SlideShare a Scribd company logo
1 of 5
Download to read offline
International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 10, Issue 11 (November 2014), PP.77-81
77
Analysis of Existing Models & Proposed Cyber Crime
Investigation Model
Dr. Ajeet Singh Poonia
Associate Professor, Department of Computer Science and Engineering
Govt. College of Engineering and Technology, Bikaner, India.
Abstract:- In current scenario cyber crime is increasing at exponential rate, as the technology is growing at
enormous speed hence the cyber crime investigation is becoming a tedious job without a proper framework.
There is a wide range of different types of cyber crime today which are prevailing in the society. Solution of
each case requires is a complicated task. Till date the investigation models proposed by various researchers have
some or the other shortfalls. They are somehow limited to certain types of cyber crime only and these models
largely restrict themselves to the investigation of the crime scene and the evidence, and so are less extensive in
their scope. These models provide overview of the general technical investigation activities. In this paper, a
model has been proposed, named “cyber crime investigation model” which will capture a full scope of an
investigation process and provide framed activity for every step. The proposed model focuses more into
efficiency, accuracy and how to preserve the fragile evidence, its transport and storage.
Keywords:- Cyber Crime Investigating Model, Realization phase, Authorization phase, Audit planning,
Auditing, Managing evidence, Hypothesis, Challenge analysis, Dissemination.
I. INTRODUCTION
There are several useful discussions found throughout the studies and reviews that examine and
compare many models and frameworks of cyber- crime investigation.The models provide a useful overview
of the general technical investigation activities.
Most of the existing model design does not show the information process flow focusing on issue
such as chain of custody. The largest gap in most of the presented model is, no attention has been paid
on the delicate evidence and also on data acquisition process. For that there should be a proper methodology
and procedure to be followed by forensic investigator who focuses more into efficiency, accuracy and how
to preserve the fragile evidence. Main concern for the investigator s h o u l d b e for the fragile evidence
because this is not like normal evidence during an investigation.
Also the existing model doesn’t fully describe the investigation process in a way which will assist the
development of new investigative techniques or any innovative methodology which can be implemented for any
type of case.
II. CRITICAL ANALYSIS OF EXISTING MODELS
Many of the existing cyber crime investigation models are abstract in the context of law
enforcement investigation and are largely restricted to the examination of a definitive technical crime scene
and the forensic recovery of digital evidence from established sources. While many of the existing models can
be seen to build upon each other by extending earlier approaches with the aim of becoming more complete
and robust.
Many of the digital forensic investigation processes have been developed either by traditional forensic
scientists focusing on robust evidence handling or by technologists focusing on digital evidence capture,
making it difficult for law enforcement practitioners to understand and apply.
The major limitation of existing cyber crime investigation model is that it refers only to the forensic
part of an investigation and issues such as the exchange of information with other investigators are not
addressed.
The existing models do not cover all aspects of cyber crime investigation; they are not general enough
to describe fully the investigative process in a way which will assist the development of new investigative tools
and techniques.
Another drawback with the existing models is that they have given more stress on the collection and
examination of the evidence, which is basically middle stage of the model. However, the earlier and later stages
must be taken into account for a successful cyber crime investigation model, and in particular if all the relevant
information flows through an investigation are to be identified.
Transport and storage of digital evidence are still at a basic level. Dissemination is understood to be
Analysis of Existing Models & Proposed Cyber Crime Investigation Model
78
important but is still limited.
Result analysis of approx all the models along with the inventor and the year of invention have been
reviewed here as mentioned in table 1.1.
Model Name Inventers Years
Computer Forensic Process M.Pollitt1
1995
Generic Investigation Process Palmer2
2001
Abstract Model of the Digital Forensic
Procedures
Reith ,Carr, & Gunsh3
2002
An Integrated Digital Investigation Process Carrier & Spafford4
2003
End To End Digital Investigation Stephenson6
2003
Enhance Integrated Digital Investigation
Process
Baryamureeba & Tushabe7
2004
Extended Model of Cyber Crime Investigation Ciardhuain8
2004
Hierarchical ,Objective Based Framework Beebe & Clark9
2004
Event Based Digital Forensic Investigation
Framework
Carrier & Spafford4
2004
Investigation Framework Kohn , Eloff ,& Oliver10
2006
Computer Forensic Field Triage Process
Model
K.Roger,Goldman,Mislan,Wedg
e & Debtota11
2006
Investigation Process model Freiling & Schwittay12
2007
Table 1.1: Details of the models developed from 1995 to 2007
III. DRAWBACKS OF SOME OF THE MODEL SHOWN IN THE TABLE ARE DISCUSSED HERE:-
The collection of evidence typically occurs after it has been recognized, but in the model proposed by
the U.S. Department of Justice (DOJ), shows that it is collected before the digital data have been examined. In
this model, collection phase more accurately collects the physical evidence and the digital evidences are collected
when they are examined.
In the model proposed by Lee et al., the barrier of the model is analyzing part of digital forensic
process only, this have made a limitation in the digital forensic investigation, as not be focusing on the data
acquisition neither preparation nor presentation.
In case of Gary L Palmer, model the framework does not dictate what particular actions must be
pursued. Instead, it provides a list of candidate techniques, some of which are required. The specifics
of the framework must be largely redefined for each particular investigation.
The model proposed by Séamus Ó Ciardhuáin, covers the processes from collection of digital evidence
to presentation in court. However, the model does not cover the respective human resource with specific
technical and legal experience required for respective processes. Moreover, current models are deficient in
explaining about establishment of digital forensic setup at national level to cater for services of all end users.
Casey also places a major concern of the forensic process on the investigation itself.
Reith et al. themselves have noted the absence of any explicit mention of the chain of custody in their
model. This is a major flaw when one considers the different laws, practices, languages, and so on which must
be correctly dealt with in real investigations. It is important to identify and describe these information flows so
that they can be protected and supported technologically, for instance through the use of trusted public key
infrastructures and time stamping to identify investigators and authenticate evidence.
The Beebe and Clark model provides structure for activities through phase’s con- sisting of
multiple sub-phases rather than activity groupings. Sub-phases are objective based rather t h a n strictly
activity based . The objective based sub-phases each fall into a particular phase and consists of a
hierarchy of particular activities that are subordinate t o the particular objective.
The studies shows that how exponentially the cyber crime is growing as compare to the conventional crime and
