Research Areas in Cyber Security and Forensic and Centre of Excellence for Forensic Laboratory

Authors

  • Bandu B. Meshram Chairman, Jeman Educational Society, Navi Mumbai, Maharashtra, India
  • Manish Kumar Singh HOD, Department of Law, NIMS University, Jaipur, Rajasthan, India

DOI:

https://doi.org/10.48001/jowacs.2023.1111-28

Keywords:

Application, Computer systems, Cloud, Cyber forensic, Mobile, Multimedia

Abstract

This research work identifies the national and international related work to identify the cutting-edge areas of research problems in the domain of cloud computing , mobile software and multimedia data for its security and cyber forensics. The explanatory research identifies the statement of problems with its aim, objectives, and the scope of the work to be conducted into the proposed cyber forensic laboratory. The hardware and software requirements for the cybercrime digital forensic laboratory are identified to conduct cybercrime research in the domain of cyber security for the recommendation of security. The Centre of excellence for computer cybercrime digital forensics will be useful for reading, writing, research, and development to give practical and feasible solutions for  building digital forensic tools in the cutting  domain of computing systems such as Cloud Computing, Web Applications, Mobile communication, and  Multimedia Systems. The hardware and software requirements for setting up the forensic laboratory are identified and  the budget expected to set the centre of excellence for a cybercrime investigation laboratory is approximately  Rs.7,79,83,434.39/- which may vary depending on versions and updates to hardware and software’s.

Downloads

Download data is not yet available.

References

Alsmirat, M. A., Al-Hussien, R. A., Al-Sarayrah, W. A. T., Jararweh, Y., & Etier, M. (2020). Digital video forensics: A comprehensive survey. International Journal of Advanced Intelligence Paradigms, 15(4), 437-456. https://doi.org/10.1504/IJAIP.2020.106040.

Bandu, B. Meshram, & Manish, Kumar Singh (2023). Ethical hackers’ dynamic research methodology and daring experiments. Journal of Emerging Technologies and Innovative Research, 10(7). https://www.jetir.org/view?paper=JETIR2307489.

Bandu, B. Meshram, & Manish, Kumar Singh (2023). Video forensic for video tamper detection. American Journal of Multidisciplinary Research and Development, 5(5), 1-18. https://www.ajmrd.com/wp-content/uploads/2023/05/A550118.pdf.

Curran, K., Robinson, A., Peacocke, S., & Cassidy, S. (2012). Mobile phone forensic analysis. In Crime Prevention Technologies and Applications for Advancing Criminal Investigation (pp. 250-262). IGI Global. https://doi.org/10.4018/978-1-4666-1758-2.ch016.

Hayes, D. R., Snow, C., & Altuwayjiri, S. (2017). Geolocation tracking and privacy issues associated with the uber mobile application. In Proceedings of the Conference on Information Systems Applied Research ISSN (Vol. 2167, p. 1508).

https://proc.conisar.org/2017/pdf/4511.pdf.

Horsman, G. (2021). Digital evidence and the crime scene. Science & Justice, 61(6), 761-770. https://doi.org/10.1016/j.scijus.2021.10.003.

Katkule, M. P. D., & Meshram, B. B. (2019). A survey on SaaS-attacks and digital forensic. International Research Journal of Engineering and Technology, 6(6), 3645-3651. https://www.irjet.net/archives/V6/i6/IRJET-V6I6732.pdf.

Kumar, R., & Goyal, R. (2019). On cloud security requirements, threats, vulnerabilities and countermeasures: A survey. Computer Science Review, 33, 1-48. https://doi.org/10.1016/j.cosrev.2019.05.002.

Kumar, V., Singh, A., & Gaur, M. (2020, March). A comprehensive analysis on video forgery detection techniques. In Proceedings of the International Conference on Innovative Computing & Communications (ICICC). http://dx.doi.org/10.2139/ssrn.3563382.

Lazzez, A., & Slimani, T. (2015). Forensics investigation of web application security attacks. International Journal of Computer Network and Information Security, 7(3), 10-17. https://doi.org/10.5815/ijcnis.2015.03.02.

Nilima, Mitragotri, & Nirgude M. A. (2017). Survey on forensic investigation in cloud using VM snapshots. International Journal of Innovative Research in Science, Engineering and Technology, 6(10), 20963-20970.

http://www.ijirset.com/upload/2017/october/204_Survey_IEEE.pdf.

O’shaughnessy, S., & Keane, A. (2013). Impact of cloud computing on digital forensic investigations. In Advances in Digital Forensics IX: 9th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA. https://doi.org/10.1007/978-3-642-41148-9_20.

Sawant, R., & Sabnis, M. (2018). A review of video forgery and its detection. Journal of Computer Engineering (IOSR-JCE), 20(2). https://www.iosrjournals.org/iosr-jce/papers/Vol20-issue2/Version-3/A2002030104.pdf.

Shahraki, A. S., Sayyadi, H., AMRI, M. H., & Nikmaram, M. (2013). Survey: Video forensic tools. Journal of Theoretical & Applied Information Technology, 47(1). https://citeseerx.ist.psu.edu/document?repid=rep1&type=pdf&doi=3264377fe1f38c4a453423fa21a54bb5092e2df9.

Thakur, R., & Rohilla, R. (2020). Recent advances in digital image manipulation detection techniques: A brief review. Forensic Science International, 312, 110311. https://doi.org/10.1016/j.forsciint.2020.110311.

Zhang, H., Chen, L., & Liu, Q. (2018, March). Digital forensic analysis of instant messaging applications on android smartphones. In 2018 International Conference on Computing, Networking and Communications (ICNC) (pp. 647-651). IEEE. https://doi.org/10.1109/ICCNC.2018.8390330.

Published

2023-06-30

How to Cite

Bandu B. Meshram, & Manish Kumar Singh. (2023). Research Areas in Cyber Security and Forensic and Centre of Excellence for Forensic Laboratory. Journal of Web Applications and Cyber Security (e-ISSN: 2584-0908), 1(1), 11–28. https://doi.org/10.48001/jowacs.2023.1111-28

Issue

Section

Original Research Articles