A Comprehensive Survey on Computer Forensics: State-of-the-Art, Tools, Techniques, Challenges, and Future Directions

被引:39
作者
Javed, Abdul Rehman [1 ]
Ahmed, Waqas [1 ]
Alazab, Mamoun [2 ]
Jalil, Zunera [1 ]
Kifayat, Kashif [1 ]
Gadekallu, Thippa Reddy [3 ]
机构
[1] Air Univ, Dept Cyber Secur, Islamabad 44000, Pakistan
[2] Charles Darwin Univ, Coll Engn IT & Environm, Casuarina, NT 0810, Australia
[3] Vellore Inst Technol, Sch Informat Technol & Engn, Vellore 632014, Tamil Nadu, India
来源
IEEE ACCESS | 2022年 / 10卷
关键词
Forensics; Digital forensics; Operating systems; Computer crime; Electronic mail; Licenses; Cloud computing; Survey; state-of-the-art; digital forensics; cybercrime; computer forensics; investigation; tools; cybersecurity; MEMORY FORENSICS; INTRUSION DETECTION; VOLATILE MEMORY; ACQUISITION; TAXONOMY; CLASSIFICATION; IDENTIFICATION; METHODOLOGY; INFORMATION; SECURITY;
D O I
10.1109/ACCESS.2022.3142508
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the alarmingly increasing rate of cybercrimes worldwide, there is a dire need to combat cybercrimes timely and effectively. Cyberattacks on computing machines leave certain artifacts on target device storage that can reveal the identity and behavior of cyber-criminals if processed and analyzed intelligently. Forensic agencies and law enforcement departments use several digital forensic toolkits, both commercial and open-source, to examine digital evidence. The proposed research survey focuses on identifying the current state-of-the-art digital forensics concepts in existing research, sheds light on research gaps, presents a detailed introduction of different computer forensic domains and forensic toolkits used for computer forensics in the current era. The proposed survey also presents a comparative analysis based on the tool's characteristics to facilitate investigators in tool selection during the forensics process. Finally, the proposed survey identifies and derives current challenges and future research directions in computer forensics.
引用
收藏
页码:11065 / 11089
页数:25
相关论文
共 153 条
  • [1] ElStream: An Ensemble Learning Approach for Concept Drift Detection in Dynamic Social Big Data Stream Learning
    Abbasi, Ahmad
    Javed, Abdul Rehman
    Chakraborty, Chinmay
    Nebhen, Jamel
    Zehra, Wisha
    Jalil, Zunera
    [J]. IEEE ACCESS, 2021, 9 : 66408 - 66419
  • [2] Adamu H., 2021, INT J RES INNOV APPL, V6, P103
  • [3] URLdeepDetect: A Deep Learning Approach for Detecting Malicious URLs Using Semantic Vector Models
    Afzal, Sara
    Asim, Muhammad
    Javed, Abdul Rehman
    Beg, Mirza Omer
    Baker, Thar
    [J]. JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2021, 29 (03)
  • [4] Security in Next Generation Mobile Payment Systems: A Comprehensive Survey
    Ahmed, Waqas
    Rasool, Aamir
    Javed, Abdul Rehman
    Kumar, Neeraj
    Gadekallu, Thippa Reddy
    Jalil, Zunera
    Kryvinska, Natalia
    [J]. IEEE ACCESS, 2021, 9 : 115932 - 115950
  • [5] Ahmed Waqas., 2021, 2021 11th IFIP International Conference on New Technologies, Mobility and Security (NTMS), P1, DOI 10.1109/NTMS49979.2021.9432677
  • [6] Aju D., 2021, CONUENCE MACHINE DEE, P1
  • [7] Akay Y. V., 2020, JURNAL TEKNIK INFORM, V15, P291
  • [8] Behavioural Digital Forensics Model: Embedding Behavioural Evidence Analysis into the Investigation of Digital Crimes
    Al Mutawa, Noora
    Bryce, Joanne
    Franqueira, Virginia N. L.
    Marrington, Andrew
    Read, Janet C.
    [J]. DIGITAL INVESTIGATION, 2019, 28 : 70 - 82
  • [9] Al-Zarouni M, 2004, P AUSTR COMP NETW IN, P16
  • [10] Alani M.M., 2014, GUIDE OSI TCPIP MODE, P5, DOI 10.1007/978-3-319-05152-9_2