A Detection and Investigation Model for the Capture and Analysis of Network Crimes

被引:1
作者
Alansari, Iman S. [1 ]
机构
[1] Taibah Univ, Coll Comp Sci & Engn, Comp Sci Dept, Yanbu, Saudi Arabia
关键词
network forensics; digital forensics; design science research; DIGITAL FORENSIC READINESS; FRAMEWORK; INTERNET;
D O I
10.48084/etasr.6316
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Investigation in the field of network forensics involves examining network traffic to identify, capture, preserve, reconstruct, analyze, and document network crimes. Although there are different perspectives on the practical and technical aspects of network forensics, there is still a lack of fundamental guidelines. This paper proposes a new detection and investigation model for capturing and analyzing network crimes, using design science research. The proposed model involves six processes: identification, verification, gathering, preservation, examination, analysis, and documentation. Each process is associated with several activities that provide the investigation team with a clear picture of exactly what needs to be performed. In addition, the proposed model has a unique activity, namely reporting. As a result, this model represents a comprehensive approach to network forensics investigations. It is designed to work in conjunction with established forensic techniques to ensure that forensic evidence from the network is collected and analyzed efficiently and effectively following accepted forensic procedures. The proposed model was compared with existing models in terms of completeness, showing that it is complete and can be adapted to any type of network and legal framework.
引用
收藏
页码:11871 / 11877
页数:7
相关论文
共 73 条
[1]   Data Anonymization Using Pseudonym System to Preserve Data Privacy [J].
Abd Razak, Shukor ;
Nazari, Nur Hafizah Mohd ;
Al-Dhaqm, Arafat .
IEEE ACCESS, 2020, 8 :43256-43264
[2]   A Review of Current Research in Network Forensic Analysis [J].
Adeyemi, Ikuesan R. ;
Razak, Shukor Abd ;
Azhan, Nor Amira Nor .
INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2013, 5 (01) :1-26
[3]  
Al-dhaqm A., 2014, INT C REC TRENDS INF
[4]  
Al-Dhaqm A., 2023, Kids Cybersecurity Using Computational Intelligence Techniques, P81
[5]   Digital Forensics Subdomains: The State of the Art and Future Directions [J].
Al-Dhaqm, Arafat ;
Ikuesan, Richard Adeyemi ;
Kebande, Victor R. ;
Abd Razak, Shukor ;
Grispos, George ;
Choo, Kim-Kwang Raymond ;
Al-Rimy, Bander Ali Saleh ;
Alsewari, Abdulrahman A. .
IEEE ACCESS, 2021, 9 :152476-152502
[6]   Research Challenges and Opportunities in Drone Forensics Models [J].
Al-Dhaqm, Arafat ;
Ikuesan, Richard A. ;
Kebande, Victor R. ;
Razak, Shukor ;
Ghabban, Fahad M. .
ELECTRONICS, 2021, 10 (13)
[7]   A Review of Mobile Forensic Investigation Process Models [J].
Al-Dhaqm, Arafat ;
Abd Razak, Shukor ;
Ikuesan, Richard Adeyemi ;
Kebande, Victor R. ;
Siddique, Kamran .
IEEE ACCESS, 2020, 8 :173359-173375
[8]   Towards the Development of an Integrated Incident Response Model for Database Forensic Investigation Field [J].
Al-Dhaqm, Arafat ;
Abd Razak, Shukor ;
Siddique, Kamran ;
Ikuesan, Richard Adeyemi ;
Kebande, Victor R. .
IEEE ACCESS, 2020, 8 :145018-145032
[9]   Categorization and Organization of Database Forensic Investigation Processes [J].
Al-Dhaqm, Arafat ;
Abd Razak, Shukor ;
Dampier, David A. ;
Choo, Kim-Kwang Raymond ;
Siddique, Kamran ;
Ikuesan, Richard Adeyemi ;
Alqarni, Abdulhadi ;
Kebande, Victor R. .
IEEE ACCESS, 2020, 8 :112846-112858
[10]   Database Forensic Investigation Process Models: A Review [J].
Al-dhaqm, Arafat ;
Abd Razak, Shukor ;
Othman, Siti Hajar ;
Ali, Abdulalem ;
Ghaleb, Fuad A. ;
Rosman, Arieff Salleh ;
Marni, Nurazmallail .
IEEE ACCESS, 2020, 8 :48477-48490