseph, B. Jacob and L. C. B. Miranda, “Emerging trends in Digital Forensic and Cyber security-An Overview,” In 2019 Sixth HCT Information Technology Trends (ITT), pp. pp. 309-313, (2019), November.

M. Wazid, A. Katal, R. H. Goudar and S. Rao, “Hacktivism trends, digital forensic tools and challenges: A survey.,” n 2013 IEEE Conference on Information & Communication Technologies, pp. pp. 138-144, (2013), April.

H. T. Alrikabi, A. H. M. Alaidi, A. S. Abdalrada, and F. T. J. I. J. o. E. T. i. L. Abed, "Analysis the Efficient Energy Prediction for 5G Wireless Communication Technologies," vol. 14, no. 08, pp. 23-37, 2019.

S. Zawoad and R. Hasan, “Cloud forensics: a meta-study of challenges, approaches, and open problems,” arXiv preprint arXiv, p. 1302.6312., (2013).

A. Aminnezhad, A. Dehghantanha, M. T. Abdullah and M. Damshenas, “Cloud forensics issues and opportunities.,” International Journal of Information Processing and Management, vol. 4, no. 4, p. 76, (2013).

I. Al-Barazanchi, S. A. Shawkat, M. H. Hameed, and K. S. L. Al-Badri, “Modified RSA-based algorithm: A double secure approach,” Telkomnika (Telecommunication Comput. Electron. Control., vol. 17, no. 6, pp. 2818–2825, 2019.

K. Ruan, J. Carthy, T. Kechadi and M. Crosbie, “Cloud forensics,” In IFIP International Conference on Digital Forensics. Springer, Berlin, Heidelberg. , pp. pp. 35-46, (2011), January.

A. E. A. Rocha, “Authorship attribution for social media forensics.,” IEEE Transactions on Information Forensics and Security, vol. 12, no. 1, pp. 5-33, (2016).

I. Baggili and F. Breitinger, “Data sources for advancing cyber forensics: what the social world has to offer.,” n 2015 AAAI Spring Symposium Series., (2015), March.

N. Al Mutawa, I. Baggili and A. Marrington, “Forensic analysis of social networking applications on mobile devices.,” Digital Investigation, vol. 9, pp. S24-S33, (2012).

M. Zampoglou, S. Papadopoulos, Y. Kompatsiaris, R. Bouwmeester and J. Spangenberg, “Web and social media image forensics for news professionals.,” In Tenth international AAAI conference on web and social media, (2016), April.

N. Hussien, I. Ajlan, M. M. Firdhous, and H. Alrikabi, "Smart Shopping System with RFID Technology Based on Internet of Things," 2020.

M. Vangeti, S. K. Yadav and V. Pinnti, “Advantages of Internet of Things (Iot) For Developing Smart Services in Manufacturing Business,” Purakala with ISSN 0971-2143 is an UGC CARE Journal, vol. 31, no. 25, pp. 62-68, (2020).

H. Alrikabi, A. H. Alaidi, and K. J. I. J. o. I. M. T. Nasser, "The Application of Wireless Communication in IOT for Saving Electrical Energy," vol. 14, no. 01, pp. 152-160, 2020.

R. Hegarty, D. J. Lamb and A. Attwood, “Digital Evidence Challenges in the Internet of Things,” In INC, pp. pp. 163-172, (2014).

N. S. Alseelawi, E. K. Adnan, H. T. Hazim, H. Alrikabi, and K. Nasser, "Design and Implementation of an E-learning Platform Using N-Tier Architecture," 2020.

N. M. Karie and H. S. Venter, “Taxonomy of challenges for digital forensics.,” Journal of forensic sciences, vol. 60, no. 4, pp. 885-893, (2015).

A. M. Balogun and S. Y. Zhu, “Privacy impacts of data encryption on the efficiency of digital forensics technology.,” arXiv preprint arXiv:1312.3183., (2013).