how much the available security structure is self sufficient to defend or we can say fight against the cyber crime.
So to cope with the situation we have to come with a model i.e. a cyber crime investigation model which covers
the gap with the existing models in the system, as discussed above, so as to control or lower down the
exponentially growing cyber crime in the system.
Analysis of Existing Models & Proposed Cyber Crime Investigation Model
79
IV. DEVELOPMENT OF IMPROVED CYBER CRIME INVESTIGATION MODEL
By this time digital forensic investigation processes are developed by conventional forensic scientists
focusing on evidence handling and also developed technical persons focusing on digital evidence capture. This
tradition way makes it difficult for law enforcement practitioners to understand and apply. A new model is
required to be developed to accommodate all aspects of handling and capturing forensic and digital evidence
involved into the cyber crime. After studying and finding limitation in above mentioned cyber crime
investigation models a new improved model is required.
In this paper, a model has been proposed, named “cyber crime investigation model” which will
capture a full scope of an investigation process and provide framed activity for every step. The proposed model
attempts to improve upon existing models through the combination of common techniques while trying to
ensure method shortfalls are addressed. It is applicable to all current digital crimes, as well as any unrealized
crimes of the future.
The proposed model focuses more into efficiency, accuracy and how to preserve the fragile evidence,
its transport and storage. This model describes a framework of activities with flow of information in proper way
so that each step suggests a predefined task to complete. Main concern for the investigator is on the flow of
information of the model. Auditing phase provides various tools and activities for investigation. This model
allows technical requirements for each phase to be developed and for the interaction between physical and digital
investigations to be identified. T h e m o d e l c a n be used in a practical way to identify opportunities for the
development and operation of technology to support the work of investigators, and to provide a framework for
the capture and analysis of requirements for investigative tools and technologies as they emerge and become the
subject of investigations. The proposed model can also provide a unified structure for case studies/lessons
learned materials to be shared among investigators, and for the development of standards, conformance testing,
and investigative best practices.
V. PHASES OF CYBER CRIME INVESTIGATION MODEL
A new model for cyber crime investigation has been described here. The inclusion of information flow,
as well as the investigative activities, makes it more complete than other models. The proposed model have
various phases as: Realization phase, Authorization phase, Audit planning, Auditing, Managing evidence,
Hypothesis, Challenge analysis, Final report presentation, Updating polices, Report abstraction and
Dissemination.
Each phase has its own importance in the model and is placed in sequence. The sequence goes like this:
In realization phase the particular organization/system/individual realizes that some form of cyber crime has
occurred. Authorization phase is the mirror to the communication process between the investigating team and
the organization/person which is suffering or has suffered from the cyber crime. In audit planning all the
necessary preparations are done before reaching the location of crime, by any of the mode or medium. The basic
concept behind the auditing is to extract/discover the data and then match/recognize the piece of digital
evidence. In Managing evidences phase, the investigating team collects relevant evidences for providing the
crime’s effect and to reach the criminal/conclusion. This is the phase in which the investigating team tries to go
against their own built hypothesis and try to prove their own hypothesis wrong and irrelevant. The main motto is
to prove the validity of the hypothesis and defend it against criticism and challenge. In this phase, a final
report of the whole investigation process is generated and presented well in front of the relevant person or
organization and the opposition party. In updating policies phase, the security policies of the organization and
the standard policies are reconsidered and updated if required with respect to the organizational level and to the
standard levels if required. The final activity in the model is the dissemination of information from the
investigation.
As cyber crime is transnational in nature, so the proposed model is to be implied after the confirmation
of the site, where the actual cyber crime has taken place.
Analysis of Existing Models & Proposed Cyber Crime Investigation Model
80
Figure 1.1 Shows the overview of proposed Cyber Crime Investigation Model
VI. CONCLUSION
In this research, a ne w cyber crime investigation model has been introduced which is structured in
nature and has been customized for any type of digital crime .It is user friendly, which tries to capture the
f u l l s c o p e of a n i n v e s t i g a t i o n process .The proposed model focuses more into efficiency,
accuracy and how to preserve the fragile evidence, its transport and storage. Main concern for the investigator
is on the flow of information of the model and then the audit planning along with auditing of the cyber crime
investigation. This model allows technical requirements for each phase to be developed and for the interaction
between physical and digital investigations to be identified. I t can be used in a practical way to identify
opportunities for the development and operation of technology to support the work of investigators. It also
provides a framework for the capture and analysis of requirements for investigative tools, particularly for
advanced automated analytical tools. It can be used to help develop and apply methodologies to new
technologies as they emerge and become the subject of investigations.
REFERENCES
[1]. M.Pollitt, An ad-hoc review of digital forensics models, in Book Chapter from Cybercrime: An
Introduction to an Emerging Phenomenon, G.Higgins, Editor, McGraw Hill.
[2]. G.Palmer, A Road Map for Digital Forensic Research: Report from the First Digital Forensic
Workshop, in Online: http://www.dfrws.org/dfrws-rm-final.pdf, D.T.R. DTR-T001-01, Editor. 2001.
[3]. M.Reith, C.C., G.Gunsch, An Examination of Digital Forensics Models. International Journal of
Digital Evidence, 2002. 1(3): p. 1-12.
[4]. B.Carrier, E.H.S., Getting Physical with the Investigative Process. International Journal of Digital
Evidence, 2003. 2(2).
[5]. B.Carrier, E.H.S., Getting Physical with the Investigative Process. International Journal of Digital
Evidence, 2004. 2(2).
Analysis of Existing Models & Proposed Cyber Crime Investigation Model
81
[6]. Stephenson, P.R., Towards Improving Attribution Confidence in Cyber Attacks. Journal of Cyber
conflict studies, 2006. 1(1): p. 48-53
[7]. V.Baryamureeba, F.T., The Enhanced Digital Investigation Process Model. Digital Forensic Research
Workshop, 2004.
[8]. S.O.Ciardhuáin, An Extended Model of Cybercrime Investigation. International Journal of Digital
Evidence, 2004. 3(1).
[9]. N.L.Beebe, J.G.C., A hierarchical, object- based framework for the digital investigation process.
Digital Investigation Process Framework, 2004. 2: p. 147–167.
[10]. Michael Kohn, J.E., Ms Olivier, Framework for Digital Forensic Investigation: Information and
Computer Security Architectures Research Group (ICSA), University of Pretoria
[11]. M.K.Rogers, J.G., R.Mislan, T.Wedge, S.Debrota. Computer Forensic Field. Triage Process Model. in
International Conference on Digital Forensics, Security and Law. 2006.
[12]. Freiling, B.c. A Common Process Model for Incident Response and Computer Forensics. in
Proceedings of Conference on IT Incident Management and IT Forensics. 2007.

