Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

This is an Open Access publication published under CSC-OpenAccess Policy.
Systematic Digital Forensic Investigation Model
Ankit Agarwal, Saurabh Gupta, Subhash Chand, Megha Gupta
Pages - 118 - 131     |    Revised - 31-03-2011     |    Published - 04-04-2011
Volume - 5   Issue - 1    |    Publication Date - March / April 2011  Table of Contents
Forensic Investigation, Digital Crime, Search & Seizure
Law practitioners are in a uninterrupted battle with criminals in the application of digital/computer technologies, and require the development of a proper methodology to systematically search digital devices for significant evidence. Computer fraud and digital crimes are growing day by day and unfortunately less than two percent of the reported cases result in confidence. This paper explores the development of the digital forensics process model, compares digital forensic methodologies, and finally proposes a systematic model of the digital forensic procedure. This model attempts to address some of the shortcomings of previous methodologies, and provides the following advantages: a consistent, standardized and systematic framework for digital forensic investigation process; a framework which work systematically in team according the captured evidence; a mechanism for applying the framework to according the country digital forensic investigation technologies; a generalized methodology that judicial members can use to relate technology to non-technical observers. This paper present a brief overview of previous forensic models and propose a new model inspired from the DRFWS Digital Investigation Model, and finally compares it with other previous model to show relevant of this model. The proposed model in this paper explores the different processes involved in the investigation of cyber crime and cyber fraud in the form of an eleven-stage model. The Systematic digital forensic investigation model (SDFIM) has been developed with the aim of helping forensic practitioners and organizations for setting up appropriate policies and procedures in a systematic manner.
CITED BY (49)  
1 Montasari, R., Peltola, P., & Evans, D. (2015). Integrated Computer Forensics Investigation Process Model (ICFIPM) for Computer Crime Investigations. In Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security (pp. 83-95). Springer International Publishing.
2 History Xin Ling, & Zheng Shuli . ( 2015 ) . Research and development of network forensics of network security technology and applications, ( 2 ) , 110-111.
3 Ab Rahman, N. H., & Choo, K. K. R. (2015). A survey of information security incident handling in the cloud. Computers & Security, 49, 45-69.
4 Wen Min . ( 2015 ) . Design and implementation of information exchange security suite system. Network Security Technology and Application, ( 2 ) , 114-116.
5 Amann, P., & James, J. I. (2015). Designing robustness and resilience in digital investigation laboratories. Digital Investigation, 12, S111-S120.
6 Prayudi, Y., & Ashari, A. A Study on Secure Communication for Digital Forensics Environment.
7 Agarwal, R., & Kothari, S. (2015). Review of Digital Forensic Investigation Frameworks. In Information Science and Applications (pp. 561-571). Springer Berlin Heidelberg.
8 Jafari, F., & Satti, R. S. (2015). Comparative Analysis of Digital Forensic Models. Journal of Advances in Computer Networks, 3(1).
9 Satti, R. S., & Jafari, F. (2015). Domain Specific Cyber Forensic Investigation Process Model. Journal of Advances in Computer Networks, 3(1).
10 Jiang, J. G., Yang, B., Lin, S., Zhang, M. X., & Liu, K. Y. (2015, April). A Practical Approach for Digital Forensic Triage. In Applied Mechanics and Materials (Vol. 742, pp. 437-444).
11 Prayudi, Y., & Sn, A. (2015). Digital Chain of Custody: State of the Art. International Journal of Computer Applications, 114(5), 1-9.
12 Satti, R. S., & Jafari, F. (2015). Reviewing Existing Forensic Models to Propose a Cyber Forensic Investigation Process Model for Higher Educational Institutes.
13 Saleem, S. (2015). Protecting the Integrity of Digital Evidence and Basic Human Rights During the Process of Digital Forensics.
14 Mushtaque, K., Ahsan, K., & Umer, A. (2015). DIGITAL FORENSIC INVESTIGATION MODELS: AN EVOLUTION STUDY. JISTEM-Journal of Information Systems and Technology Management, 12(2), 233-243.
15 Kurniati, F. T., Santoso, A. J., & Suyoto, S. (2015).printer forensik untuk identifikasi dokumen cetak. semnasteknomedia online, 3(1), 5-10.
16 Mushtaque, K., Ahsan, K., & Umer, A. (2015).Digital Forensic investigation models:an evolution study. JISTEM-Journal of Information Systems and Technology Management, 12(2), 233-243.
