Cyber Forensics Tools A Review On Mechanism and Emerging Challenges
Cyber Forensics Tools A Review On Mechanism and Emerging Challenges
net/publication/351683844
CITATIONS READS
20 1,235
1 author:
Vihara Fernando
Sri Lanka Institute of Information Technology
3 PUBLICATIONS 20 CITATIONS
SEE PROFILE
All content following this page was uploaded by Vihara Fernando on 10 July 2023.
Abstract—With the development of technology, “Data”, also through the data acquisition methods which are, Static Data
interpreted as “Information” has become a major role played in Acquisition and Dynamic Data Acquisition [3]. After
the field of Cyber Forensics. One of the most crucial incidents acquiring the data, it should be analyzed and examined in order
which needs data to be important is, when it is taken as evidence
in cyber-crimes. These crimes can be occurring in the fields of
to find the evidence related to a crime. Therefore, a digital
digital media and network in many instances related to crime forensic tool to perform its functionalities well, it should have
scenes. Crime and forensic both investigators need the help of a greater level of accuracy throughout the investigation process
digital forensics to investigate in order to identify, whether the until it becomes an acceptable evidence to the court of law.
victim has committed a crime or not. Therefore, it is a There is a vast categorization of digital forensics according
requirement for an investigator to use a suitable, accurate, to the media and platform the data is stored. Computer
affordable and a reliable cyber forensic tool for the forensics
investigations conducted with respect to crimes. Many
Forensics, Network Forensics, Mobile Forensics, Database
researchers have done experiments on different functionalities, a Forensics, and Forensic Data Analysis are the main categories
forensic tool should have and have come up with various tools of digital forensics discovered [2]. Moreover, with different
specifically for each branch in cyber forensics. Furthermore, with means, digital forensics is narrowed and specified into the
time, these cyber forensic tools have been identified with categories of Memory, Disk, Operating System, Proactive,
drawbacks due to the invasion of crimes, especially related to the Wireless, Cloud, Email, Malware, Web, Registry, Recycle Bin,
sophisticated technology expansion. Therefore, the acquiring
process of forensics tools is in lack of advanced features to detect
Image, Audio/Video and Log Forensics. Cyber forensic tools
evidence. This paper describes on some timely Digital Forensics are developed aligned to each of these categories either as a
tools and discusses emerging challenges in advanced areas of tool which caters a specific task or as a suite which is capable
Digital Forensics. of many forensic functions together with corresponding digital
forensic frameworks.
Keywords — Cyber Forensics tools, Digital Forensics, Evidence, Several drawbacks in digital forensics tools are being
Investigation
discovered over time, while performing in forensic
investigations. Likewise, other software and hardware devices,
I. INTRODUCTION cyber forensics tools too have drawbacks encountered due to
the facts of accuracy, data extraction capacity, responsiveness,
Forensic Science [1] describes on determining the
encryption and compatibility issues with systems [18, 20, 27].
evidential value of a crime scene and related evidence which
These challenges cause investigations to become a failure,
can be used to give the right penalties to persons who have
when the tools are not capable of performing the relevant tasks
committed crimes or clear the names of the suspects who have
of extracting, analyzing and reporting accurately.
not been involved in crimes. In this paper it is emphasized on a
Performing a vivid literature survey on the drawbacks of
main branch of Forensic science; Digital Forensics [2] which is
forensics tools, numerous challenges were recognized upon the
a much-needed component in crime scene investigations.
fields, which are at the peak of development in the present.
According to crime scene investigation researchers, Digital
This paper conveys the reader on Digital Forensic tools and the
Forensics is the process of preservation, identification,
forthcoming challenges recognized due to their drawbacks.
extraction, interpretation and documentation of computer and
Furthermore, this paper concludes with solutions and research
digital evidence that are stored in digital and electronic
to be developed as future work.
devices. In order to fulfill this objective of digital forensics, a
range of tools are required with various functionalities.
