Abstract
The procedure of the identification and analysis of electronic data is the digital forensics framework. The purpose of the procedure is to retain evidence in its primordial form by gathering, identifying and validating digital information in order to recreate events of the past. For the use of data in a court of law, the context is most appropriate. The evidence aspect of digital forensics requires strict requirements to be followed in court for cross-examination. One major pitfall in the digital forensic analysis is the possible admissibility of collected evidence in the court of law. Digital forensic analysis must comply with the quality of evidence and its admissibility to trial successfully. In this work, we proposed a new network forensic investigation process model. We precisely establish a methodology of investigation for the computer network.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
R.Y. Patil, S.R. Devane, Network forensic investigation protocol to identify true origin of cyber crime. J. King Saud Univ. Comput. Inf. Sci. (2019)
O. Singh, Network forensics blog (2012)
S. Raghavan, Digital forensic research: current state of the art. CSI Trans. ICT 1(1), 91–114 (2013). F. Author, Article title. Journal 2(5), 99–110 (2016)
R.Y. Patil, S.R. Devane, Unmasking of source identity, a step beyond in cyber forensic, in Proceedings of the 10th International Conference on Security of Information and Networks, Oct 2017, pp. 157–164
P.R. Yogesh, S.R. Devane, Primordial fingerprinting techniques from the perspective of digital forensic requirements, in 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT), July 2018 (IEEE, 2018), pp. 1–6
W.J. Kruse, G. Heiser, Computer Forensics: Incident Response Essentials (Addison-Wesley, 2002). ISBN 0-201-70719-5
G. Palmer, A road map for digital forensic research. Technical report DTR-T001-01, DFRW. Report from the First Digital Forensic Research Workshop, Utica, NY (2001)
S. Saleem, O. Popov, I. Bagilli, Extended abstract digital forensics model with preservation and protection as umbrella principles. Procedia Comput. Sci. 35, 812–821 (2014)
B. Carrier, E.H. Spafford, Getting physical with the investigative process. Int. J. Digit. Evid. 2(2) (Fall) (2003)
V. Baryamureeba, F. Tushabe, Enhanced digital investigation process model, in Digital Forensic Research Workshop, Baltimore, MD, USA (2004)
S.O. Ciardhuáin, An extended model of cybercrime investigations. Int. J. Digit. Evid. 3(1) (Summer) (2004)
A. Valjarevic, H. Venter, A harmonized process model for digital forensic investigation readiness, in IFIP International Conference on Digital Forensics, Jan 2013 (Springer, Berlin, Heidelberg, 2013), pp. 67–82
M.D. Kohn, M.M. Eloff, J.H. Eloff, Integrated digital forensic process model. Comput. Secur. 38, 103–115 (2013)
X. Feng, E.S. Dawam, S. Amin, A new digital forensics model of smart city automated vehicles, in 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), June 2017 (IEEE, 2017), pp. 274–279
N. Al Mutawa, J. Bryce, V.N.L. Franqueira, A. Marrington, J.C. Read, Behavioural digital forensics model: embedding behavioural evidence analysis into the investigation of digital crimes. Digit. Investig. (2019)
A.N. Moussa, N. Ithnin, N. Almolhis, A. Zainal, A consumer-oriented cloud forensic process model, in 2019 IEEE 10th Control and System Graduate Research Colloquium (ICSGRC), Aug 2019 (IEEE, 2019), pp. 219–224
P.R. Yogesh, Backtracking tool root-tracker to identify true source of cyber crime. Procedia Comput. Sci. 171, 1120–1128 (2020)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Patil, R.Y., Ranjanikar, M.A. (2022). A New Network Forensic Investigation Process Model. In: Shakya, S., Bestak, R., Palanisamy, R., Kamel, K.A. (eds) Mobile Computing and Sustainable Informatics. Lecture Notes on Data Engineering and Communications Technologies, vol 68. Springer, Singapore. https://doi.org/10.1007/978-981-16-1866-6_9
Download citation
DOI: https://doi.org/10.1007/978-981-16-1866-6_9
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-1865-9
Online ISBN: 978-981-16-1866-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)