Skip to main content

Forensic Investigation Processes for Cyber Crime and Cyber Space

  • Conference paper
  • First Online:
Proceedings of International Conference on Internet Computing and Information Communications

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 216))

Abstract

Computers are an integral part of our life. A significant percentage of today’s transactions and processes take place using the computer and Internet. People have readily adopted Internet technology and innocently trust it while using it with the ignorance of the limitations and threats to the system security. With the advance of technology, equally or more advanced form of crimes started emerging. Different types of cyber attacks from various sources may adversely affect computers, software, a network, an agency’s operations, an industry, or the Internet itself. Thus companies and their products aim to take assistance of legal and computer forensics. Digital forensics deals with computer-based evidence to determine who, what, where, when, and how crimes are being committed. Computer and network forensics has evolved to assure proper presentation of cyber crime evidentiary data into court. Forensic tools and techniques are an integral part of criminal investigations used to investigate suspect systems, gathering and preserving evidence, reconstructing or simulating the event, and assessing the current state of an event. In this paper we deliberate on two aspects; first, various types of crimes in the cyber space and various sources of cyber attacks, and second, investigation processes for various cyber attacks with the help of digital forensic tools like WinHex [1].

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. WinHex (http://www.WinHex.com)

  2. Carrier, B.D., Spafford, E.H.: Categories of digital investigation analysis techniques based on the computer history model. J. Digit Invest. Sci. 3S, S121–S130 (2006)

    Google Scholar 

  3. Di Pietro, R., Verde, N.V.: Digital forensic techniques and tools chapter 17 of security handbook of electronic security and digital forensics

    Google Scholar 

  4. Choi, J., Savoldi, A., Gubian, P., Lee, S., Lee, S.: Live forensic analysis of a compromised Linux system using LECT (Linux Evidence Collection Tool) 2008 IEEE

    Google Scholar 

  5. Arasteh, A.R., Debbabi, M., Sakha, A., Saleh, M.: Analyzing multiple logs for forensic evidence. Digit. Invest. J. Sci. 4S, S82–S91 (2007)

    Google Scholar 

  6. Casey, E.: Network traffic as a source of evidence: tool strengths, weaknesses, and future needs. Digit. Invest. J. 9–148 (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. K. Sindhu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer India

About this paper

Cite this paper

Sindhu, K.K., Kombade, R., Gadge, R., Meshram, B.B. (2014). Forensic Investigation Processes for Cyber Crime and Cyber Space. In: Sathiakumar, S., Awasthi, L., Masillamani, M., Sridhar, S. (eds) Proceedings of International Conference on Internet Computing and Information Communications. Advances in Intelligent Systems and Computing, vol 216. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1299-7_19

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-1299-7_19

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-1298-0

  • Online ISBN: 978-81-322-1299-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics