Optimization in Security of Digital Evidences by Integration of Evidence Integrity Assurance Mechanism (EIAM) Plug-in into the Software Framework of Mobile Forensic Tools with Balanced Use of Antivirus Softwares

Authors

  • Mr. Bhushan M. Manjre  Research Scholar, Department of Computer Science and Engineering, Bhagwant University, Ajmer, Rajasthan, India
  • Dr. Krishan Kumar Goyal  Dean, Faculty of Computer Application, RBSMTC, Agra, India
  • Dr. Shivani  Bhagwant University, Ajmer, Rajasthan, India

DOI:

https://doi.org//10.32628/CSEIT22836

Keywords:

EIAM (Evidence Integrity Assurance Mechanism), Mobile Forensic Process, Antivirus Software

Abstract

In today's era, there exists variety of mobile forensic tools both proprietary as well as open source tools and this generation of mobile forensic tools is evolving at a faster pace with new features which mainly focuses on the deep penetration into the mobile handheld to optimize the mobile forensic process and mainly extraction and decoding of mobile artifacts. But a bit less attention is provided towards the integrity of the digital evidence obtained. There are many factors that can alter the data and the use of antivirus software is one of the prominent factors among them. The importance of antivirus software in the machine could not be denied and hence its systematic use if done, will not only save the digital evidence from the malwares but also saves it from the antivirus software itself. The proposed work describes how the EIAM (Evidence Integrity Assurance Mechanism) plug-in handles the antivirus software in a smart optimized way.

References

  1. Mohammed I. Al-Saleh, “The Impact of the Antivirus on the Digital Evidence”, January 2013,International Journal of Electronic Security and Digital, Forensics 5(3/4):229–240
  2. https://sleuthkit.org/autopsy/docs/user-docs/4.5.0/ installation _ page . html
  3. Dr. Sankararaman G, Dr.S.Suresh & Naveen Kumar M,“A Study On Users’ Opinion On Cyber Security”, IJGBMR Volume 10, Issue 2, October 2021
  4. https://www.tomsguide.com/news/what-are-false-positives-and-how-to-avoid-them
  5. Mr. Bhushan M. Manjre , Dr. Krishan Kumar Goyal , Dr. Shivani, ”Evidence Integrity Assurance Mechanism (EIAM) Plug-In for Software Framework of Mobile Forensic Tools To Extract And Decode The Mobile Artifacts”, International Conference of Scientific Computing in Innovation (ICSCI-2022), ISBN:978-93-91077-04-4, pp.- 477-483.
  6. Fernando Molina Granja, Glen D. Rodríguez Rafael,” The preservation of digital evidence and its admissibility in the court”, International Journal of Electronic Security and Digital Forensics · January 2017 DOI: 10.1504/IJESDF.2017.10002624
  7. David MUGISHA, ”DIGITAL FORENSICS: Digital Evidence in judicial System”, International Journal of Cyber Criminology · March 2019
  8. SaeedAlmarri and Dr Paul Sant, “Optimised Malware Detection in Digital Forensics”, International Journal of Network Security & Its Applications (IJNSA), Vol.6, No.1, January 2014
  9. Ahmad Fekry Moussa,”Electronic evidence and its authenticity in forensic evidence”, Moussa Egyptian Journal of Forensic Sciences (2021) 11:20 https://doi.org/10.1186/s41935-021-00234-6
  10. Hassan M,” Forensics on a Mobile Device, Tools and Limitations”, International Journal of Forensic Sciences, ISSN: 2573-1734
  11. Gulshan Shrivastava , Kavita Sharma , Manju Khari and Syeda Erfana Zohora (2018), “Role of Cyber Security and Cyber Forensics in India”, Handbook of Research on Network Forensics and Analysis Techniques, 2018, DOI: 10.4018/978-1-5225-4100-4.ch009
  12.  https://cf-media.cellebrite.com/wp-content/uploads/ 2017/08/UFED6.3_Ultimate-InField_ReleaseNotes _EN.pdf
  13.  https://cf-media.cellebrite.com/wp-content/uploads /2019/09/Chinex-Quickguide_2019_A4.pdf
  14.  https://cf-media.cellebrite.com/wp-content/ uploads2019 /05/ReleaseNotes _UFED_PA_7.18.pdf
  15.  https://cf-media.cellebrite.com/wp-content /uploads/2019/10/ReleaseNotes _UFED_v7.24.pdf
  16.  https://ad-pdf.s3.amazonaws.com/7.x% 20Documentation /7.4.0/ Enterprise_7.4_UG.pdf
  17. https://ad-pdf.s3.amazonaws.com/7.x% 20Documentation /7.4.0/FTK_7.4 _UG.pdf
  18. https://ad-pdf.s3.amazonaws.com/7.x% 20Documentation/7.4.0/ AD _ Lab_7.4_UG.pdf
  19. https://ad-pdf.s3.amazonaws.com/ftk/6.3.x/ KFF_Install.pdf
  20. https://sleuthkit.org/autopsy/docs/user-docs /4.5.0/installation_page.html
  21. https://www.oxygen-forensic.com/downloads/general/ Oxygen_Forensic _ Detective_Getting_started.pdf
  22. https://www.oxygen-forensic.com/uploads/doc_guide /Oxygen_ Forensic _Detective_Getting_Started.pdf
  23. http://encase-docs.opentext.com/documentation /encase/forensic/8.07/Content/Resources/External% 20Files/EnCase%20Forensic%20v8.07%20User%20Guide.pdf
  24. Daniel Fuentes , Juan A. Álvarez , Juan A. Ortega , Luis Gonzalez-Abril , and Francisco Velasco, ” Trojan horses in mobile devices”, Computer Science and Information Systems ,December 2010 DOI : 10.2298/ CSIS090330027F
  25.  Gostev, A.,“Mobile Malware Evolution: An Overview” , [Online]. Available: http:// www.viruslist.com/en /analysis?pubid=204792080, Sept. 2009

Downloads

Published

2022-05-30

Issue

Section

Research Articles

How to Cite

[1]
Mr. Bhushan M. Manjre, Dr. Krishan Kumar Goyal, Dr. Shivani, " Optimization in Security of Digital Evidences by Integration of Evidence Integrity Assurance Mechanism (EIAM) Plug-in into the Software Framework of Mobile Forensic Tools with Balanced Use of Antivirus Softwares, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 8, Issue 3, pp.11-19, May-June-2022. Available at doi : https://doi.org/10.32628/CSEIT22836