Show simple item record

dc.contributor.authorAlshumrani, A
dc.contributor.authorClarke, Nathan
dc.contributor.authorGhita, B
dc.date.accessioned2023-03-20T11:04:22Z
dc.date.available2023-03-20T11:04:22Z
dc.date.issued2023-02-28
dc.identifier.isbn978-1-914587-61-0
dc.identifier.issn2048-9870
dc.identifier.issn2048-9889
dc.identifier.urihttps://pearl.plymouth.ac.uk/handle/10026.1/20587
dc.description.abstract

<jats:p>Digital forensics is now essential in addressing cybercrime and cyber-enabled crime but potentially it can have a role in almost every other type of crime. Given technology's continuous development and prevalence, the widespread adoption of technologies among society and the subsequent digital footprints that exist, the analysis of these technologies can help support investigations. The abundance of interconnected technologies and telecommunication platforms has significantly changed the nature of digital evidence. Subsequently, the nature and characteristics of digital forensic cases involve an enormous volume of data heterogeneity, scattered across multiple evidence sources, technologies, applications, and services. It is indisputable that the outspread and connections between existing technologies have raised the need to integrate, harmonise, unify and correlate evidence across data sources in an automated fashion. Unfortunately, the current state of the art in digital forensics leads to siloed approaches focussed upon specific technologies or support of a particular part of digital investigation. Due to this shortcoming, the digital investigator examines each data source independently, trawls through interconnected data across various sources, and often has to conduct data correlation manually, thus restricting the digital investigator’s ability to answer high-level questions in a timely manner with a low cognitive load. Therefore, this research paper investigates the limitations of the current state of the art in the digital forensics discipline and categorises common investigation crimes with the necessary corresponding digital analyses to define the characteristics of the next-generation approach. Based on these observations, it discusses the future capabilities of the next-generation unified forensics analysis tool (U-FAT), with a workflow example that illustrates data unification, correlation and visualisation processes within the proposed method.</jats:p>

dc.format.extent466-475
dc.publisherAcademic Conferences International Ltd
dc.subjectData Correlation
dc.subjectData Heterogeneity
dc.subjectDigital Forensics
dc.subjectDigital Forensics Tools
dc.titleA Unified Forensics Analysis Approach to Digital Investigation
dc.typeconference
plymouth.author-urlhttps://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:001047434700054&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=11bb513d99f797142bcfeffcc58ea008
plymouth.issue1
plymouth.volume18
plymouth.publication-statusPublished online
plymouth.journalInternational Conference on Cyber Warfare and Security
dc.identifier.doi10.34190/iccws.18.1.972
plymouth.organisational-group|Plymouth
plymouth.organisational-group|Plymouth|Faculty of Science and Engineering
plymouth.organisational-group|Plymouth|Faculty of Science and Engineering|School of Engineering, Computing and Mathematics
plymouth.organisational-group|Plymouth|REF 2021 Researchers by UoA
plymouth.organisational-group|Plymouth|Users by role
plymouth.organisational-group|Plymouth|Users by role|Academics
plymouth.organisational-group|Plymouth|REF 2021 Researchers by UoA|UoA11 Computer Science and Informatics
dcterms.dateAccepted2023-01-01
dc.date.updated2023-03-20T11:03:57Z
dc.rights.embargodate2023-3-21
dc.identifier.eissn2048-9889
dc.rights.embargoperiod2023-03-21
rioxxterms.versionofrecord10.34190/iccws.18.1.972


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record


All items in PEARL are protected by copyright law.
Author manuscripts deposited to comply with open access mandates are made available in accordance with publisher policies. Please cite only the published version using the details provided on the item record or document. In the absence of an open licence (e.g. Creative Commons), permissions for further reuse of content should be sought from the publisher or author.
Theme by 
Atmire NV