Abstract
The enhancement of technology has led to a considerable amount of growth in number of cases pertaining to cyber-crime and has raised an enormous challenge to tackle it effectively. There are various cyber forensic techniques and tools used to recover data from the devices to tackle cyber-crime. Present research paper focuses on performing memory forensic and analyzes the memory which contains many pieces of information relevant to forensic investigation, such as username, password, cryptographic keys, deleted files, deleted logs, running processes; that can be helpful to investigate the cyber-crime pining down the accused. The three main steps followed in memory forensic are acquiring, analyzing and recovering. Recovery of the evidences of crime from the volatile memory can be possible with the knowledge of different tools and techniques used in memory forensic. However, it is always tough to analyze volatile memory as it stays for a very short period. Not all tools can be used for memory forensic in every situation and therefore, it is important to have the knowledge of tools before applying to solve a particular cyber-crime. It is yet to establish on using a single tool for complete investigation, however, most of the tools used are successful in providing reasonable evidences. The present research paper provides an insight on analyzing the memory that stores relevant data, collection of evidences from the device(s), extraction of essential data using different memory forensic tools, tools useful for various purposes and the best suited tool for a particular situation.
Publisher
Granthaalayah Publications and Printers
Reference13 articles.
1. Reith M, Carr C, Gunsch G. (2002). An examination of Digital Forensics Models. International Journal of Digital Evidence.1, 3, p1–12.
2. Pooja Salave, Atisha Wakdikar (2017). Memory Forensics: Tools Comparison. International Journal of Science and Research (IJSR). 6, 6, p5-8.
3. Timothy Vidas (2007). The Acquisition and Analysis of Random Access Memory. Journal of Digital Forensic Practice. 1, 4, p315-p323.
4. Richard Nolan, Colin O’Sullivan, Jake Branson, Cal Waits (2005). First Responders Guide to Computer Forensics, Carnegie Mellon University.
5. Dr. Hardik Gohel, Dr. Himanshu Upadhyay (2017). Design of Advanced Cyber Threat Analysis Framework for Memory Forensics. International Journal of Innovative Research in Computer and Communication Engineering. 5, 2, p132-137.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献