2013
DOI: 10.5120/13817-1849
|View full text |Cite
|
Sign up to set email alerts
|

Combating Against Anti-Forensics Aligned with E-mail Forensics

Abstract: Knowledge on cyber forensics is increasing on par with the cyber crime incidents. Cyber criminals' uses sophisticated technological knowledge and always they plan to escape from the clutches of law. This paper elaborates e-mail forensics and categories of anti-forensics that can be applicable to the email forensics. This paper elucidates the process of identifying such anti-forensics applied in e-mail forensics. This paper proposes a methodology for combating against anti-forensics in this regard.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
3
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 8 publications
0
3
0
Order By: Relevance
“…Emails sent over the Internet leave traces which can be intercepted and analyzed, and privacy‐conscious users may be known to use solutions, such as a “dead‐drop” system. The latter involves saving Draft copies of emails in a shared email account rather than sending the email between two accounts, and is known to have been abused by terrorists . Email is easily forged or anonymously sent due to the open nature of the protocol, but this may be detected by comparing the writing style of the sender to a database of known writing samples, a practice known as stylometry.…”
Section: Related Workmentioning
confidence: 99%
“…Emails sent over the Internet leave traces which can be intercepted and analyzed, and privacy‐conscious users may be known to use solutions, such as a “dead‐drop” system. The latter involves saving Draft copies of emails in a shared email account rather than sending the email between two accounts, and is known to have been abused by terrorists . Email is easily forged or anonymously sent due to the open nature of the protocol, but this may be detected by comparing the writing style of the sender to a database of known writing samples, a practice known as stylometry.…”
Section: Related Workmentioning
confidence: 99%
“…These concerns are present, along with others regarding the best forensic tools for anti-forensics work. 3 To put it briefly, anti-forensics compromises the usability and benefit of proof in procedures together with forensics for professionals. Anti-forensics actions can be carried out in a variety of ways, and once they are in place, they can have an impact on the course of an inquiry at any point.…”
mentioning
confidence: 99%
“…6 Conlan outlined some of the limitations of a digital forensic inquiry as follows to provide more contexts: a) Psyche: All forensic investigators employ a variety of techniques during the investigations. 3 Some procedure efficacy varies based on the investigator's intelligence, experience, and background, as well as factors like education and experience. To perform investigations in a way that is comfortable for them, many forensic investigators have built their techniques and procedure.…”
mentioning
confidence: 99%