Cyber Forensic Tools: A Review

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2016 by IJETT Journal
Volume-41 Number-5
Year of Publication : 2016
Authors : B. V. Prasanthi
DOI :  10.14445/22315381/IJETT-V41P249

Citation 

B. V. Prasanthi "Cyber Forensic Tools: A Review", International Journal of Engineering Trends and Technology (IJETT), V41(5),266-271 November 2016. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group

Abstract
Cyber attacks are fast moving and increasing in number and severity. When the attacks occur, the attacked enterprise responds with a collection of predetermined actions. Applying digital forensics helps in the recovery and investigation of material on digital media and networks is one of these actions. Cyber Forensic Investigation includes the Capture & Analysis of digital data either to prove or disprove whether the internet related theft has committed or not. Earlier Computer are used only for storing large volumes of data & perform many operations on it ,but now a days it has expanded & occupied prior role in Crime Investigation. In order to solve this cyber related problems, selection & usage of Forensic tools is very important. For better research and quick investigation, the developers have created many cyber forensic tools. Cop departments and investigation agencies select the tools based on various factors including budget and available experts on the team. This paper describes includes importance of computer forensics & its origin, forensic framework and different types of existing computer forensic tools and its usage.

 References

[1] M. Pollitt, “A History of Digital Forensics,” in Advances in Digital Forensics VI, vol. 337, K.-P. Chow and S. Shenoi, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010, pp. 3–15.
[2] Nilakshi Jain1 , Dr. Dhananjay R Kalbande2,”A Comparative Study based Digital Forensic Tool: Complete Automated Tool” The International Journal of Forensic Computer Science,2014 DOI: 10.5769/J201401003
[3] Hussain, S. Mahaboob, A. S. N. Chakravarthy, and G. S. Sarma. "BSC: A Novel Scheme for Providing Security using Biometric Smart Card." International Journal of Computer Applications 80.1 (2013).
[4] B.V.Prasanthi, U.Padma Jyothi, B.Sridevi , T.Vamsi Krishna,“ Security Enhancement of ATM System with Fingerprint and DNA Data” International Journal of Advanced Research in Computer Science and Software Engineering( 2014)
[5] Kanakam, Prathyusha, S. Mahaboob Hussain, and A. S. N. Chakravarthy. "Electronic noses: Forestalling fire disasters: A technique to prevent false fire alarms and fatal casualties." 2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC). IEEE, 2015.
[6] Prasanthi, B. V., et al. "Palm Vein Biometric Technology: An Approach to Upgrade Security in ATM Transactions." International Journal of Computer Applications 112.9 (2015).
[7] F. N. Dezfoli, A. Dehghantanha, R. Mahmoud, N. F. B. M. Sani, and F. Daryabar, “Digital Forensic Trends & Future,” International Journal of Cyber-Security and Digital Forensics (IJCSDF), vol. 2, no. 2, pp. 48–76, 2013.
[8] Schatz, Bradley, and Andrew J. Clark. "An open architecture for digital evidence integration." (2006): 15-29.
[9] Computer Aided Investigative Environment http://www.caine-live.net/
[10] X-Ways Forensics, Available http://www.xways. net/, accessed August 2007.
[11] SANS Investigative Forensics Toolkit – SIFT Available:http://digitalforensics.sans.org/community /downloads
[12] Guidance Software. EnCase Legal Journal, Second Edition. March 2002. Available at: http://www.encase.com/support/downloads/LegalJou rnal.pdf
[13] Registry Recon http://arsenalrecon.com/apps/recon/
[14] TSK tools, Brian Carrier site, http://www.sleuthkit.org/sleuthkit/, 14/1/2009
[15] Libforensics http://code.google.com/p/libforensics/
[16] Volatility http://code.google.com/p/volatility/
[17]WindowsSCOPEhttp://www.windowsscope.com/index.php?page=shop.product_details&flypage=flypage.tpl&product_id=35&category_id=3&option=com_virtuemart
[18] TheCoroner’sToolkit http://www.porcupine.org/forensics/tct.html
[19] Oxygen Forensic Suite http://www.oxygenforensic. com/en/features
[20] BulkExtractor http://digitalcorpora.org/downloads/bulk_extractor/ [21] Xplico Available http://www.xplico.org/about
[22] MandiantRedLine Available https://www.mandiant.com/resources/dow nload/redline
[23] Computer Online Forensic Evidence Extractor Available: https://cofee.nw3c.org/
[24] P2 eXplorer https://www.paraben.com/p2- explorer.html
[25] PlainSight http://www.plainsight.info/index.html
[26] XRY http://www.msab.com/xry/what-is-xry
[27] HELIX3 https://efenseinc.sharefile.com/d/sda4309a624d48b8 8
[28] Cellebrite UFED http://www.cellebrite.com/Mobile- Forensics
[29] Free computer forensic tools Available http://resources.infosecinstitute.com/computerforensics- tools/
[30] Roman, Rodrigo Fernando Morocho, et al. "Digital Forensics Tools." International Journal of Applied Engineering Research 11.19 (2016): 9754-9762

Keywords
Digital Forensics and its frame work, Cyber forensics tools.