2022
DOI: 10.1109/access.2022.3142508
|View full text |Cite
|
Sign up to set email alerts
|

A Comprehensive Survey on Computer Forensics: State-of-the-Art, Tools, Techniques, Challenges, and Future Directions

Abstract: With the alarmingly increasing rate of cybercrimes worldwide, there is a dire need to combat cybercrimes timely and effectively. Cyberattacks on computing machines leave certain artifacts on target device storage that can reveal the identity and behavior of cyber-criminals if processed and analyzed intelligently. Forensic agencies and law enforcement departments use several digital forensic toolkits, both commercial and open-source, to examine digital evidence. The proposed research survey focuses on identifyi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
27
0
2

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 68 publications
(29 citation statements)
references
References 132 publications
0
27
0
2
Order By: Relevance
“…The report relies on solid documentation, photos, notes, and tool-generated content. The examiner should then check the report and edit his con guration if necessary [52] 3.3.3 Results disseminationIt describes the procedure the examiner uses to communicate to policymakers the ndings from the analysis phase. The major goal of this method is to provide action reports for each detected artifact and its analysis.…”
Section: Results Analysismentioning
confidence: 99%
“…The report relies on solid documentation, photos, notes, and tool-generated content. The examiner should then check the report and edit his con guration if necessary [52] 3.3.3 Results disseminationIt describes the procedure the examiner uses to communicate to policymakers the ndings from the analysis phase. The major goal of this method is to provide action reports for each detected artifact and its analysis.…”
Section: Results Analysismentioning
confidence: 99%
“…Cyberattacks on electronic media leave certain artefacts in the target device's storage that can detect a cybercriminal and its behaviour if handled and analysed correctly. Law enforcement agencies of the world use several digital forensic tools, both commercial and open source, to achieve digital evidence (Javed et al, 2022).…”
Section: Discussionmentioning
confidence: 99%
“…Image transformation with ML is used for malware identification by the author where the convolution neural network (CNN) is utilized [21]. Similarly, the work in the direction of tools usage and framework representation for the malware analysis has been carried out by the researchers recently [22][23][24][25].…”
Section: Malware Identification Relatedmentioning
confidence: 99%