Collecting and analyzing network-based evidence

Authors

  • Ashwini Kumar Singh Bharti Vidyapeeth Deemed University
  • Dhwaniket Kamble Faculty of Bharti Vidyapeeth Deemed University
  • Abhishek Bains Bharti Vidyapeeth Deemed University
  • Naman Tiwari Bharti Vidyapeeth Deemed University
  • Tejas Ravindra Deshmukh Bharti Vidyapeeth Deemed University
  • Sanidhya Pandey Bharti Vidyapeeth Deemed University
  • Hemant Kumar Bharti Vidyapeeth Deemed University
  • Diksha M. Bhalerao Bharati Vidyapeeth Deemed University

DOI:

https://doi.org/10.11591/csit.v5i1.pp1-6

Keywords:

Analysis, Evidence, Network forensics, Network traffic, Sniffing

Abstract

Since nearly the beginning of the Internet, malware has been a significant deterrent to productivity for end users, both personal and business related. Due to the pervasiveness of digital technologies in all aspects of human lives, it is increasingly unlikely that a digital device is involved as goal, medium or simply ‘witness’ of a criminal event. Forensic investigations include collection, recovery, analysis, and presentation of information stored on network devices and related to network crimes. These activities often involve wide range of analysis tools and application of different methods. This work presents methods that helps digital investigators to correlate and present information acquired from forensic data, with the aim to get a more valuable reconstructions of events or action to reach case conclusions. Main aim of network forensic is to gather evidence. Additionally, the evidence obtained during the investigation must be produced through a rigorous investigation procedure in a legal context.

Downloads

Published

2024-03-01

How to Cite

[1]
A. K. Singh, “Collecting and analyzing network-based evidence”, Comput Sci Inf Technol, vol. 5, no. 1, pp. 1–6, Mar. 2024.

Issue

Section

Articles

Similar Articles

1 2 3 4 5 6 > >> 

You may also start an advanced similarity search for this article.