Open Access Subscription Access
Behavioural Analytics in Cyber Security for Digital Forensics Application
The paper emphasizes the human aspects of cyber incidents concerning protecting information and technology assets by addressing behavioral analytics in cybersecurity for digital forensics applications. The paper demonstrates the human vulnerabilities associated with information systems technologies and components. This assessment is based on past literature assessments done in this area. This study also includes analyses of various frameworks that have led to the adoption of behavioral analysis in digital forensics. The study's findings indicate that behavioral evidence analysis should be included as part of the digital forensics examination. The provision of standardized investigation methods and the inclusion of human factors such as motives and behavioral tendencies are some of the factors attached to the use of behavioral digital forensic frameworks. However, the study also appreciates the need for a more generalizable digital forensic method.
Digital Forensics, Human Vulnerabilities, Social Engineering, Criminal Profiling, Behavioral Analytics.
- Information Systems Audit and Control Association’s (ISACA) (2021). State of cybersecurity 2020. Available: https:// www.isaca.org/state-of-cybersecurity-2020.
- Finance Online (2022). 2022/2023 Cybersecurity trends. Available: https://financesonline.com/cybersecurity-trends
- F. Casino, et al, (2022). Research trends, challenges, and emerging topics in digital forensics: A review of reviews. IEEE Access.
- H. F. Atlam, A. Alenezi, M. O. Alassafi, A. A. Alshdadi, G. B. Wills,“Security, cybercrime and digital forensics for IoT,” in Principles of internet of things (IoT) ecosystem: Insight paradigm, Springer, Cham, 2020, pp. 551-577.
- D. Paul-Joseph, J. Norman,“An analysis of digital forensics in cyber security,” in First International Conf. on Artificial Intelligence and Cognitive Computing, Singapore: Springer, 2019, pp. 701-708.
- V. Kumar&M. L. Garg, “Predictive analytics: Areview of trends and techniques,” International Journal of Computer Applications, vol. 182, no. 1, pp. 31-37, 2018.
- J. H. Addae, X. Sun, D. Towey,M. Radenkovic, “Exploring user behavioral data for adaptive cybersecurity.” User Modeling and User-Adapted Interaction, vol. 29, no. 3, 701-750, 2018.
- N. Al Mutawa, J. Bryce, V.N. Franqueira, A. Marrington, &J.C. Read, “Behavioural digital forensics model: Embedding behavioural evidence analysis into the investigation of digital crimes,” Digital Investigation, vol. 28, pp. 70-82, 2019.
- W. Petherick, “Forensic victimology assessments in child abuse and neglect cases,” in Child Abuse and Neglect, Academic Press, 2019, pp. 135-149.
- R.Y. Patil, &M.A. Ranjanikar, “A new network forensic investigation process model,” in Mobile computing and sustainable informatics, Singapore: Springer, 2002, pp. 139-146.
- A.M. Balogun, T. Zuva. “Criminal profiling in digital forensics: Assumptions, challenges and probable solution,” in 2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC), 2018, pp. 1-7.
- D. Möller., Cybersecurity in digital transformation: Scope and applications. New York: Springer, 2020.
- E. Holder, E.O. Robinson, K. Rose. “Electronic crime scene investigation: An on-the-scene reference for first responders,” US Department of Justice Office of Justice Programs, 810, 2009.
- M. Reith, C. Carr, G. Gunsch, “An examination of digital forensic models,” International Journal of digital evidence, vol. 3, no. 3), pp. 1-12, 2002.
- B. Carrier, E. H. Spafford, “Getting physical with the digital investigation process,” International Journal of digital evidence, vol. 2, no. 2, pp. 1-20, 2003.
- V. Baryamureeba, F.Tushabe, “The enhanced digital investigation process model,” Digital Investigation, 2004.
- N. L. Beebe, J. G. Clark, “A hierarchical, objectives-based framework for the digital investigations process,” Digital Investigation, vol. 2, no. 2, pp. 147-167, 2005.
- F. Cohen. “Toward a science of digital forensic evidence examination,” in IFIP International Conference on Digital Forensics, Berlin, Germany, 2010, pp. 17-35.
- A. Agarwal, M. Gupta, S. Gupta, S.C. Gupta, “Systematic digital forensic investigation model,” International Journal of Computer Science and Security (IJCSS), vol. 5, no. 1, pp. 118-131, 2011.
- A. Valjarevic, H.S. Venter, (2012, August). “Harmonised digital forensic investigation process model,” in 2012 Information Security for South Africa, 2012, pp. 1-10.
- R. Montasari, P. Peltola, D. Evans,“Integrated computer forensics investigation process model (ICFIPM) for computer crime investigations,” in International Conference on Global Security, Safety, and Sustainability, New York, NY, 2015, pp. 83-95.
- A. Silde, O. Angelopoulou,“A digital forensics profiling methodology for the cyberstalker,” in 2014 International Conference on Intelligent Networking and Collaborative Systems, Salerno, Italy, 2014, pp. 445-450.
- M. K. Rogers, K. Seigfried,“The future of computer forensics: a needs analysis survey. Computers & Security, vol. 23, no. 1, pp. 12-16, 2016.
- K. A. Neuendorf, “Content analysis and thematic analysis,” in Advanced Research Methods for Applied Psychology, Oxfordshire, UK: Routledge, 2018, pp. 211-223.
Abstract Views: 31
PDF Views: 8