17 KHAWASE, M. D. S.,deshmukh, m., kuche, s., & mahalle, a. international journal of pure and applied research in engineering and technology.
18 Wu Xindong, Li Yadong, & Hu Donghui. (2014). Evidence of the social network. Journal of Software, 25 (12).
19 Rahman, A. F. A., Mohamad, M. Z., Ahmad, R., & Malaysia, C. (2014). Preventive and Detective Mechanism for Forensic Readiness Secure Network Architecture for WBAN.
20 Prayudi, Y., Ashari, A., & Priyambodo, T. K. (2014). Digital Evidence Cabinets: A Proposed Frameworks for Handling Digital Chain of Custody. Int. J. Comput. Appl, 109(9), 30-36.
21 Saleem, S., Popov, O., & Bagilli, I. (2014). Extended abstract digital forensics model with preservation and protection as umbrella principles. Procedia Computer Science, 35, 812-821.
22 Rahman, A. F. A., Ahmad, R., & Mohamad, M. Z. (2014). Developing Forensic Readiness Secure Network Architecture for Wireless Body Area Network (WBAN). International Journal of Security and Its Applications, 8(5), 403-420.
23 Bera, A., Bhattacharjee, D., & Nasipuri, M. (2014). Hand Biometrics in Digital Forensics. In Computational Intelligence in Digital Forensics: Forensic Investigation and Applications (pp. 145-163). Springer International Publishing.
24 Malik, N. M. N. A., Yahya, S., & Abdullah, M. T. (2014). Critical Phases in Network Forensics-A Review. In The International Conference on Digital Security and Forensics (DigitalSec2014) (pp. 68-75). The Society of Digital Information and Wireless Communication.
25 Tonellotto, M. (2014). Evidenza informatica, computer forensics e best practices. Rivista di Criminologia, Vittimologia e Sicurezza, 8(2), 68-103.
26 Akosu, N., & Selamat, A. (2014). Incorporating Language Identification in Digital Forensics Investigation Framework. In Computational Intelligence in Digital Forensics: Forensic Investigation and Applications (pp. 63-78). Springer International Publishing.
27 Solinas, F. (2014). Technical and legal perspectives on forensics scenario.
28 Dlamini, M., Venter, H., Eloff, J., & Eloff, M. (2014, March). Requirements for Preparing the Cloud to Become Ready for Digital Forensic Investigation. In 13th European Conference on Cyber Warfare and Security ECCWS-2014 The University of Piraeus Piraeus, Greece (p. 242).
29 Rahim, N., Wahab, W. A., Idris, Y. I., & Kiah, L. M. Digital Forensics: An Overview of the Current Trends.
30 Hewling, M. O. (2013). Digital forensics: an integrated approach for the investigation of cyber/computer related crimes.
31 Bulbul, H. I., Yavuzcan, H. G., & Ozel, M. (2013). Digital forensics: An Analytical Crime Scene Procedure Model (ACSPM). Forensic science international, 233(1), 244-256.
32 Vlachopoulos, K., Magkos, E., & Chrissikopoulos, V. (2013). A model for hybrid evidence investigation. Emerging Digital Forensics Applications for Crime Detection, Prevention, and Security, 150.
33 Fenu, G., & Solinas, F. (2013). Computer forensics between the italian legislation and pragmatic questions. International Journal of Cyber-Security and Digital Forensics (IJCSDF), 2(1), 9-24.
34 Neil, A. M., Elmogy, M., & RIAD, A. (2013). A Proposed Framework for Crime Investigation Based On Windows Registry Analysis. Journal of Engineering and Applied Science, Faculty of Engineering, Cairo University, 60(1).
35 Fenu, G., & Solinas, F. (2013). computer forensics investigation an approach to evidence in cyperspace. In The Second International Conference on Cyber Security, Cyber Peacefare and Digital Forensic (CyberSec2013) (pp. 77-88). The Society of Digital Information and Wireless Communication.
36 Saleem, S., Popov, O., & Appiah-Kubi, O. K. (2013). Evaluating and comparing tools for mobile device forensics using quantitative analysis. In Digital Forensics and Cyber Crime (pp. 264-282). Springer Berlin Heidelberg.
37 Kerrigan, M. (2013). A capability maturity model for digital investigations. Digital Investigation, 10(1), 19-33.
38 Lee, K., & Boddington, M. R. (2012). A Workflow to Support Forensic Database Analysis.
39 Kumar, K., Sofat, S., Aggarwal, N., & Jain, S. K. (2012). Identification of User Ownership in Digital Forensic using Data Mining Technique. International Journal of Computer Applications, 50(4), 1-5.
