CFP last date
20 March 2024
Call for Paper
April Edition
IJCA solicits high quality original research papers for the upcoming April edition of the journal. The last date of research paper submission is 20 March 2024

Submit your paper
Know more
Reseach Article

Combating Against Anti-Forensics Aligned with E-mail Forensics

by Sridhar Neralla, D. Lalitha Bhaskari, P. S. Avadhani
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 79 - Number 15
Year of Publication: 2013
Authors: Sridhar Neralla, D. Lalitha Bhaskari, P. S. Avadhani
10.5120/13817-1849

Sridhar Neralla, D. Lalitha Bhaskari, P. S. Avadhani . Combating Against Anti-Forensics Aligned with E-mail Forensics. International Journal of Computer Applications. 79, 15 ( October 2013), 16-19. DOI=10.5120/13817-1849

@article{ 10.5120/13817-1849,
author = { Sridhar Neralla, D. Lalitha Bhaskari, P. S. Avadhani },
title = { Combating Against Anti-Forensics Aligned with E-mail Forensics },
journal = { International Journal of Computer Applications },
issue_date = { October 2013 },
volume = { 79 },
number = { 15 },
month = { October },
year = { 2013 },
issn = { 0975-8887 },
pages = { 16-19 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume79/number15/13817-1849/ },
doi = { 10.5120/13817-1849 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:53:04.602068+05:30
%A Sridhar Neralla
%A D. Lalitha Bhaskari
%A P. S. Avadhani
%T Combating Against Anti-Forensics Aligned with E-mail Forensics
%J International Journal of Computer Applications
%@ 0975-8887
%V 79
%N 15
%P 16-19
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Knowledge on cyber forensics is increasing on par with the cyber crime incidents. Cyber criminals' uses sophisticated technological knowledge and always they plan to escape from the clutches of law. This paper elaborates e-mail forensics and categories of anti-forensics that can be applicable to the e-mail forensics. This paper elucidates the process of identifying such anti-forensics applied in e-mail forensics. This paper proposes a methodology for combating against anti-forensics in this regard.

References
  1. Rogers, M. (2006). CERIAS 2006-7th Annual Information Security Symposium, http://www. cerias. purdue. edu/news_and_events/events/symposium/2006/materials/pdfs/antiforensics. pdf, accessed on 12th July, 2013
  2. Ryan Harris, Arriving at an anti-forensics consensus: Examining how to define and control the anti-forensics problem, Digital Investigation 3 (2006), Digital Forensics Research Workshop
  3. Kessler, G. (2007). Anti-Forensics and the Digital Investigator, Proceedings of the 5th Australian Digital Forensics Conference, December 2007
  4. Paula Thomas and A. Morris, "An investigation into the development of an anti-forensic tool to obscure USB flash drive device information on a windows XP platform," in Digital Forensics and Incident Analysis, 2008. WDFIA'08. Third International Annual Workshop on, 2008, pp. 60-66.
  5. Glenn S. Dardick, Claire R. La Roche, Mary A. Flanigan, Blogs: Anti-Forensics And Counter Anti-Forensics, Proceedings of the 5th Australian Digital Forensics Conference, December 2007
  6. Sridhar N, Lalitha Bhaskari D, Avadhani PS, Plethora of Cyber Forensics, International Journal of Advanced Computer Science and Applications, Vol. 2, No. 11, 2011
  7. Allessandro Distefano, Gianluigi Me, Francesco Pace, Android anti-forensics through a local paradigm, Digital Investigation 7 (2010), Digital Forensic Research Workshop
  8. Ioana Sporea, Benjamin Aziz & Zak McIntyre, On the Availability of Anti-Forensic Tools for smart phones, International Journal of Security (IJS), Volume (6) : Issue (4) : 2012, Page 58-64
  9. Haodong Li, Weiqi Luo, Jiwu Huang, "Countering Anti-JPEG Compression Forensics", IEEE International Conference on Image Processing (ICIP), pp. 241-244, Sept. 30 - Oct. 3, 2012
  10. David Cowen, Matthew Seyer, File system journaling forensics theory, procedures and analysis impacts, SANS Digital Forensics and Incident Response Summit 2013,
  11. M. Tariq Banday, Techniques And Tools For Forensic Investigation Of E-Mail, International Journal of Network Security & Its Applications (IJNSA), Vol. 3, No. 6, November 2011
  12. http://articles. timesofindia. indiatimes. com/2013-09-19/ hyderabad/42217231_1_tahseen-akhtar-waqas-yasin-bhatkal, accessed on 19th September, 2013.
  13. Sridhar N, Lalitha Bhaskari D,Avadhani PS, Inverted Pyramid Approach for E-Mail forensics using heterogeneous forensics tools, CSI Communications, July2013
  14. Metasploit LLC. (2013). Metasploit Anti-forensics, http://www. metasploit. com/, accessed on 12th July, 2013
  15. Jie Zheng, E-mail Evidence Preservation: "How to Balance the Obligation and the High cost", Lex Electronica, Vol 14 n 2, fall 2009, page 10,
  16. Chet Hosmer, Proving the Integrity of Digital Evidence with Time, International Journal of Digital Evidence Spring 2002 Volume 1, Issue 1
Index Terms

Computer Science
Information Sciences

Keywords

Anti-Forensics Cyber Crimes Digital Evidence E-Mail Forensics Stylometry