Cyber Forensic Tools: A Review
|International Journal of Engineering Trends and Technology (IJETT)||
|© 2016 by IJETT Journal|
|Year of Publication : 2016|
|Authors : B. V. Prasanthi
|DOI : 10.14445/22315381/IJETT-V41P249|
B. V. Prasanthi "Cyber Forensic Tools: A Review", International Journal of Engineering Trends and Technology (IJETT), V41(5),266-271 November 2016. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group
Cyber attacks are fast moving and increasing in number and severity. When the attacks occur, the attacked enterprise responds with a collection of predetermined actions. Applying digital forensics helps in the recovery and investigation of material on digital media and networks is one of these actions. Cyber Forensic Investigation includes the Capture & Analysis of digital data either to prove or disprove whether the internet related theft has committed or not. Earlier Computer are used only for storing large volumes of data & perform many operations on it ,but now a days it has expanded & occupied prior role in Crime Investigation. In order to solve this cyber related problems, selection & usage of Forensic tools is very important. For better research and quick investigation, the developers have created many cyber forensic tools. Cop departments and investigation agencies select the tools based on various factors including budget and available experts on the team. This paper describes includes importance of computer forensics & its origin, forensic framework and different types of existing computer forensic tools and its usage.
 M. Pollitt, “A History of Digital Forensics,” in Advances in Digital Forensics VI, vol. 337, K.-P. Chow and S. Shenoi, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010, pp. 3–15.
 Nilakshi Jain1 , Dr. Dhananjay R Kalbande2,”A Comparative Study based Digital Forensic Tool: Complete Automated Tool” The International Journal of Forensic Computer Science,2014 DOI: 10.5769/J201401003
 Hussain, S. Mahaboob, A. S. N. Chakravarthy, and G. S. Sarma. "BSC: A Novel Scheme for Providing Security using Biometric Smart Card." International Journal of Computer Applications 80.1 (2013).
 B.V.Prasanthi, U.Padma Jyothi, B.Sridevi , T.Vamsi Krishna,“ Security Enhancement of ATM System with Fingerprint and DNA Data” International Journal of Advanced Research in Computer Science and Software Engineering( 2014)
 Kanakam, Prathyusha, S. Mahaboob Hussain, and A. S. N. Chakravarthy. "Electronic noses: Forestalling fire disasters: A technique to prevent false fire alarms and fatal casualties." 2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC). IEEE, 2015.
 Prasanthi, B. V., et al. "Palm Vein Biometric Technology: An Approach to Upgrade Security in ATM Transactions." International Journal of Computer Applications 112.9 (2015).
 F. N. Dezfoli, A. Dehghantanha, R. Mahmoud, N. F. B. M. Sani, and F. Daryabar, “Digital Forensic Trends & Future,” International Journal of Cyber-Security and Digital Forensics (IJCSDF), vol. 2, no. 2, pp. 48–76, 2013.
 Schatz, Bradley, and Andrew J. Clark. "An open architecture for digital evidence integration." (2006): 15-29.
 Computer Aided Investigative Environment http://www.caine-live.net/
 X-Ways Forensics, Available http://www.xways. net/, accessed August 2007.
 SANS Investigative Forensics Toolkit – SIFT Available:http://digitalforensics.sans.org/community /downloads
 Guidance Software. EnCase Legal Journal, Second Edition. March 2002. Available at: http://www.encase.com/support/downloads/LegalJou rnal.pdf
 Registry Recon http://arsenalrecon.com/apps/recon/
 TSK tools, Brian Carrier site, http://www.sleuthkit.org/sleuthkit/, 14/1/2009
 Libforensics http://code.google.com/p/libforensics/
 Volatility http://code.google.com/p/volatility/
 TheCoroner’sToolkit http://www.porcupine.org/forensics/tct.html
 Oxygen Forensic Suite http://www.oxygenforensic. com/en/features
 BulkExtractor http://digitalcorpora.org/downloads/bulk_extractor/  Xplico Available http://www.xplico.org/about
 MandiantRedLine Available https://www.mandiant.com/resources/dow nload/redline
 Computer Online Forensic Evidence Extractor Available: https://cofee.nw3c.org/
 P2 eXplorer https://www.paraben.com/p2- explorer.html
 PlainSight http://www.plainsight.info/index.html
 XRY http://www.msab.com/xry/what-is-xry
 HELIX3 https://efenseinc.sharefile.com/d/sda4309a624d48b8 8
 Cellebrite UFED http://www.cellebrite.com/Mobile- Forensics
 Free computer forensic tools Available http://resources.infosecinstitute.com/computerforensics- tools/
 Roman, Rodrigo Fernando Morocho, et al. "Digital Forensics Tools." International Journal of Applied Engineering Research 11.19 (2016): 9754-9762
Digital Forensics and its frame work, Cyber forensics tools.