2019
DOI: 10.1016/j.diin.2019.07.003
|View full text |Cite
|
Sign up to set email alerts
|

Digital behavioral-fingerprint for user attribution in digital forensics: Are we there yet?

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
11
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 25 publications
(11 citation statements)
references
References 25 publications
0
11
0
Order By: Relevance
“…Bria [27] proposed five investigation processes, which are database identification, investigation, artefacts collection, analysis, and documentation. These processes have been widely explored in other domains of digital forensics, and have been proven to indeed demonstrate some tendency of overlap [2,3]. Therefore, clearly, all DBFI processes, activities, and tasks, are required to be specific, redundant and non-overlapping.…”
Section: Background and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Bria [27] proposed five investigation processes, which are database identification, investigation, artefacts collection, analysis, and documentation. These processes have been widely explored in other domains of digital forensics, and have been proven to indeed demonstrate some tendency of overlap [2,3]. Therefore, clearly, all DBFI processes, activities, and tasks, are required to be specific, redundant and non-overlapping.…”
Section: Background and Related Workmentioning
confidence: 99%
“…A unique terminology along with an explicit definition is usually required to inform the reader on what each term in the process model meant [2]. This is particularly useful in digital forensics where the ambiguity of terms could result in litigation failure [3]. Otherwise, the reader may be in the dark about what the author is thinking and studying.…”
Section: Introductionmentioning
confidence: 99%
“…This challenge can be attributed to the complexity of editing software, which has also evolved to enable inexperienced users to manipulate the content of digital data (with little effort) with a high-quality output. As a consequence, questions regarding media authenticity are of growing significance, particularly in litigation where important decisions might be based on the reliability of the digital evidence [6]. A proper chain of custody, as well as a chain of evidence are also required to ensure the repeatability and possible expert presentation of a digital artefact [6][7][8].…”
Section: Introductionmentioning
confidence: 99%
“…As a consequence, questions regarding media authenticity are of growing significance, particularly in litigation where important decisions might be based on the reliability of the digital evidence [6]. A proper chain of custody, as well as a chain of evidence are also required to ensure the repeatability and possible expert presentation of a digital artefact [6][7][8].…”
Section: Introductionmentioning
confidence: 99%
“…The rapid decline in traditional digital forensics (DF) practice has enabled the field of cloud forensics to have numerous advances and most importantly, digital investigation in the cloud resources, which has been at the center of these advances. This has been influenced by the increased complexity of attack tools, and cyber‐attack techniques, improved anti‐forensic strategies and the quest for attribution (Alruban, Clarke, Li, & Furnell, ; Ikuesan & Venter, , ). Often, the cloud forensics discipline, which is an amalgamation of DF and cloud computing, relies on purely extracting evidentiary digital artifacts from the cloud environment, which in real cases is open and distributed in nature.…”
Section: Introductionmentioning
confidence: 99%