More Related Content

What's hot

The DETER Project: Advancing the Science of Cyber Security Experimentation an...
The DETER Project: Advancing the Science of Cyber Security Experimentation an...The DETER Project: Advancing the Science of Cyber Security Experimentation an...
The DETER Project: Advancing the Science of Cyber Security Experimentation an...DETER-Project
 
Framework architecture for improving
Framework architecture for improvingFramework architecture for improving
Framework architecture for improvingIJMIT JOURNAL
 
A Study on Genetic-Fuzzy Based Automatic Intrusion Detection on Network Datasets
A Study on Genetic-Fuzzy Based Automatic Intrusion Detection on Network DatasetsA Study on Genetic-Fuzzy Based Automatic Intrusion Detection on Network Datasets
A Study on Genetic-Fuzzy Based Automatic Intrusion Detection on Network DatasetsDrjabez
 
Testimony of Terry V. Benzel, University of Southern California Information S...
Testimony of Terry V. Benzel, University of Southern California Information S...Testimony of Terry V. Benzel, University of Southern California Information S...
Testimony of Terry V. Benzel, University of Southern California Information S...DETER-Project
 
Automatic Insider Threat Detection in E-mail System using N-gram Technique
Automatic Insider Threat Detection in E-mail System using N-gram TechniqueAutomatic Insider Threat Detection in E-mail System using N-gram Technique
Automatic Insider Threat Detection in E-mail System using N-gram TechniqueIRJET Journal
 
Novel framework for optimized digital forensic for mitigating complex image ...
Novel framework for optimized digital forensic  for mitigating complex image ...Novel framework for optimized digital forensic  for mitigating complex image ...
Novel framework for optimized digital forensic for mitigating complex image ...IJECEIAES
 
COMPARATIVE REVIEW OF MALWARE ANALYSIS METHODOLOGIES
COMPARATIVE REVIEW OF MALWARE ANALYSIS METHODOLOGIESCOMPARATIVE REVIEW OF MALWARE ANALYSIS METHODOLOGIES
COMPARATIVE REVIEW OF MALWARE ANALYSIS METHODOLOGIESIJNSA Journal
 

What's hot (7)

The DETER Project: Advancing the Science of Cyber Security Experimentation an...
The DETER Project: Advancing the Science of Cyber Security Experimentation an...The DETER Project: Advancing the Science of Cyber Security Experimentation an...
The DETER Project: Advancing the Science of Cyber Security Experimentation an...
 
