Systematic Review: Anti-Forensic Computer Techniques

Author:

González Arias Rafael1,Bermejo Higuera Javier1ORCID,Rainer Granados J. Javier1,Bermejo Higuera Juan Ramón1ORCID,Sicilia Montalvo Juan Antonio1ORCID

Affiliation:

1. Escuela Superior de Ingeniería y Tecnología, Universidad Internacional de La Rioja, Avenida de La Paz, 137, 26006 La Rioja, Spain

Abstract

The main purpose of anti-forensic computer techniques, in the broadest sense, is to hinder the investigation of a computer attack by eliminating traces and preventing the collection of data contained in a computer system. Nowadays, cyber-attacks are becoming more and more frequent and sophisticated, so it is necessary to understand the techniques used by hackers to be able to carry out a correct forensic analysis leading to the identification of the perpetrators. Despite its importance, this is a poorly represented area in the scientific literature. The disparity of the existing works, together with the small number of articles, makes it challenging to find one’s way around the vast world of computer forensics. This article presents a comprehensive review of the existing scientific literature on anti-forensic techniques, mainly DFIR (digital forensics incident response), organizing the studies according to their subject matter and orientation. It also presents key ideas that contribute to the understanding of this field of forensic science and details the shortcomings identified after reviewing the state of the art.

Publisher

MDPI AG

Reference226 articles.

1. Peron, C.S.J., and Legary, M. (2005, January 28–30). Digital anti-forensics: Emerging trends in data transformation techniques. Proceedings of the E-Crime and Computer Evidence Conference, Montecarlo, Monaco.

2. Computer anti-forensics methods and their impact on computer forensic investigation;Pajek;Commun. Comput. Inf. Sci.,2009

3. Freiling. A universal taxonomy and survey of forensic memory acquisition techniques;Latzo;Digit. Investig.,2019

4. Hiding Process Memory Via Anti-Forensic Techniques;Palutke;Forensic Sci. Int. Digit. Investig.,2020

5. Kitchenham, B., and Charters, S. (2007). Guidelines for Performing Systematic Literature Reviews in Software Engineering Version 2.3, University of Durham. Technical Report.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3