Counterfeiting and defending the digital forensic process

Alvaro Botas, Ricardo J. Rodríguez, Teemu Väisänen, Patrycjusz Zdzichowski

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

Abstract

During the last years, criminals have become aware of how digital evidences that lead them to courts and jail are collected and analyzed. Hence, they have started to develop antiforensic techniques to evade, hamper, or nullify their evidences. Nowadays, these techniques are broadly used by criminals, causing the forensic analysis to be in a state of decay. To defeat against these techniques, forensic analyst need to first identify them, and then to mitigate somehow their effects. In this paper, we review the anti-forensic techniques and propose a new taxonomy that relates them to the initial phase of a forensic process mainly affected by each technique. Furthermore, we introduce mitigation techniques for these anti-forensic techniques, considering the chance to overcome the anti-forensic techniques and the difficulty to apply them.

Original languageEnglish
Title of host publicationProceedings - 15th IEEE International Conference on Computer and Information Technology, CIT 2015, 14th IEEE International Conference on Ubiquitous Computing and Communications, IUCC 2015, 13th IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC 2015 and 13th IEEE International Conference on Pervasive Intelligence and Computing, PICom 2015
PublisherIEEE Institute of Electrical and Electronic Engineers
Pages1966-1971
ISBN (Electronic)978-1-5090-0154-5
ISBN (Print)978-1-5090-0153-8
DOIs
Publication statusPublished - 22 Dec 2015
MoE publication typeA4 Article in a conference publication
Event15th IEEE International Conference on Computer and Information Technology, CIT 2015, 14th IEEE International Conference on Ubiquitous Computing and Communications, IUCC 2015, 13th IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC 2015 and 13th IEEE International Conference on Pervasive Intelligence and Computing, PICom 2015 - Liverpool, United Kingdom
Duration: 26 Oct 201528 Oct 2015

Conference

Conference15th IEEE International Conference on Computer and Information Technology, CIT 2015, 14th IEEE International Conference on Ubiquitous Computing and Communications, IUCC 2015, 13th IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC 2015 and 13th IEEE International Conference on Pervasive Intelligence and Computing, PICom 2015
CountryUnited Kingdom
CityLiverpool
Period26/10/1528/10/15

Keywords

  • Anti-forensics
  • Categorization
  • Forensics

Fingerprint Dive into the research topics of 'Counterfeiting and defending the digital forensic process'. Together they form a unique fingerprint.

  • Cite this

    Botas, A., Rodríguez, R. J., Väisänen, T., & Zdzichowski, P. (2015). Counterfeiting and defending the digital forensic process. In Proceedings - 15th IEEE International Conference on Computer and Information Technology, CIT 2015, 14th IEEE International Conference on Ubiquitous Computing and Communications, IUCC 2015, 13th IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC 2015 and 13th IEEE International Conference on Pervasive Intelligence and Computing, PICom 2015 (pp. 1966-1971). [7363337] IEEE Institute of Electrical and Electronic Engineers. https://doi.org/10.1109/CIT/IUCC/DASC/PICOM.2015.291