CFP last date
20 June 2024
Reseach Article

Comparative Study and Simulation of Digital Forensic Tools

Published on February 2016 by Varsha Karbhari Sanap, Vanita Mane
International Conference on Advances in Science and Technology
Foundation of Computer Science USA
ICAST2015 - Number 1
February 2016
Authors: Varsha Karbhari Sanap, Vanita Mane
efae1def-8c4b-47f8-b7ba-af998a6c4bfa

Varsha Karbhari Sanap, Vanita Mane . Comparative Study and Simulation of Digital Forensic Tools. International Conference on Advances in Science and Technology. ICAST2015, 1 (February 2016), 8-11.

@article{
author = { Varsha Karbhari Sanap, Vanita Mane },
title = { Comparative Study and Simulation of Digital Forensic Tools },
journal = { International Conference on Advances in Science and Technology },
issue_date = { February 2016 },
volume = { ICAST2015 },
number = { 1 },
month = { February },
year = { 2016 },
issn = 0975-8887,
pages = { 8-11 },
numpages = 4,
url = { /proceedings/icast2015/number1/24217-3002/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Advances in Science and Technology
%A Varsha Karbhari Sanap
%A Vanita Mane
%T Comparative Study and Simulation of Digital Forensic Tools
%J International Conference on Advances in Science and Technology
%@ 0975-8887
%V ICAST2015
%N 1
%P 8-11
%D 2016
%I International Journal of Computer Applications
Abstract

The cyber crimes such as online banking fraud, credit card theft, child pornography, intellectual property theft, identity theft, unauthorized intrusion, money laundering, digital piracy etc. are growing rapidly with technology. Desktops, smartphones, laptops, digital cameras, GPS devices and even watches all can be used to aid a fraud. All this devices leave behind a digital footprint. Gathering electronic evidence and preserving it requires a special set of deliberations. Without a complete understanding of digital forensics, evidence could be compromise and which may cause evidence inadmissible in the court. To analyze the digital crime, the forensic technique is used. It is use to track where exactly the crime has been taken place and where the valuable data is hidden. To analyze the data and to recover the deleted or hidden data from the digital devices, the digital forensic tools are used. Paper presents the comparison of three digital forensic tools WinHex, Active file recovery, and ProDiscover Basic based on the parameters such as File examination, Log examination, Deleted File Indexing, Memory Dump Analysis, supported file systems, supported disk images.

References
  1. Gulshan Shrivastava, Kavita Sharma, Akansha Dwivedi, 2012. Forensic Computing Models: Technical Overview, CS and IT-CSCP, 2012.
  2. Sivaprasad A. , Jangale S. , 21-22 March 2012. A complete study on tools and techniques for digital forensic analysis,Interntional Conference on Computing, Electronics and Electrical Technologies (ICCEET), vol. , no. , pp. 881-886.
  3. Raghavan S. , Raghavan S. V. ,21-22 Nov 2013 A study of forensic and analysis tools," International workshop on Systematic Approaches to Digital Forensic Engineering(SADFE), vol. , no. , pp. 1,5.
  4. K. K. Sindhu, B. B. Meshram, 2012. Digital Forensics and Cyber Crime Data Mining, Journal of Information Security, 3, 196-201.
  5. Winhex tool, Download tool from: http://www. x-ways. net/winhex/
  6. Active file recovery tool, Download tool from: http://www. file-recovery. com/
  7. ProDiscover Tool, Download tool from: http://www. arcgroupny. com/product/prodiscover-basic/
  8. Sunit belapure, Nina Godbole, "Cyber Security: Understanding cyber crimes, computer forensicsand legal perspectives," First Edition, Wiley India.
Index Terms

Computer Science
Information Sciences

Keywords

Cyber Crime Digital Evidence Digital Forensics Digital Forensic Tools