Framework architecture for improving
Framework architecture for improvingFramework architecture for improving
Framework architecture for improving
 
A Study on Genetic-Fuzzy Based Automatic Intrusion Detection on Network Datasets
A Study on Genetic-Fuzzy Based Automatic Intrusion Detection on Network DatasetsA Study on Genetic-Fuzzy Based Automatic Intrusion Detection on Network Datasets
A Study on Genetic-Fuzzy Based Automatic Intrusion Detection on Network Datasets
 
Testimony of Terry V. Benzel, University of Southern California Information S...
Testimony of Terry V. Benzel, University of Southern California Information S...Testimony of Terry V. Benzel, University of Southern California Information S...
Testimony of Terry V. Benzel, University of Southern California Information S...
 
Automatic Insider Threat Detection in E-mail System using N-gram Technique
Automatic Insider Threat Detection in E-mail System using N-gram TechniqueAutomatic Insider Threat Detection in E-mail System using N-gram Technique
Automatic Insider Threat Detection in E-mail System using N-gram Technique
 
Novel framework for optimized digital forensic for mitigating complex image ...
Novel framework for optimized digital forensic  for mitigating complex image ...Novel framework for optimized digital forensic  for mitigating complex image ...
Novel framework for optimized digital forensic for mitigating complex image ...
 
COMPARATIVE REVIEW OF MALWARE ANALYSIS METHODOLOGIES
COMPARATIVE REVIEW OF MALWARE ANALYSIS METHODOLOGIESCOMPARATIVE REVIEW OF MALWARE ANALYSIS METHODOLOGIES
COMPARATIVE REVIEW OF MALWARE ANALYSIS METHODOLOGIES
 

Viewers also liked

A project report on DLW export procedure to non railway customer by Anand kum...
A project report on DLW export procedure to non railway customer by Anand kum...A project report on DLW export procedure to non railway customer by Anand kum...
A project report on DLW export procedure to non railway customer by Anand kum...Anand Kumar Tiwari
 
INDUSTRIAL TRAINING(PPT) DLW,Varanasi
INDUSTRIAL TRAINING(PPT) DLW,VaranasiINDUSTRIAL TRAINING(PPT) DLW,Varanasi
INDUSTRIAL TRAINING(PPT) DLW,Varanasiak3793
 
A project report on does maruti finance helps mul increase its sales
A project report on does maruti finance helps mul increase its salesA project report on does maruti finance helps mul increase its sales
A project report on does maruti finance helps mul increase its salesBabasab Patil
 
Cyber Crime Multi-State Information Sharing and Analysis Center
Cyber Crime Multi-State Information Sharing and Analysis CenterCyber Crime Multi-State Information Sharing and Analysis Center
Cyber Crime Multi-State Information Sharing and Analysis Center- Mark - Fullbright
 
Internet Crime Control Authority
Internet Crime Control AuthorityInternet Crime Control Authority
Internet Crime Control AuthorityDaily 10 Minutes
 

Viewers also liked (7)

A project report on DLW export procedure to non railway customer by Anand kum...
A project report on DLW export procedure to non railway customer by Anand kum...A project report on DLW export procedure to non railway customer by Anand kum...
A project report on DLW export procedure to non railway customer by Anand kum...
 
INDUSTRIAL TRAINING(PPT) DLW,Varanasi
INDUSTRIAL TRAINING(PPT) DLW,VaranasiINDUSTRIAL TRAINING(PPT) DLW,Varanasi
INDUSTRIAL TRAINING(PPT) DLW,Varanasi
 
A project report on does maruti finance helps mul increase its sales
A project report on does maruti finance helps mul increase its salesA project report on does maruti finance helps mul increase its sales
A project report on does maruti finance helps mul increase its sales
 
Cyber Crime Multi-State Information Sharing and Analysis Center
Cyber Crime Multi-State Information Sharing and Analysis CenterCyber Crime Multi-State Information Sharing and Analysis Center
Cyber Crime Multi-State Information Sharing and Analysis Center
 
New Jobs [Jan 2014]
New Jobs [Jan 2014]New Jobs [Jan 2014]
New Jobs [Jan 2014]
 
Internet Crime Control Authority
Internet Crime Control AuthorityInternet Crime Control Authority
Internet Crime Control Authority
 
Internet Crimes (5 Cases)
Internet Crimes (5 Cases)Internet Crimes (5 Cases)
Internet Crimes (5 Cases)
 

Similar to Analysis of Existing Models & Proposed Cyber Crime Investigation Model

Proposed Effective Solution for Cybercrime Investigation in Myanmar
Proposed Effective Solution for Cybercrime Investigation in MyanmarProposed Effective Solution for Cybercrime Investigation in Myanmar
Proposed Effective Solution for Cybercrime Investigation in Myanmartheijes
 
FORENSIC COMPUTING MODELS: TECHNICAL OVERVIEW
FORENSIC COMPUTING MODELS: TECHNICAL OVERVIEWFORENSIC COMPUTING MODELS: TECHNICAL OVERVIEW
FORENSIC COMPUTING MODELS: TECHNICAL OVERVIEWcscpconf
 
Digital forensics research: The next 10 years
Digital forensics research: The next 10 yearsDigital forensics research: The next 10 years
Digital forensics research: The next 10 yearsMehedi Hasan
 
Predict Conference: Data Analytics for Digital Forensics and Cybersecurity
Predict Conference: Data Analytics for Digital Forensics and CybersecurityPredict Conference: Data Analytics for Digital Forensics and Cybersecurity
Predict Conference: Data Analytics for Digital Forensics and CybersecurityMark Scanlon
 
