• Title/Summary/Keyword: Digital investigation framework

Search Result 21, Processing Time 0.026 seconds

Methodology for digital investigation of illegal sharing using BitTorrent (BitTorrent를 이용한 저작물 불법 공유 조사 방법에 관한 연구)

  • Park, Soo-Young;Chung, Hyun-Ji;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.2
    • /
    • pp.193-201
    • /
    • 2013
  • Sharing copyrighted files without copyright holder's permission is illegal. But, a number of illegal file sharers using BitTorrent increase. However, it is difficult to find appropriate digital evidences and legal basis to punish them. And, there are no framework for digital investigation of illegal sharing using BitTorrent. Additionally, role of server in BitTorrent had been reduced than server in conventional P2P. So, It is difficult to apply investigation framework for illegal sharing using conventional P2P to investigation process of illegal sharing using BitTorrent. This paper proposes the methodology about punishing illegal sharer using BitTorrent by suggesting the digital investigation framework.

Open Source Tools for Digital Forensic Investigation: Capability, Reliability, Transparency and Legal Requirements

  • Isa Ismail;Khairul Akram Zainol Ariffin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.9
    • /
    • pp.2692-2716
    • /
    • 2024
  • Over the past decade, law enforcement organizations have been dealing with the development of cybercrime. To address this growing problem, law enforcement organizations apply various digital forensic (DF) tools and techniques to investigate crimes involving digital devices. This ensures that evidence is admissible in legal proceedings. Consequently, DF analysts may need to invest more in proprietary DF hardware and software to maintain the viability of the DF lab, which will burden budget-constrained organizations. As an alternative, the open source DF tool is considered a cost-saving option. However, the admissibility of digital evidence obtained from these tools has yet to be tested in courts, especially in Malaysia. Therefore, this study aimed to explore the admissibility of digital evidence obtained through open source DF tools. By reviewing the existing literature, the factors that affect the admissibility of the evidence produced by these tools in courts were identified. Further, based on the findings, a conceptual framework was developed to ensure the admissibility of the evidence so that it will be accepted in the court of law. This conceptual framework was formed to outline the factors affecting the admissibility of digital evidence from open source DF tools, which include; 1) The Availability and Capability of open source DF tools, 2) the Reliability and Integrity of the digital evidence obtained from open source DF tools, 3) the Transparency of the open source DF tools, and 4) the Lack of Reference and Standard of open source DF tools. This study provides valuable insights into the digital forensic field, and the conceptual framework can be used to integrate open source DF tools into digital forensic investigations.

Digital Forensics Framework for Cloud Computing (클라우드 환경을 고려한 디지털 포렌식 프레임워크)

  • Lee, Chang-Hoon
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.1
    • /
    • pp.63-68
    • /
    • 2013
  • Recently, companies seek a way to overcome their financial crisis by reducing costs in the field of IT. In such a circumstance, cloud computing is rapidly emerging as an optimal solution to the crisis. Even in a digital forensic investigation, whether users of an investigated system have used a cloud service is a very important factor in selecting additional investigated subjects. When a user has used cloud services, such as Daum Cloud and Google Docs, it is possible to connect to the could service from a remote place by acquiring the user's log-in information. In such a case, evidence data should be collected from the remote place for an efficient digital forensic investigation, and it is needed to conduct research on the collection and analysis of data from various kinds of cloud services. Thus, this study suggested a digital forensic framework considering cloud environments by investigating collection and analysis techniques for each cloud service.

A Digital Forensic Framework Design for Joined Heterogeneous Cloud Computing Environment