40 Susaimanickam, R. (2012). A workflow to support forensic database analysis (Doctoral dissertation, Murdoch University).
41 Jawale, N. (2012). Locating and extracting digital evidence from hosted virtual desktop infrastructures: cloud context (Doctoral dissertation, Auckland University of Technology).
42 Knight, G. (2012). The forensic curator: Digital forensics as a solution to addressing the curatorial challenges posed by personal digital archives. International Journal of Digital Curation, 7(2), 40-63.
43 Adams, R. (2012). The Advanced Data Acquisition Model (ADAM): A process model for digital forensic practice (Doctoral dissertation, Murdoch University).
44 Al-Fedaghi, S., & Al-Babtain, B. (2012). Modeling the forensics process. Int. J. Security Appl, 6(4).
45 Sivaprasad, A., & Jangale, S. (2012, March). A complete study on tools & techniques for digital forensic analysis. In Computing, Electronics and Electrical Technologies (ICCEET), 2012 International Conference on (pp. 881-886). IEEE.
46 Roger, A. E., & Achille, M. M. Article: Multi-perspective Cybercrime Investigation Process Modeling}. International Journal of Applied, 2, 14-20.
47 Hanson, S. Computer Forensics: Investigations of the Future.
48 Yesilyurt, h. adli bilisim sorusturma metotlarinin standartlastirilmasi ve etkinlik-verimlilik perspektifinde degerlendirilmesi.
49 I. O. Ademu, Dr. C. O. Imafidon and Dr D. S. Preston, “A New Approach of Digital Forensic Model for Digital Forensic Investigation”, International Journal of Advanced Computer Science and Applications (IJACSA), 2(12), pp. 175-178, 2011.
1 Google Scholar
2 Academic Journals Database
3 CiteSeerX
4 refSeek
5 Libsearch
6 Bielefeld Academic Search Engine (BASE)
7 Scribd
8 SlideShare
9 PdfSR
1 Michael Noblett, Mark.M.Pollitt and Lawrence Presley. (2000) Recovering and Examining Computer Forensic Evidence, Forensic Science Communications, Volume 2, Number 4.
2 Gary L Palmer.(2001). A Road Map for Digital Forensic Research. Technical Report DTRT0010- 01, DFRWS. Report for the First Digital Forensic Research Workshop (DFRWS).
3 Kruse II, Warren and Jay, G. Heiser (2002) Computer Forensics: Incident Response Essentials. Addison-Wesley.
4 National Institute of Justice. (July 2001) Electronic Crime Scene Investigation. A Guide for First Responders. Available from: http://www.ncjrs.org/pdffiles1/nij/187736.pdf.
5 Mark Reith, Clint Carr and Gregg Gunsch.(2002)An Examination of Digital Forensic Models International Journal of Digital Evidence, Fall 2002,Volume 1, Issue 3.
6 Digital Forensic Research Workshop (DFRWS) Research Road Map, Utica, NY. (2001) http://www.dfrws.org/archive.html
7 Brian Carrier and Eugene H Spafford,(2003) Getting Physical with the Investigative Process International Journal of Digital Evidence.Fall 2003,Volume 2, Issue 2.
8 M. M. Pollitt. An ad hoc review of digital forensic models. In Systematic Approaches to Digital Forensic Engineering, 2007, pages 43{54. University of Central Florida, USA, IEEE, April 10- 12, 2007 2007.
9 Lindsey, T. Challenges in Digital Forensics. 2006 Available from: http://www.dfrws.org/2006/proceedings/Lindsey-pres.pdf.
10 Toward Models for Forensic Analysis, Sean Peisert, Matt Bishop, Sidney Karin, Keith Marzullo.Mohay, G. Technical Challenges and Directions for Digital Forensics. in 1st International Workshop on Systematic Approaches to Digital Forensic Engineering,. 2005.
11 Casey, E., State of the field: growth, growth, growth. Digital Investigation, 2004.
12 Casey, E., Digital arms race, The need for speed. Digital Investigation, 2005.
13 ACPO. Good Practise Guide for Computer based Electronic Evidence. 2006 Available from: http://www.acpo.police.uk/asp/policies/Data/gpg_computer_based_evidence_v3.pdf.
Mr. Ankit Agarwal
Northern India Engineering College - India
Associate Professor Saurabh Gupta
Northern India Engineering College - India
Professor Subhash Chand
Northern India Engineering College - India
Miss Megha Gupta
Northern India Engineering College - India