Systematic Digital Forensic Investigation Model
Systematic Digital Forensic Investigation ModelSystematic Digital Forensic Investigation Model
Systematic Digital Forensic Investigation ModelCSCJournals
 
Evaluation of Integrated Digital Forensics Investigation Framework for the In...
Evaluation of Integrated Digital Forensics Investigation Framework for the In...Evaluation of Integrated Digital Forensics Investigation Framework for the In...
Evaluation of Integrated Digital Forensics Investigation Framework for the In...IJECEIAES
 
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONBEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONAIRCC Publishing Corporation
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationAIRCC Publishing Corporation
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationAIRCC Publishing Corporation
 
Anti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital ForensicAnti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital ForensicIRJET Journal
 
A Proactive Approach in Network Forensic Investigation Process
A Proactive Approach in Network Forensic Investigation ProcessA Proactive Approach in Network Forensic Investigation Process
A Proactive Approach in Network Forensic Investigation ProcessEditor IJCATR
 
DEFENSE ACQUISITION UN.docx
DEFENSE ACQUISITION UN.docxDEFENSE ACQUISITION UN.docx
DEFENSE ACQUISITION UN.docxvickeryr87
 
Security and Privacy Measurements in Social Networks: Experiences and Lessons...
Security and Privacy Measurements in Social Networks: Experiences and Lessons...Security and Privacy Measurements in Social Networks: Experiences and Lessons...
Security and Privacy Measurements in Social Networks: Experiences and Lessons...FACE
 
Running Head W6 Case StudiesW6 Case Studies- Business Intellige.docx
Running Head W6 Case StudiesW6 Case Studies- Business Intellige.docxRunning Head W6 Case StudiesW6 Case Studies- Business Intellige.docx
Running Head W6 Case StudiesW6 Case Studies- Business Intellige.docxjeffsrosalyn
 
A Formal Two Stage Triage Process Model (FTSTPM) for Digital Forensic Practice
A Formal Two Stage Triage Process Model (FTSTPM) for Digital Forensic PracticeA Formal Two Stage Triage Process Model (FTSTPM) for Digital Forensic Practice
A Formal Two Stage Triage Process Model (FTSTPM) for Digital Forensic PracticeCSCJournals
 
Proposed high level solutions to counter online examination fraud using digit...
Proposed high level solutions to counter online examination fraud using digit...Proposed high level solutions to counter online examination fraud using digit...
Proposed high level solutions to counter online examination fraud using digit...Ivans Kigwana
 
Applying Data Mining Principles in the Extraction of Digital Evidence
Applying Data Mining Principles in the Extraction of Digital EvidenceApplying Data Mining Principles in the Extraction of Digital Evidence
Applying Data Mining Principles in the Extraction of Digital EvidenceDr. Richard Otieno
 
Running head CRIME ANALYSIS TECHNOLOGY .docx
Running head CRIME ANALYSIS TECHNOLOGY                           .docxRunning head CRIME ANALYSIS TECHNOLOGY                           .docx
Running head CRIME ANALYSIS TECHNOLOGY .docxhealdkathaleen
 
Running head CRIME ANALYSIS TECHNOLOGY .docx
Running head CRIME ANALYSIS TECHNOLOGY                           .docxRunning head CRIME ANALYSIS TECHNOLOGY                           .docx
Running head CRIME ANALYSIS TECHNOLOGY .docxtodd271
 
National framework for digital forensics bangladesh context
National framework for digital forensics   bangladesh context National framework for digital forensics   bangladesh context
National framework for digital forensics bangladesh context Bank Alfalah Limited
 

Similar to Analysis of Existing Models & Proposed Cyber Crime Investigation Model (20)

Proposed Effective Solution for Cybercrime Investigation in Myanmar
Proposed Effective Solution for Cybercrime Investigation in MyanmarProposed Effective Solution for Cybercrime Investigation in Myanmar
Proposed Effective Solution for Cybercrime Investigation in Myanmar
 
FORENSIC COMPUTING MODELS: TECHNICAL OVERVIEW
FORENSIC COMPUTING MODELS: TECHNICAL OVERVIEWFORENSIC COMPUTING MODELS: TECHNICAL OVERVIEW
FORENSIC COMPUTING MODELS: TECHNICAL OVERVIEW
 
Digital forensics research: The next 10 years
Digital forensics research: The next 10 yearsDigital forensics research: The next 10 years
Digital forensics research: The next 10 years
 
Predict Conference: Data Analytics for Digital Forensics and Cybersecurity
Predict Conference: Data Analytics for Digital Forensics and CybersecurityPredict Conference: Data Analytics for Digital Forensics and Cybersecurity
Predict Conference: Data Analytics for Digital Forensics and Cybersecurity
 
Systematic Digital Forensic Investigation Model
Systematic Digital Forensic Investigation ModelSystematic Digital Forensic Investigation Model
Systematic Digital Forensic Investigation Model
 
Evaluation of Integrated Digital Forensics Investigation Framework for the In...
Evaluation of Integrated Digital Forensics Investigation Framework for the In...Evaluation of Integrated Digital Forensics Investigation Framework for the In...
Evaluation of Integrated Digital Forensics Investigation Framework for the In...
 
