2015
DOI: 10.14257/ijhit.2015.8.2.35
|View full text |Cite
|
Sign up to set email alerts
|

Review of Live Forensic Analysis Techniques

Abstract: The widespread availability and extensive use of Internet across the world has caught attention of the criminals and digital crimes are occurring at an epidemic scale nowadays. The field of digital forensics is constantly evolving by employing new tools and technique to counter novel approaches employed by the criminals as well as to investigate the nature of the criminal activity and bring the culprits to justice. Traditionally, the static analysis was used to investigate the digital incidents. But due to adv… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0
4

Year Published

2017
2017
2022
2022

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 21 publications
(14 citation statements)
references
References 34 publications
0
10
0
4
Order By: Relevance
“…The conclusion is that this phase could not respond adequately to the complexity of the current malware. The main goal of these tasks is the collection, analysis, and preservation of data from an IT machine as part of forensic processes, to make it admissible in a court of law [31,32].…”
Section: Related Workmentioning
confidence: 99%
“…The conclusion is that this phase could not respond adequately to the complexity of the current malware. The main goal of these tasks is the collection, analysis, and preservation of data from an IT machine as part of forensic processes, to make it admissible in a court of law [31,32].…”
Section: Related Workmentioning
confidence: 99%
“…They concluded that the use of the Windows IM can leave behind incriminating evidential material useful or critical to an investigation on the hard drive, memory and network captures. Other studies of both static media and memory forensics on Skype is reported in [16,17,18]. The general suggestion is that using data from memory dump, virtual machine created from static data can be adjusted to provide better picture of the live system at the time when the dump is made.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Lastly, they identify patterns and rules for VIPs customer from the transactional data using association rules and sequential patterns and then design CRM strategies for the online shopping mall. Reference [16][17][18][19][20][21][22][23][24][25] outlined various software engineering and machine learning techniques in different domains.…”
Section: Copyright ⓒ 2018 Sersc Australiamentioning
confidence: 99%