![]() We evaluated our approach against the standard Analysis, Design, Development, Implementation, and Evaluation (ADDIE) model for the digital investigation to achieve the credible digital evidence presented in this paper. We then employed digital forensic techniques to analyse the popular users and generate evidence within them with high accuracy. As part of our study, we crawled the μTorrent P2P client over ten days in different instances while logging all participating peers. This paper considers a new technique for detecting active peers that participate in a peer-to-peer (P2P) network. ![]() This brings a great stride to validate a non-specific framework to be used in most digital investigation procedures. It guides the investigators with the required steps and procedures. State-of-the-art digital forensic models assume that it is safe to move from one investigation stage to the next. With these challenges, it is necessary to have a standard digital forensic framework as the foundation of any digital investigation. Rapid technological advancement can substantially impact the processes of digital forensic investigation and present a myriad of challenges to the investigator. It is expected that it will lead to the identification of gaps in the investigation of characteristic problems in digital forensic analysis, and the definition of an updated theoretical framework linked to the forensic analysis of emails with the application of ontologies. In addition, a systematic method is defined to select the research works that are considered of interest for this review. The following objectives of the review are proposed: identify and study the most up-to-date research contributions on Ontologies and Digital Forensics establish the gaps in current research reltated with the application of Ontologies to Digital Forensics and correlate these works from attributes of proximity (or distance) with the application of ontologies to the forensic analysis of emails. Particularly, it is important to define the state of the art related to the application of ontologies, especially in the forensics of emails. This article presents a descriptive review of the research published in the last five years to identify areas of unavailability in the study of Digital Forensics problems. This paper suggests a methodology for investigation and analysis of the protocol to assist in the control of data flow across security perimeters. The ability to replicate data without oversight introduces risk of abuse by users as well as difficulties for forensic investigators. While lacking the economies brought about by scale, complete control over data access has made this a popular solution. ![]() This utility replicates files stored in shares to remote peers with access controlled by keys and permissions. One option is BitTorrent Sync, a cloudless synchronisation utility provides data availability and redundancy. These events have caused users to assess their own security practices and the level of trust placed in third party storage services. Recent concerns over unauthorised access to third party systems and large scale exposure of private data have made an alternative solution desirable. Cloud architecture allows the provisioning of storage space with “always-on” access. This model of use is facilitated by cloud based file synchronisation services such as Dropbox, OneDrive, Google Drive and Apple iCloud. A popular solution is to have a central repository which each device accesses after centrally managed authentication. Users are increasingly dependant on devices that consume and produce data in ever increasing volumes. High availability is no longer just a business continuity concern.
0 Comments
Leave a Reply. |