Digital Forensics vs. Anti-Digital Forensics: Techniques, Limitations and Recommendations

03/31/2021
by   Jean-Paul A. Yaacoub, et al.
0

The number of cyber attacks has increased tremendously in the last few years. This resulted into both human and financial losses at the individual and organization levels. Recently, cyber-criminals are leveraging new skills and capabilities by employing anti-forensics activities, techniques and tools to cover their tracks and evade any possible detection. Consequently, cyber-attacks are becoming more efficient and more sophisticated. Therefore, traditional cryptographic and non-cryptographic solutions and access control systems are no longer enough to prevent such cyber attacks, especially in terms of acquiring evidence for attack investigation. Hence, the need for well-defined, sophisticated, and advanced forensics investigation tools are highly required to track down cyber criminals and to reduce the number of cyber crimes. This paper reviews the different forensics and anti-forensics methods, tools, techniques, types, and challenges, while also discussing the rise of the anti-anti-forensics as a new forensics protection mechanism against anti-forensics activities. This would help forensics investigators to better understand the different anti-forensics tools, methods and techniques that cyber criminals employ while launching their attacks. Moreover, the limitations of the current forensics techniques are discussed, especially in terms of issues and challenges. Finally, this paper presents a holistic view from a literature point of view over the forensics domain and also helps other fellow colleagues in their quest to further understand the digital forensics domain.

READ FULL TEXT
research
01/05/2021

Analyzing Cyber-Attack Intention for Digital Forensics Using Case-Based Reasoning

Cyber-attacks are increasing and varying dramatically day by day. It has...
research
04/01/2020

Phishing Attacks: Detection And Prevention

This paper aims to provide an understanding of what a phishing attack is...
research
04/30/2019

An Argumentation-Based Approach to Assist in the Investigation and Attribution of Cyber-Attacks

We expect an increase in frequency and severity of cyber-attacks that co...
research
06/21/2023

Cryptographic ransomware encryption detection: Survey

The ransomware threat has loomed over our digital life since 1989. Crimi...
research
05/24/2021

An Automated and Comprehensive Framework for IoT Botnet Detection and Analysis (IoT-BDA)

The proliferation of insecure Internet-connected devices gave rise to th...
research
08/18/2018

Supremacy by Accelerated Warfare through the Comprehension Barrier and Beyond: Reaching the Zero Domain and Cyberspace Singularity

It is questionable and even unlikely that cyber supremacy could be reach...
research
07/08/2020

Agile Approach for IT Forensics Management

The forensic investigation of cyber attacks and IT incidents is becoming...

Please sign up or login with your details

Forgot password? Click here to reset