  • Zayyanu Umar;Deborah U. Ebem;Francis S. Bakpo;Modesta Ezema
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.207-215
    • /
    • 2024
  • Cloud computing is now used by most companies, business centres and academic institutions to embrace new computer technology. Cloud Service Providers (CSPs) are limited to certain services, missing some of the assets requested by their customers, it means that different clouds need to interconnect to share resources and interoperate between them. The clouds may be interconnected in different characteristics and systems, and the network may be vulnerable to volatility or interference. While information technology and cloud computing are also advancing to accommodate the growing worldwide application, criminals use cyberspace to perform cybercrimes. Cloud services deployment is becoming highly prone to threats and intrusions. The unauthorised access or destruction of records yields significant catastrophic losses to organisations or agencies. Human intervention and Physical devices are not enough for protection and monitoring of cloud services; therefore, there is a need for more efficient design for cyber defence that is adaptable, flexible, robust and able to detect dangerous cybercrime such as a Denial of Service (DOS) and Distributed Denial of Service (DDOS) in heterogeneous cloud computing platforms and make essential real-time decisions for forensic investigation. This paper aims to develop a framework for digital forensic for the detection of cybercrime in a joined heterogeneous cloud setup. We developed a Digital Forensics model in this paper that can function in heterogeneous joint clouds. We used Unified Modeling Language (UML) specifically activity diagram in designing the proposed framework, then for deployment, we used an architectural modelling system in developing a framework. We developed an activity diagram that can accommodate the variability and complexities of the clouds when handling inter-cloud resources.

Social Media Adoption: Small and Medium-sized Enterprises' Perspective in Sri Lanka

  • SAMSUDEEN, Sabraz Nawaz;THELIJJAGODA, Samantha;SANJEETHA, Mohamed Buhary Fathima
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.1
    • /
    • pp.759-766
    • /
    • 2021
  • In this digital age, all organizational environments force businesses to adopt Information and Communication Technologies (ICT) since these technologies have immense impact on such businesses' competitiveness and productivity. Nonetheless, the productivity and the competitiveness enjoyed by such firms vary depending on the size or the organizations, context of the country; developing or developed, and what kinds of technologies are adopted. This investigation focused on small- and medium-sized enterprises (SMEs) of Eastern province of Sri Lanka where such studies are scanty. The adoption of social media (SM) by SMEs is inclined to change how organizations operate, this calls for an investigation of the elements that impact SMEs to adopt SM and such investigation. Technology-Organization-Environment (TOE) framework was based to understand the factors. Research approach was quantitative approach using questionnaire survey. Data were collected using online form to see 285 valid responses. Structural Equation Modelling was deployed to evaluate the proposed model. Results revealed that Relative Advantage, Compatibility, Complexity, Observability, Competitive Intensity, Bandwagon Pressure, and Competitive Pressure were influencing, while Trialability, Top Management Support, CEO's Innovativeness did not show statistically significant influence on SMEs' social media adoption.

Digital forensic framework for illegal footage -Focused On Android Smartphone- (불법 촬영물에 대한 디지털 포렌식 프레임워크 -안드로이드 스마트폰 중심으로-)

  • Kim, Jongman;Lee, Sangjin
    • Journal of Digital Forensics
    • /
    • v.12 no.3
    • /
    • pp.39-54
    • /
    • 2018
  • Recently, discussions for the eradication of illegal shooting have been carried out in a socially-oriented way. The government has established comprehensive measures to eradicate cyber sexual violence crimes such as illegal shooting. Although the social interest in illegal shooting has increased, the illegal film shooting case is evolving more and more due to the development of information and communication technology. Applications that can hide confused videos are constantly circulating around the market and community sites. As a result, field investigators and professional analysts are experiencing difficulties in collecting and analyzing evidence. In this paper, we propose an evidence collection and analysis framework for illegal shooting cases in order to give practical help to illegal shooting investigation. We also proposed a system that can detect hidden applications, which is one of the main obstacles in evidence collection and analysis. We developed a detection tool to evaluate the effectiveness of the proposed system and confirmed the feasibility and scalability of the system through experiments using commercially available concealed apps.

