The Way to Anti-Forensics : A Review

Authors

  • Krati Dadheech  Centre for Cyber Security, Sardar Patel University of Police, Security & Criminal Justice, Jodhpur, India
  • Gaurav Bhatia  Centre for Cyber Security, Sardar Patel University of Police, Security & Criminal Justice, Jodhpur, India

Keywords:

Forensics, Anti-Forensics, Steganography, Key Logger, Binder

Abstract

Anti-Forensics is a common term which is used as a protective shield or an antidote against forensics analysis. The main motive behind applying such techniques is to degrade the quality of evidence or destroy the evidence from crime scene so that analysis and examination of the evidence become more difficult for a forensic investigator. This difficulty in examining the evidence that creates a gap between forensics and anti-forensics technique. This paper mainly focuses upon how the anti-forensics techniques have changed with time. Also we will try to build a small model by combining three commonly used data hiding techniques.

References

  1. Ortolani, Stefano, and Bruno Crispo. "NoisyKey: Tolerating Keyloggers      via Keystrokes Hiding." HotSec. 2012.
  2. Oleg Afonin. “Countering Anti-Forensics Efforts-Part 1.” Internet: https://www.forensicmag.com/article/2015/09/countering-anti-forensic-efforts-part-1, March 9, 2015.
  3. Karie NM, Venter HS. Toward a general ontology for digital forensic disciplines. J Forensic Sci 2014;59(5):1231–41.
  4. Eterovic‐Soric, Brett, et al. "Windows 7 Antiforensics: A Review and a Novel Approach." Journal of Forensic Sciences (2017).
  5. Doshi, Ronak, Pratik Jain, and Lalit Gupta. "Steganography and its applications in security." International Journal of Modern Engineering Research (IJMER) 2.6 (2012): 4634-4638.
  6. Sharda, Shikha, and Sumit Budhiraja. "Image steganography: a review." International Journal of Emerging Technology and Advanced Engineering 3.1 (2013): 707-710.
  7. Roy, Ratnakirti, et al. "Evaluating image steganography techniques: Future research challenges." Computing, Management and Telecommunications (ComManTel), 2013 International Conference on. IEEE, 2013.
  8. Kour, Jasleen, and Deepankar Verma. "Steganography Techniques–A Review Paper." International Journal of Emerging Research in Management &Technology ISSN (2014): 2278-9359.
  9. Arora, Sneha, and Sanyam Anand. "A proposed method for Image Steganography using Edge Detection." International Journal of Emerging Technology and Advanced Engineering 3.2 (2013): 296-297.
  10. Sharma, Vipul, and Sunny Kumar. "A new approach to hide text in images using steganography." International Journal of Advanced Research in Computer Science and Software Engineering 3.4 (2013).
  11. Kumar, Anil, and Rohini Sharma. "A secure image steganography based on RSA algorithm and hash-LSB Technique." International Journal of Advanced Research in Computer Science and Software Engineering 3.7 (2013).
  12. Ren-Er, Yang, et al. "Image steganography combined with DES encryption pre-processing." Measuring Technology and Mechatronics Automation (ICMTMA), 2014 Sixth International Conference on. IEEE, 2014.
  13. Roy, Souvik, and P. Venkateswaran. "Online payment system using steganography and visual cryptography." Electrical, Electronics and Computer Science (SCEECS), 2014 IEEE Students' Conference on. IEEE, 2014.
  14. Satar, Siti Dhalila Mohd, et al. "Secure Image Steganography Using Encryption Algorithm." Annual Int'l Conference on Intelligent Computing, Computer Science & Information Systems (ICCSIS-16). 2016.
  15. Howard, Adam, and Yi Hu. "An approach for detecting malicious keyloggers." Proceedings of the 2012 Information Security Curriculum Development Conference. ACM, 2012.
  16. Pathak, N., Apurva Pawar, and Balaji Patil. "A Survey on Keylogger: A Malicious Attack." International Jourcal of Advanced Research in Computer Engineering and Technology (2015).
  17. Pawade, D., A. Lahigude, and D. Reja. "Review report on security breaches using keylogger and clickjacking." International Journal of Advance Foundation and Research in Computer 2 (2015): 55-59.
  18. Jain, Ruchi, and Dr Mohd Amjad. "Computer Surveillance System." Al Falah School ofEngineering and Technology (2014).
  19. Tuli, Preeti, and Priyanka Sahu. "System monitoring and security using keylogger." International Journal of Computer Science and Mobile Computing 2.3 (2013): 106-111.
  20. Wazid, Mohammad, et al. "A framework for detection and prevention of novel keylogger spyware attacks." Intelligent Systems and Control (ISCO), 2013 7th International Conference on.IEEE, 2013.

Downloads

Published

2017-12-31

Issue

Section

Research Articles

How to Cite

[1]
Krati Dadheech, Gaurav Bhatia, " The Way to Anti-Forensics : A Review, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 6, pp.262-269, November-December-2017.