A cyber forensic tool [4] is the main recourse in a forensic II. CYBER FORENSICS TOOLS
investigation to retrieve the evidence included with data, which
can be gained directly, hidden data and meta data [2]. These A. Computer Forensics
tools need to have the capability of extracting evidence stored 1. EnCase
in digital devices in a way that the data containing within Encase [4] is a commercial platform having a suite of
evidence are not corrupted or unsecured. Furthermore, the investigation tools and techniques embedded in it. It analyzes
evidence should be extracted unaltered and undisclosed
[13] G. Suciu , C. Istrate , R. I. Răducanu , M. Diţu , O. Fratu and A. Vulpe, [29] R. A. Hansen et al., “File Toolkit for Selective Analysis &
“Mobile devices forensic platform for malware detection,” in. 6th Reconstruction (FileTSAR) for Large-Scale Networks,” in 2018 IEEE
International Symposium for ICS & SCADA Cyber Security Research International Conference on Big Data (Big Data), Seattle, WA, USA,
2019 (ICS-CSR), Athens, Greece, 2019, pp. 59-66. 2018, pp. 3059-3065.
[14] R. Ahmed and R. V. Dharaskar, “Mobile Forensics: an Overview, Tools, [30] S. Khan et al., “Software-Defined Network Forensics: Motivation,
Future trends and Challenges from Law Enforcement perspective,” in 6th Potential Locations, Requirements, and Challenges,” IEEE Network, vol.
International Conference on E-Governance, New Delhi, India, 2008, pp. 30, no. 6, pp. 6-13, November-December 2016.
312-323. [31] I. Abeykoon and X. Feng, “Challenges in ROS Forensics,” in 2019 IEEE
[15] “SQLite Forensics Browser.” Revove. [Online]. Available: SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted
https://www.revove.com/database-forensics/sqlite-forensics-browser/ Computing, Scalable Computing & Communications, Cloud & Big Data
[Accessed: 22-Aug-2020]. Computing, Internet of People and Smart City Innovation
(SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI), Leicester,
[16] E. C. Cankaya and B. Kupka, “A survey of digital forensics tools for United Kingdom, 2019, pp. 1677-1682.
database extraction,” in 2016 Future Technologies Conference (FTC),
San Francisco, CA, USA, 2016, pp. 1014-1019. [32] W. Yang, M. N. Johnstone, L. F. Sikos and S. Wang, “Security and
Forensics in the Internet of Things: Research Advances and Challenges,”
[17] M. Quintana, S. Uribe, F. Sánchez and F. Álvarez, “Recommendation in 2020 Workshop on Emerging Technologies for Security in IoT
techniques in forensic data analysis: a new approach,” in 6th (ETSecIoT), Sydney, Australia, 2020, pp. 12-17.
International Conference on Imaging for Crime Prevention and
Detection (ICDP-15), London, UK, 2015, pp. 1-5. [33] A.Y. Javaid, Q. Niyaz, W. Sun and A. Mansoor, “A Deep Learning
Approach for Network Intrusion Detection System,” in 9th EAI
[18] R. Padmanabhan, K. Lobo, M. Ghelani, D. Sujan and M. Shirole, International Conference on Bio-inspired Information and
“Comparative analysis of commercial and open source mobile device Communications Technologies, New York, USA, 2015, pp. 21-26.
forensic tools,” in 2016 Ninth International Conference on
Contemporary Computing (IC3), Noida, India, 2016, pp. 1-6. [34] M. N. Johnstone and M. Peacock, “Seven Pitfalls of Using Data Science
in Cybersecurity,” in Data Science in Cybersecurity and Cyberthreat
[19] M. Chernyshev, S. Zeadally, Z. Baig and A. Woodward, “Mobile Intelligence. Cham, Switzerland: Springer, 2020.
Forensics: Advances, Challenges, and Research Opportunities,” IEEE
Security & Privacy, vol. 15, no. 6, pp. 42-51, November/December 2017.
[20] A. Zareen and Dr. S. Baig, “Mobile Phone Forensics Challenges,
Analysis and Tools Classification,” in 2010 Fifth International Workshop
on Systematic Approaches to Digital Forensic Engineering, Oakland,
California, 2010, pp. 47-55.
[21] P.R. Brandão, (2019). “Forensics and Digital Criminal Investigation
Challenges in Cloud Computing and Virtualization.” American Journal
of Networks and Communications [Online]. vol. 8, no. 1, pp. 23-31.
Available:
https://www.researchgate.net/publication/335419838_Forensics_and_Di
gital_Criminal_Investigation_Challenges_in_Cloud_Computing_and_Vi
rtualization [Accessed: 23-Aug-2020].