Research Article

Combating Against Anti-Forensics Aligned with E-mail Forensics

by  Sridhar Neralla, D. Lalitha Bhaskari, P. S. Avadhani
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 79 - Issue 15
Published: October 2013
Authors: Sridhar Neralla, D. Lalitha Bhaskari, P. S. Avadhani
10.5120/13817-1849
PDF

Sridhar Neralla, D. Lalitha Bhaskari, P. S. Avadhani . Combating Against Anti-Forensics Aligned with E-mail Forensics. International Journal of Computer Applications. 79, 15 (October 2013), 16-19. DOI=10.5120/13817-1849

                        @article{ 10.5120/13817-1849,
                        author  = { Sridhar Neralla,D. Lalitha Bhaskari,P. S. Avadhani },
                        title   = { Combating Against Anti-Forensics Aligned with E-mail Forensics },
                        journal = { International Journal of Computer Applications },
                        year    = { 2013 },
                        volume  = { 79 },
                        number  = { 15 },
                        pages   = { 16-19 },
                        doi     = { 10.5120/13817-1849 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2013
                        %A Sridhar Neralla
                        %A D. Lalitha Bhaskari
                        %A P. S. Avadhani
                        %T Combating Against Anti-Forensics Aligned with E-mail Forensics%T 
                        %J International Journal of Computer Applications
                        %V 79
                        %N 15
                        %P 16-19
                        %R 10.5120/13817-1849
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Knowledge on cyber forensics is increasing on par with the cyber crime incidents. Cyber criminals' uses sophisticated technological knowledge and always they plan to escape from the clutches of law. This paper elaborates e-mail forensics and categories of anti-forensics that can be applicable to the e-mail forensics. This paper elucidates the process of identifying such anti-forensics applied in e-mail forensics. This paper proposes a methodology for combating against anti-forensics in this regard.

References
  • Rogers, M. (2006). CERIAS 2006-7th Annual Information Security Symposium, http://www. cerias. purdue. edu/news_and_events/events/symposium/2006/materials/pdfs/antiforensics. pdf, accessed on 12th July, 2013
  • Ryan Harris, Arriving at an anti-forensics consensus: Examining how to define and control the anti-forensics problem, Digital Investigation 3 (2006), Digital Forensics Research Workshop
  • Kessler, G. (2007). Anti-Forensics and the Digital Investigator, Proceedings of the 5th Australian Digital Forensics Conference, December 2007
  • Paula Thomas and A. Morris, "An investigation into the development of an anti-forensic tool to obscure USB flash drive device information on a windows XP platform," in Digital Forensics and Incident Analysis, 2008. WDFIA'08. Third International Annual Workshop on, 2008, pp. 60-66.
  • Glenn S. Dardick, Claire R. La Roche, Mary A. Flanigan, Blogs: Anti-Forensics And Counter Anti-Forensics, Proceedings of the 5th Australian Digital Forensics Conference, December 2007
  • Sridhar N, Lalitha Bhaskari D, Avadhani PS, Plethora of Cyber Forensics, International Journal of Advanced Computer Science and Applications, Vol. 2, No. 11, 2011
  • Allessandro Distefano, Gianluigi Me, Francesco Pace, Android anti-forensics through a local paradigm, Digital Investigation 7 (2010), Digital Forensic Research Workshop
  • Ioana Sporea, Benjamin Aziz & Zak McIntyre, On the Availability of Anti-Forensic Tools for smart phones, International Journal of Security (IJS), Volume (6) : Issue (4) : 2012, Page 58-64
  • Haodong Li, Weiqi Luo, Jiwu Huang, "Countering Anti-JPEG Compression Forensics", IEEE International Conference on Image Processing (ICIP), pp. 241-244, Sept. 30 - Oct. 3, 2012
  • David Cowen, Matthew Seyer, File system journaling forensics theory, procedures and analysis impacts, SANS Digital Forensics and Incident Response Summit 2013,
  • M. Tariq Banday, Techniques And Tools For Forensic Investigation Of E-Mail, International Journal of Network Security & Its Applications (IJNSA), Vol. 3, No. 6, November 2011
  • http://articles. timesofindia. indiatimes. com/2013-09-19/ hyderabad/42217231_1_tahseen-akhtar-waqas-yasin-bhatkal, accessed on 19th September, 2013.
  • Sridhar N, Lalitha Bhaskari D,Avadhani PS, Inverted Pyramid Approach for E-Mail forensics using heterogeneous forensics tools, CSI Communications, July2013
  • Metasploit LLC. (2013). Metasploit Anti-forensics, http://www. metasploit. com/, accessed on 12th July, 2013
  • Jie Zheng, E-mail Evidence Preservation: "How to Balance the Obligation and the High cost", Lex Electronica, Vol 14 n 2, fall 2009, page 10,
  • Chet Hosmer, Proving the Integrity of Digital Evidence with Time, International Journal of Digital Evidence Spring 2002 Volume 1, Issue 1
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Anti-Forensics Cyber Crimes Digital Evidence E-Mail Forensics Stylometry

Powered by PhDFocusTM