The Case for Validating ADDIE Model as a Digital Forensic Model for Peer-to-Peer Network Investigation

Author:

Musa Ahmad SandaORCID,Awan Irfan-Ullah,Zahrah Fatima

Abstract

AbstractRapid technological advancement can substantially impact the processes of digital forensic investigation and present a myriad of challenges to the investigator. With these challenges, it is necessary to have a standard digital forensic framework as the foundation of any digital investigation. State-of-the-art digital forensic models assume that it is safe to move from one investigation stage to the next. It guides the investigators with the required steps and procedures. This brings a great stride to validate a non-specific framework to be used in most digital investigation procedures. This paper considers a new technique for detecting active peers that participate in a peer-to-peer (P2P) network. As part of our study, we crawled the µTorrent P2P client over ten days in different instances while logging all participating peers. We then employed digital forensic techniques to analyse the popular users and generate evidence within them with high accuracy. We evaluated our approach against the standard Analysis, Design, Development, Implementation, and Evaluation (ADDIE) model for the digital investigation to achieve the credible digital evidence presented in this paper. Finally, we presented a validation case for the ADDIE model using the United States Daubert Test and the United Kingdom’s Forensic Science Regulator Guidance – 218 (FSR-G-218) and Forensic Science Regulator Guidance – 201 (FSR-G-201) to formulate it as a standard digital forensic model.

Funder

Petroleum Technology Development Fund

Publisher

Springer Science and Business Media LLC

Subject

Computer Networks and Communications,Information Systems,Theoretical Computer Science,Software

Reference82 articles.

1. Agarwal, A., Gupta, M., Gupta, S., & Gupta, S. C. (2011). Systematic digital forensic investigation model. International Journal of Computer Science and Security (IJCSS), 5(1), 118–131. https://www.researchgate.net/publication/228410430_Systematic_Digital_Forensic_Investigation_Model.

2. Alhazmi, A., Macia-Fernandez, G., Camacho, J., & Salah, S. (2017a). Torrent Forensics: Are your Files Being Shared in the BitTorrent Network? CYBER 2017: The Second International Conference on Cyber-Technologies and Cyber-Systems Torrent, December. https://www.researchgate.net/profile/Saeed-Salah/publication/322131860_Torrent_Forensics_Are_your_Files_Being_Shared_in_the_BitTorrent_Network/links/5a469a420f7e9ba868aa5068/Torrent-Forensics-Are-your-Files-Being-Shared-in-the-BitTorrent-Network.pdf

3. Alhazmi, A., Macia-Fernandez, G., Camacho, J., & Salah, S. (2017b). Torrent Forensics: Are your Files Being Shared in the BitTorrent Network? CYBER 2017: The Second International Conference on Cyber-Technologies and Cyber-Systems Torrent, December.

4. Ali, A., Abd Razak, S., Othman, S. H., Mohammed, A., & Saeed, F. (2017). A metamodel for mobile forensics investigation domain. PLOS ONE, 12(4), e0176223. https://doi.org/10.1371/journal.pone.0176223.

5. Allen, M. (2017). Designing Online Asynchronous Information Literacy Instruction Using the ADDIE Model. In Distributed Learning (pp. 69–91). Elsevier. https://doi.org/10.1016/B978-0-08-100598-9.00004-0

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3