Digital Forensic: Challenges and Solution in the Protection of Corporate Crime

  • CHOI, Do-Hee
    • The Journal of Industrial Distribution & Business
    • /
    • v.12 no.6
    • /
    • pp.47-55
    • /
    • 2021
  • Purpose: Organizational crime is an offense committed by an individual or an official in a corporate entity for organizational gain. This study aims to explore the literature on challenges facing digital forensics and further discuss possible solutions to such challenges as far as the protection of corporate crime is concerned. Research design, data and methodology: Qualitative textual methodology matches the interpretative approach since it is a quality method meant to consider the inductivity of strategies. Also, a qualitative approach is vital because it is distinct from the techniques used in optimistic paradigms linked to science laws. Results: For achieving justice through the investigation of digital forensic, there is a need to eradicate corporate crimes. This study suggests several solutions to reduce corporate crime such as 'Solving a problem to Anti-forensic Techniques', 'Cloud computing technique', and 'Legal Framework' etc. Conclusion: As corporate crime increases in rate, the data collected by digital forensics increases. The challenge of analyzing chunks of data requires digital forensic experts, who need tools to analyze them. Research findings shows that a change of the operating system and digital evidence interpretation is becoming a challenge as the new computer application software is not compatible with older software's structure.

A Technology-Strategy Integrated Digital Forensic Process Framework Considering Government ICT R&D Strategy and ICT Paradigm Shift (정부 ICT R&D 중장기전략과 ICT 패러다임 변화를 반영한 디지털 포렌식 표준정립을 위한 기술-정책적 통합프로세스 프레임워크)

  • Shin, Jun Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.7
    • /
    • pp.1495-1504
    • /
    • 2014
  • Currently information related service such as internet banking, chatting, social network services are quite well smeared into our daily life. Moreover, a rapid growth of service using smart devices brought an importance of security in internet services and a research activation of digital forensic in a crime investigation. This paper presented a previous digital forensic research trend and based on this, suggested a technology-strategy integrated digital forensic process platform, taking a mid-long term government leading ICT R&D strategy and ICT paradigm shift into account.

Examining the Practice of Digital Scholarship Services at Vietnam National University Ho Chi Minh City

  • Ngo, Thi Huyen;Nguyen, Hong Sinh;Ninh, Thi Kim Thoa
    • Journal of Information Science Theory and Practice
    • /
    • v.10 no.1
    • /
    • pp.1-17
    • /
    • 2022
  • The article reports the results of an investigation on the practice of providing digital scholarship services at Vietnam National University Ho Chi Minh City, Vietnam. This study is part of an ongoing research project entitled Developing a digital scholarship service framework for universities at Vietnam National University Ho Chi Minh City. It employed a qualitative research approach through in-depth interviews with 31 individuals who are university managers, library managers, lecturers, and postgraduate and undergraduate students from six member universities and Central Library of Vietnam National University Ho Chi Minh City. Research results show that some digital scholarship services have been provided at Vietnam National University Ho Chi Minh City. However, they have not been yet systematically implemented and have not met users' needs. Lack of needed resources such as space, technology infrastructure, human resources, finance, and stakeholder support are among major challenges in developing digital scholarship services. The management of existing digital scholarship services is fragmented without a clear policy for developing digital scholarship and supporting services. The study contributes to the existing knowledge by adding substantially to current understanding of the practice of providing digital scholarship services in Vietnam's universities in the transition period, from state control to autonomy, which has not been much addressed in previous research. Furthermore, this study can be a useful reference for higher education institutions in developing countries regarding implementation of digital scholarship services.

Investigation of Cryptocurrency Crimes Using Open Source Intelligence (OSINT): focused on Integrated Techniques with Methods and Framework (공개출처정보(OSINT)를 활용한 가상화폐 범죄 추적 분석 기법: 방법(Methods) 및 프레임워크(Framework)의 통합 적용)

  • Byung Wan Suh;Won-Woong Kim
    • Convergence Security Journal
    • /
    • v.24 no.3
    • /
    • pp.23-31
    • /
    • 2024
  • The anonymity and decentralized nature of cryptocurrencies make them highly susceptible to criminal exploitation, requiring the development of effective tracking techniques. By analyzing various open source intelligence(OSINT), such as public data, social media, and online forums, open source intelligence can provide useful information for identifying criminals and tracking the flow of cryptocurrency funds. In this study, we present a comprehensive proposal for the utilization of open source intelligence. We will discuss the current status and trends of cryptocurrency and related crimes, and introduce the concept and methodology of open source intelligence. The paper then focuses on five methods and seven frameworks of open source intelligence for tracking and analyzing cryptocurrency-related crimes, and presents techniques for the integrated application of open source intelligence methods and frameworks.