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONBEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
 
Anti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital ForensicAnti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital Forensic
 
A Proactive Approach in Network Forensic Investigation Process
A Proactive Approach in Network Forensic Investigation ProcessA Proactive Approach in Network Forensic Investigation Process
A Proactive Approach in Network Forensic Investigation Process
 
DEFENSE ACQUISITION UN.docx
DEFENSE ACQUISITION UN.docxDEFENSE ACQUISITION UN.docx
DEFENSE ACQUISITION UN.docx
 
Security and Privacy Measurements in Social Networks: Experiences and Lessons...
Security and Privacy Measurements in Social Networks: Experiences and Lessons...Security and Privacy Measurements in Social Networks: Experiences and Lessons...
Security and Privacy Measurements in Social Networks: Experiences and Lessons...
 
Running Head W6 Case StudiesW6 Case Studies- Business Intellige.docx
Running Head W6 Case StudiesW6 Case Studies- Business Intellige.docxRunning Head W6 Case StudiesW6 Case Studies- Business Intellige.docx
Running Head W6 Case StudiesW6 Case Studies- Business Intellige.docx
 
A Formal Two Stage Triage Process Model (FTSTPM) for Digital Forensic Practice
A Formal Two Stage Triage Process Model (FTSTPM) for Digital Forensic PracticeA Formal Two Stage Triage Process Model (FTSTPM) for Digital Forensic Practice
A Formal Two Stage Triage Process Model (FTSTPM) for Digital Forensic Practice
 
Proposed high level solutions to counter online examination fraud using digit...
Proposed high level solutions to counter online examination fraud using digit...Proposed high level solutions to counter online examination fraud using digit...
Proposed high level solutions to counter online examination fraud using digit...
 
Applying Data Mining Principles in the Extraction of Digital Evidence
Applying Data Mining Principles in the Extraction of Digital EvidenceApplying Data Mining Principles in the Extraction of Digital Evidence
Applying Data Mining Principles in the Extraction of Digital Evidence
 
Running head CRIME ANALYSIS TECHNOLOGY .docx
Running head CRIME ANALYSIS TECHNOLOGY                           .docxRunning head CRIME ANALYSIS TECHNOLOGY                           .docx
Running head CRIME ANALYSIS TECHNOLOGY .docx
 
Running head CRIME ANALYSIS TECHNOLOGY .docx
Running head CRIME ANALYSIS TECHNOLOGY                           .docxRunning head CRIME ANALYSIS TECHNOLOGY                           .docx
Running head CRIME ANALYSIS TECHNOLOGY .docx
 
National framework for digital forensics bangladesh context
National framework for digital forensics   bangladesh context National framework for digital forensics   bangladesh context
National framework for digital forensics bangladesh context
 

More from IJERD Editor

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEIJERD Editor
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignIJERD Editor
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationIJERD Editor
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string valueIJERD Editor
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingIJERD Editor
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart GridIJERD Editor
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
 

More from IJERD Editor (20)

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding Design
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and Verification
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive Manufacturing
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF Dxing
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart Grid
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powder
 

Recently uploaded

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Recently uploaded (20)

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Analysis of Existing Models & Proposed Cyber Crime Investigation Model

