Cyber Forensic Science (CFS) is a scientific approach to investigate and to excavate or to bring out clues for proving facts in a court of law or civil hearing to illustrate a cyber-crime under cyber law. There are many tools which supports forensic investigations but in current scenario as internet is becoming essential part of life, new crime scenes are immerging to bypass the existing forensic evidence investigation processes or tools. Hackers or individuals who commit cyber-crimes are being more tricky to escape from any investigation process by thwarting digital foot prints. Now we need dynamic and smart approaches to serve forensic investigations in cyber world. This paper catch an eye over those new approaches in field of Cyber Forensic with detailed explanation of it’s meaning and diversity. It examines new approaches of cyber forensic as well as it’s dimension to be applied. This paper tries to find grounds to innovate new cyber forensic algorithms to walk over new challenges of cyber-crimes.
Cite this article:
Deepak Kumar Deshmukh. Recent Cyber Forensic Modeling and Approaches: A Survey. Research J. Engineering and Tech. 2020;11(2):53-56. doi: 10.5958/2321-581X.2020.00010.0
1. Vaibhav Kaushal, Date of Publishing: Jun 16 2014, Date of Accessing - Jan 19,2020 url- https://www.digit.in/how-to/general/how-to-become-a-cyber-forensics-expert-22985.html.
2. Nickson M. Karie, Victor R. Kebande, H.S. Venter, “Diverging deep learning cognitive computing techniques into cyber Forensics”, Forensic Science International: Synergy (2019),4th April, 2019, pp. 61-67, ELSEVIER.
3. Robert Beverly, Simson Garfinkel, Greg Cardwell, “Forensic carving of network packets and associated data structures”, digital investigation, Vol.8, (2011), pp.S78 -S89, ELSEVIER.
4. Emmanuel Abba, A.M. Aibinu, J.K. Alhassan,” Development of multiple mobile networks call detailed records and its forensic analysis”, Digital Communications and Networks 5 (2019) ,pp.-256–265.
5. Rachana Y. Patil, Satish R. Devane, “Network Forensic Investigation Protocol to Identify True Origin of Cyber Crime”, Journal of King Saud University – Computer and Information Sciences, Accepted 30 November 2019, ELSEVIER.
6. Noora Al Mutawa, Ibrahim Baggili, Andrew Marrington, “Forensic analysis of social networking applications on mobile devices”, Digital Investigation 9 (2012), pp. S24–S33, Elsavier.
7. M.I. Cohen, “PyFlag – An advanced network forensic framework”, digital investigation 5 (2008), pp. S112– S120, ELSEVIER.
8. Daniel Walnycky, Ibrahim Baggili, Andrew Marrington, Jason Moore, Frank Breitinger, “Network and device forensic analysis of Android social-messaging applications”, Digital Investigation 14 (2015), pp. S77-S84, ELSEVIER.
9. Yang Xin, Lingshuang Kong, Zhi Liu, Yuling Chen, Yanmiao Li, Hongliang Zhu, Mingcheng Gao, Haixia Hou, and Chunhua Wang, “ Machine Learning and Deep Learning Methods for Cyber Security”, D.O.I- 10.1109/ACCESS.2018.2836950, May 15, 2018. IEEE Access.
10. Wenxiu Ding, Zheng Yan, Robert H. Deng, “A Survey on Future Internet Security Architectures”, D.O.I.- 10.1109/ACCESS.2016.2596705, July 29, 2016, IEEE Access.