Academia.eduAcademia.edu

Outline

A REVIEW OF INTERNET FORENSICS RESEARCH

2023, IJCSPUB

Abstract

Internet Forensics is a process of preservation, identification, extraction, and documentation of internet activities for investigation purposes. It is a science of determining evidence from internet platforms like emails, Webpages, and social media (SM). Moreover, it helps the forensic team with the best possible approaches and tools to solve complicated internet cases with the tracking of browser history, scripting, and heading information used by the web servers and the sources, substance, patterns, and transmission routes of emails and Web pages. Most widely generated from the Social Media platform followed by Webpages and emails and hence it is necessary to make research such information. The widespread use of Cloud Computing and Social Networking requests has resulted in a thorough investigation of Online Social Forensic investigation. The main concern is security and observing the pointed development in social network operators. This study investigated various kinds of internet forensics such as Email forensics, social media forensic, Network forensic, and Web forensic analysis which the review papers are analyzed using these four forensic analyses. A total of 25 papers were selected for this survey in which the advantages, disadvantages, and experimental studies are discussed.

References (25)

  1. Aliapoulios, Max, Emmi Bevensee, Jeremy Blackburn, Barry Bradlyn, Emiliano De Cristofaro, Gianluca Stringhini, and Savvas Zannettou. "An early look at the arler online social network." preprint arXiv:2101.03820 (2021).
  2. Volarević, I., Tomić, M. and Milohanić, L., 2022, May. Network forensics. In 2022 45th Jubilee International Convention on Information, Communication and Electronic Technology (MIPRO) IEEE.
  3. Rogers, Richard, and Sabine Niederer. The politics of social media manipulation. Amsterdam University Press, 2020.
  4. Bradshaw, Samantha, and Philip N. Howard. "Challenging truth and trust: A global inventory of organized social media manipulation." The computational propaganda project 1 (2018).
  5. Arshad, Humaira, Aman Jantan, Gan Keng Hoon, and Anila Sahar Butt. "A multilayered semantic framework for integrated forensic acquisition on social media." Digital Investigation 29 (2019):
  6. Reddy, S. Tharun, Rajesh Mothe, G. Sunil, A. Harshavardhan, and Seena Naik Korra. "Collecting the evidences and forensic analysis on social networks: Disputes and trends in research." Studia Rosenthaliana (Journal for the Study of Research), ISSN 0039-3347 (2019).
  7. Barik, K., Abirami, A., Konar, K. and Das, S., Research Perspective on Digital Forensic Tools and Investigation Process. Illumination of Artificial Intelligence in Cybersecurity and Forensics. 2022.
  8. Baroto, W.A.,. Email Analysis in Fraud Investigation: Digital Forensic and Network Analysis Approach. Asia Pacific Fraud Journal, 6(2), 2022
  9. Charalambou, E., Bratskas, R., Karkas, G. and Anastasiades, A., 2016. Email forensic tools: A roadmap to email header analysis through a cybercrime use case. Journal of Polish Safety and Reliability Association, 7.
  10. Yusoff, M.N., Dehghantanha, A. and Mahmod, R., 2017. Forensic investigation of social media and instant messaging services in Firefox OS: Facebook, Twitter, Google+, Telegram, OpenWapp, and Line as case studies. In Contemporary digital forensic investigations of cloud and mobile applications (pp. 41-62). Syngress.
  11. Shukla, S., Misra, M. and Varshney, G., 2020, November. Identification of spoofed emails by applying email forensics and memory forensics. In 2020 the 10th International Conference on Communication and Network Security (pp. 109-114).
  12. Ghafarian, A. and Keskin, D., 2022. Using Memory Forensics to Investigate Security and Privacy of Facebook. In Science and Information Conference (pp. 581-601). Springer, Cham.
  13. Putra, A.S., Aisyah, N. and Valentino, V.H., 2022. ANALYSIS OF NIST METHODS ON FACEBOOK MESSENGER FOR FORENSIC EVIDENCE. Journal of Innovation Research and Knowledge, 1(8), pp.695-702.
  14. Cloyd, T., Osborn, T., Ellingboe, B., Glisson, W.B. and Choo, K.K.R., 2018, August. Browser analysis of residual facebook data. In 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE) (pp. 1440-1445). IEEE.
  15. Yudhana, A., Riadi, I. and Anshori, I., 2018. Identification of Digital Evidence Facebook Messenger on Mobile Phone With National Institute of Standards Technology (Nist) Method. Jurnal Ilmiah Kursor, 9(3).
  16. Chang, M.S. and Yen, C.P., 2020. Evidence gathering of facebook messenger on android. International Journal of Network Security, 22(5), pp.828-837.
  17. Beskow, D.M. and Carley, K.M., 2020. You are known by your friends: Leveraging network metrics for bot detection in twitter. In Open Source Intelligence and Cyber Crime (pp. 53-88). Springer, Cham.
  18. Khan, A.A., Laghari, A.A., Awan, S. and Jumani, A.K., 2021. Fourth industrial revolution application: network forensics cloud security issues. Security Issues and Privacy Concerns in Industry 4.0 Applications, pp.15-33.
  19. Khan, A.A. and Ali, S.A., 2021. Network forensics investigation: Behaviour analysis of distinct operating systems to detect and identify the host in IPv6 network. International Journal of Electronic Security and Digital Forensics, 13(6), pp.600-611.
  20. Kusuma, R.S., Umar, R. and Riadi, I., 2021. Network forensics against ryuk ransomware using trigger, acquire, analysis, report, and action (TAARA) method. Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control.
  21. George, G. and Uppin, C., 2021. A PROACTIVE APPROACH TO NETWORK FORENSICS INTRUSION (DENIAL OF SERVICE FLOOD ATTACK) USING DYNAMIC FEATURES, SELECTION AND CONVOLUTION NEURAL NETWORK. Open Journal of Physical Science (ISSN: 2734-2123), 2(2), pp.01-09.
  22. Rathod, D., 2017. Web browser forensics: Google chrome. International Journal of Advanced Research in Computer Science, 8(7), pp.896-899.
  23. Lazzez, A. and Slimani, T., 2015. Forensics investigation of web application security attacks. International Journal of Computer Network and Information Security, 7(3), pp.10-17.
  24. Zampoglou, M., Papadopoulos, S., Kompatsiaris, Y., Bouwmeester, R. and Spangenberg, J., 2016. Web and social media image forensics for news professionals. In Proceedings of the International AAAI Conference on Web and Social Media (Vol. 10, No. 2, pp. 159-166).
  25. Umar, R., Yudhana, A. and Faiz, M.N., 2018. Experimental analysis of web browser sessions using live forensics method. Int. J. Electr. Comput. Eng, 8(5), pp.2951-2958.