Computer Science and Information Technologies
Vol 5, No 1: March 2024

Collecting and analyzing network-based evidence

K. Singh, Ashwini (Unknown)
Kamble, Dhwaniket (Unknown)
Bains, Abhishek (Unknown)
Tiwari, Naman (Unknown)
R. Deshmukh, Tejas (Unknown)
Pandey, Sanidhya (Unknown)
Kumar, Hemant (Unknown)
M. Bhalerao, Diksha (Unknown)



Article Info

Publish Date
01 Mar 2024

Abstract

Since nearly the beginning of the Internet, malware has been a significant deterrent to productivity for end users, both personal and business related. Due to the pervasiveness of digital technologies in all aspects of human lives, it is increasingly unlikely that a digital device is involved as goal, medium or simply ‘witness’ of a criminal event. Forensic investigations include collection, recovery, analysis, and presentation of information stored on network devices and related to network crimes. These activities often involve wide range of analysis tools and application of different methods. This work presents methods that helps digital investigators to correlate and present information acquired from forensic data, with the aim to get a more valuable reconstructions of events or action to reach case conclusions. Main aim of network forensic is to gather evidence. Additionally, the evidence obtained during the investigation must be produced through a rigorous investigation procedure in a legal context. 

Copyrights © 2024






Journal Info

Abbrev

csit

Publisher

Subject

Computer Science & IT Engineering

Description

Computer Science and Information Technologies ISSN 2722-323X, e-ISSN 2722-3221 is an open access, peer-reviewed international journal that publish original research article, review papers, short communications that will have an immediate impact on the ongoing research in all areas of Computer ...