E. A. Vincze, “Challenges in digital forensics. Police Practice and Research,” vol. 17, no. 2, pp. 183-194, (2016).

S. Raghavan, “Digital forensic research: current state of the art.,” CSI Transactions on ICT, vol. 1, no. 1, pp. 91-114, (2013).

P. Cichonski, T. Millar, T. Grance and K. Scarfone, “Computer security incident handling guide.,” International Journal of Computer Research,, vol. 20, no. 4, p. 459, (2013).

Z. Baig, P. Szewczyk, C. Valli, P. Rabadia, P. Hannay, M. Chernyshev, M. Johnstone, P. Kerai, A. Ibrahim, K. Sansurooah and N. Syed, “Future challenges for smart cities: Cyber-security and digital forensics.,” Digital Investigation, vol. 22, pp. 3-13, (2017).

I. Hong, H. Yu, S. Lee and K. Lee, “A new triage model conforming to the needs of selective search and seizure of electronic evidence.,” Digital Investigation, vol. 10, no. 2, pp. 175-192, (2013).

N. Rahim, W. A. Wahab, Y. I. Idris and L. M. Kiah, “Digital Forensics: An Overview of the Current Trends.,” (2014).

J. Collie, “The windows IconCache. db: A resource for forensic artifacts from USB connectable devices,” Digital investigation, vol. 9, no. 3-4, pp. 200-210, (2013).

T. Roy and A. Jain, “Windows registry forensics: an imperative step in tracking data theft via USB devices.,” International Journal of Computer Science and Information Technologies, vol. 3, no. 3, p. International Journal of Computer Science and Information Technologies, (2012).

H. T. S. ALRikabi, A. H. M. Alaidi, and F. T. Abed, "Attendance System Design And Implementation Based On Radio Frequency Identification (RFID) And Arduino."

S. Verma, A. Singh, D. Singh and V. Laxmi, “Computer forensics in IT audit and credit card fraud investigation-for USB devices,” In 2014 International Conference on Computing for Sustainable Global Development (INDIACom), pp. pp. 730-733, (2014).

S. Agrawal and J. Agrawal, “Survey on anomaly detection using data mining techniques.,” Procedia Computer Science, vol. 60, pp. 708-713, (2015).

M. Ahmed, A. N. Mahmood and J. Hu, “A survey of network anomaly detection techniques.,” Journal of Network and Computer Applications, vol. 60, pp. 19-31., (2016).

I. Al Barazanchi, H. R. Abdulshaheed, M. Safiah, and B. Sidek, “Innovative technologies of wireless sensor network : The applications of WBAN system and environment,” Sustain. Eng. Innov., vol. 1, no. 2, pp. 98–105, 2020.

A. Alaidi, I. Aljazaery, H. Alrikabi, I. Mahmood, and F. Abed, "Design and Implementation of a Smart Traffic Light Management System Controlled Wirelessly by Arduino," 2020.

M. Kumar, M. Hanumanthappa and T. S. Kumar, “Network Intrusion Forensic Analysis Using Intrusion Detection System.,” Int. J. Comp. Tech. Appl,, vol. 2, no. 3, pp. 612-618, (2011).

O. H. Yahya, H. Alrikabi, I. A. J. I. J. o. O. Aljazaery, and B. Engineering, "Reducing the Data Rate in Internet of Things Applications by Using Wireless Sensor Network," vol. 16, no. 03, pp. 107-116, 2020.

A. Irons and H. S. Lallie, “Digital forensics to intelligent forensics.,” Future Internet, vol. 6, no. 3, pp. 584-596, (2014).

A. K. Muda, Y. H. Choo, A. Abraham and S. N. Srihari, “Computational intelligence in digital forensics: forensic investigation and applications.,” Springer International Publishing., (2014).

O. M. Adedayo, “Big data and digital forensics.,” In 2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF). IEEE., pp. pp. 1-7, (2016).




DOI: http://dx.doi.org/10.21533/pen.v8i3.1463

Refbacks

  • There are currently no refbacks.


Copyright (c) 2020 Mohammed I. Alghamdi

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

ISSN: 2303-4521

Digital Object Identifier DOI: 10.21533/pen

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License