  • 1. International Journal of Engineering Research and Development e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com Volume 10, Issue 11 (November 2014), PP.77-81 77 Analysis of Existing Models & Proposed Cyber Crime Investigation Model Dr. Ajeet Singh Poonia Associate Professor, Department of Computer Science and Engineering Govt. College of Engineering and Technology, Bikaner, India. Abstract:- In current scenario cyber crime is increasing at exponential rate, as the technology is growing at enormous speed hence the cyber crime investigation is becoming a tedious job without a proper framework. There is a wide range of different types of cyber crime today which are prevailing in the society. Solution of each case requires is a complicated task. Till date the investigation models proposed by various researchers have some or the other shortfalls. They are somehow limited to certain types of cyber crime only and these models largely restrict themselves to the investigation of the crime scene and the evidence, and so are less extensive in their scope. These models provide overview of the general technical investigation activities. In this paper, a model has been proposed, named “cyber crime investigation model” which will capture a full scope of an investigation process and provide framed activity for every step. The proposed model focuses more into efficiency, accuracy and how to preserve the fragile evidence, its transport and storage. Keywords:- Cyber Crime Investigating Model, Realization phase, Authorization phase, Audit planning, Auditing, Managing evidence, Hypothesis, Challenge analysis, Dissemination. I. INTRODUCTION There are several useful discussions found throughout the studies and reviews that examine and compare many models and frameworks of cyber- crime investigation.The models provide a useful overview of the general technical investigation activities. Most of the existing model design does not show the information process flow focusing on issue such as chain of custody. The largest gap in most of the presented model is, no attention has been paid on the delicate evidence and also on data acquisition process. For that there should be a proper methodology and procedure to be followed by forensic investigator who focuses more into efficiency, accuracy and how to preserve the fragile evidence. Main concern for the investigator s h o u l d b e for the fragile evidence because this is not like normal evidence during an investigation. Also the existing model doesn’t fully describe the investigation process in a way which will assist the development of new investigative techniques or any innovative methodology which can be implemented for any type of case. II. CRITICAL ANALYSIS OF EXISTING MODELS Many of the existing cyber crime investigation models are abstract in the context of law enforcement investigation and are largely restricted to the examination of a definitive technical crime scene and the forensic recovery of digital evidence from established sources. While many of the existing models can be seen to build upon each other by extending earlier approaches with the aim of becoming more complete and robust. Many of the digital forensic investigation processes have been developed either by traditional forensic scientists focusing on robust evidence handling or by technologists focusing on digital evidence capture, making it difficult for law enforcement practitioners to understand and apply. The major limitation of existing cyber crime investigation model is that it refers only to the forensic part of an investigation and issues such as the exchange of information with other investigators are not addressed. The existing models do not cover all aspects of cyber crime investigation; they are not general enough to describe fully the investigative process in a way which will assist the development of new investigative tools and techniques. Another drawback with the existing models is that they have given more stress on the collection and examination of the evidence, which is basically middle stage of the model. However, the earlier and later stages must be taken into account for a successful cyber crime investigation model, and in particular if all the relevant information flows through an investigation are to be identified. Transport and storage of digital evidence are still at a basic level. Dissemination is understood to be
  • 2. Analysis of Existing Models & Proposed Cyber Crime Investigation Model 78 important but is still limited. Result analysis of approx all the models along with the inventor and the year of invention have been reviewed here as mentioned in table 1.1. Model Name Inventers Years Computer Forensic Process M.Pollitt1 1995 Generic Investigation Process Palmer2 2001 Abstract Model of the Digital Forensic Procedures Reith ,Carr, & Gunsh3 2002 An Integrated Digital Investigation Process Carrier & Spafford4 2003 End To End Digital Investigation Stephenson6 2003 Enhance Integrated Digital Investigation Process Baryamureeba & Tushabe7 2004 Extended Model of Cyber Crime Investigation Ciardhuain8 2004 Hierarchical ,Objective Based Framework Beebe & Clark9 2004 Event Based Digital Forensic Investigation Framework Carrier & Spafford4 2004 Investigation Framework Kohn , Eloff ,& Oliver10 2006 Computer Forensic Field Triage Process Model K.Roger,Goldman,Mislan,Wedg e & Debtota11 2006 Investigation Process model Freiling & Schwittay12 2007 Table 1.1: Details of the models developed from 1995 to 2007 III. DRAWBACKS OF SOME OF THE MODEL SHOWN IN THE TABLE ARE DISCUSSED HERE:- The collection of evidence typically occurs after it has been recognized, but in the model proposed by the U.S. Department of Justice (DOJ), shows that it is collected before the digital data have been examined. In this model, collection phase more accurately collects the physical evidence and the digital evidences are collected when they are examined. In the model proposed by Lee et al., the barrier of the model is analyzing part of digital forensic process only, this have made a limitation in the digital forensic investigation, as not be focusing on the data acquisition neither preparation nor presentation. In case of Gary L Palmer, model the framework does not dictate what particular actions must be pursued. Instead, it provides a list of candidate techniques, some of which are required. The specifics of the framework must be largely redefined for each particular investigation. The model proposed by Séamus Ó Ciardhuáin, covers the processes from collection of digital evidence to presentation in court. However, the model does not cover the respective human resource with specific technical and legal experience required for respective processes. Moreover, current models are deficient in explaining about establishment of digital forensic setup at national level to cater for services of all end users. Casey also places a major concern of the forensic process on the investigation itself. Reith et al. themselves have noted the absence of any explicit mention of the chain of custody in their model. This is a major flaw when one considers the different laws, practices, languages, and so on which must be correctly dealt with in real investigations. It is important to identify and describe these information flows so that they can be protected and supported technologically, for instance through the use of trusted public key infrastructures and time stamping to identify investigators and authenticate evidence. The Beebe and Clark model provides structure for activities through phase’s con- sisting of multiple sub-phases rather than activity groupings. Sub-phases are objective based rather t h a n strictly activity based . The objective based sub-phases each fall into a particular phase and consists of a hierarchy of particular activities that are subordinate t o the particular objective. The studies shows that how exponentially the cyber crime is growing as compare to the conventional crime and how much the available security structure is self sufficient to defend or we can say fight against the cyber crime. So to cope with the situation we have to come with a model i.e. a cyber crime investigation model which covers the gap with the existing models in the system, as discussed above, so as to control or lower down the exponentially growing cyber crime in the system.
  • 3. Analysis of Existing Models & Proposed Cyber Crime Investigation Model 79 IV. DEVELOPMENT OF IMPROVED CYBER CRIME INVESTIGATION MODEL By this time digital forensic investigation processes are developed by conventional forensic scientists focusing on evidence handling and also developed technical persons focusing on digital evidence capture. This tradition way makes it difficult for law enforcement practitioners to understand and apply. A new model is required to be developed to accommodate all aspects of handling and capturing forensic and digital evidence involved into the cyber crime. After studying and finding limitation in above mentioned cyber crime investigation models a new improved model is required. In this paper, a model has been proposed, named “cyber crime investigation model” which will capture a full scope of an investigation process and provide framed activity for every step. The proposed model attempts to improve upon existing models through the combination of common techniques while trying to ensure method shortfalls are addressed. It is applicable to all current digital crimes, as well as any unrealized crimes of the future. The proposed model focuses more into efficiency, accuracy and how to preserve the fragile evidence, its transport and storage. This model describes a framework of activities with flow of information in proper way so that each step suggests a predefined task to complete. Main concern for the investigator is on the flow of information of the model. Auditing phase provides various tools and activities for investigation. This model allows technical requirements for each phase to be developed and for the interaction between physical and digital investigations to be identified. T h e m o d e l c a n be used in a practical way to identify opportunities for the development and operation of technology to support the work of investigators, and to provide a framework for the capture and analysis of requirements for investigative tools and technologies as they emerge and become the subject of investigations. The proposed model can also provide a unified structure for case studies/lessons learned materials to be shared among investigators, and for the development of standards, conformance testing, and investigative best practices. V. PHASES OF CYBER CRIME INVESTIGATION MODEL A new model for cyber crime investigation has been described here. The inclusion of information flow, as well as the investigative activities, makes it more complete than other models. The proposed model have various phases as: Realization phase, Authorization phase, Audit planning, Auditing, Managing evidence, Hypothesis, Challenge analysis, Final report presentation, Updating polices, Report abstraction and Dissemination. Each phase has its own importance in the model and is placed in sequence. The sequence goes like this: In realization phase the particular organization/system/individual realizes that some form of cyber crime has occurred. Authorization phase is the mirror to the communication process between the investigating team and the organization/person which is suffering or has suffered from the cyber crime. In audit planning all the necessary preparations are done before reaching the location of crime, by any of the mode or medium. The basic concept behind the auditing is to extract/discover the data and then match/recognize the piece of digital evidence. In Managing evidences phase, the investigating team collects relevant evidences for providing the crime’s effect and to reach the criminal/conclusion. This is the phase in which the investigating team tries to go against their own built hypothesis and try to prove their own hypothesis wrong and irrelevant. The main motto is to prove the validity of the hypothesis and defend it against criticism and challenge. In this phase, a final report of the whole investigation process is generated and presented well in front of the relevant person or organization and the opposition party. In updating policies phase, the security policies of the organization and the standard policies are reconsidered and updated if required with respect to the organizational level and to the standard levels if required. The final activity in the model is the dissemination of information from the investigation. As cyber crime is transnational in nature, so the proposed model is to be implied after the confirmation of the site, where the actual cyber crime has taken place.
  • 4. Analysis of Existing Models & Proposed Cyber Crime Investigation Model 80 Figure 1.1 Shows the overview of proposed Cyber Crime Investigation Model VI. CONCLUSION In this research, a ne w cyber crime investigation model has been introduced which is structured in nature and has been customized for any type of digital crime .It is user friendly, which tries to capture the f u l l s c o p e of a n i n v e s t i g a t i o n process .The proposed model focuses more into efficiency, accuracy and how to preserve the fragile evidence, its transport and storage. Main concern for the investigator is on the flow of information of the model and then the audit planning along with auditing of the cyber crime investigation. This model allows technical requirements for each phase to be developed and for the interaction between physical and digital investigations to be identified. I t can be used in a practical way to identify opportunities for the development and operation of technology to support the work of investigators. It also provides a framework for the capture and analysis of requirements for investigative tools, particularly for advanced automated analytical tools. It can be used to help develop and apply methodologies to new technologies as they emerge and become the subject of investigations. REFERENCES [1]. M.Pollitt, An ad-hoc review of digital forensics models, in Book Chapter from Cybercrime: An Introduction to an Emerging Phenomenon, G.Higgins, Editor, McGraw Hill. [2]. G.Palmer, A Road Map for Digital Forensic Research: Report from the First Digital Forensic Workshop, in Online: http://www.dfrws.org/dfrws-rm-final.pdf, D.T.R. DTR-T001-01, Editor. 2001. [3]. M.Reith, C.C., G.Gunsch, An Examination of Digital Forensics Models. International Journal of Digital Evidence, 2002. 1(3): p. 1-12. [4]. B.Carrier, E.H.S., Getting Physical with the Investigative Process. International Journal of Digital Evidence, 2003. 2(2). [5]. B.Carrier, E.H.S., Getting Physical with the Investigative Process. International Journal of Digital Evidence, 2004. 2(2).
  • 5. Analysis of Existing Models & Proposed Cyber Crime Investigation Model 81 [6]. Stephenson, P.R., Towards Improving Attribution Confidence in Cyber Attacks. Journal of Cyber conflict studies, 2006. 1(1): p. 48-53 [7]. V.Baryamureeba, F.T., The Enhanced Digital Investigation Process Model. Digital Forensic Research Workshop, 2004. [8]. S.O.Ciardhuáin, An Extended Model of Cybercrime Investigation. International Journal of Digital Evidence, 2004. 3(1). [9]. N.L.Beebe, J.G.C., A hierarchical, object- based framework for the digital investigation process. Digital Investigation Process Framework, 2004. 2: p. 147–167. [10]. Michael Kohn, J.E., Ms Olivier, Framework for Digital Forensic Investigation: Information and Computer Security Architectures Research Group (ICSA), University of Pretoria [11]. M.K.Rogers, J.G., R.Mislan, T.Wedge, S.Debrota. Computer Forensic Field. Triage Process Model. in International Conference on Digital Forensics, Security and Law. 2006. [12]. Freiling, B.c. A Common Process Model for Incident Response and Computer Forensics. in Proceedings of Conference on IT Incident Management and IT Forensics. 2007.