RAQAMLI KRIMINALISTIKA SOHASIDAGI ASOSIY MUAMMOLAR
Keywords:
Raqamli ekspertiza, raqamli kriminalistika, kiberjinoyat, kriminalistika tekshiruvlari, kriminalistik muammolar.Abstract
Raqamli kriminalistika kiberxavfsizlik uchun muhim soha bo‘lganligi bois tadqiqotchilar tomonidan katta e’tibor qaratilmoqda. Zamonaviy kiberhujumlarning tobora ortib borayotganligi to‘g‘ridan-to‘g‘ri dalillarni yig‘ishni qiyinlashtirayotganligi bilan bog‘liq va bu ko‘pincha bir nechta texnologiyalardan foydalanishni talab qiladi. Bugungi kunga qadar tadqiqotchilar ushbu sohada ko‘plab ilmiy ishlarni taqdim etishgan. Ushbu maqolada raqamli kriminalistika sohasiga tegishli ilmiy ishlar o‘rganib chiqilgan, raqamli kriminalistika bo‘yicha asosiy sohalar va ularning asosiy muammolari aniqlangan. Mavzular va usullarning xilma-hilligiga qaramay, ularning deyarli barchasi duch keladigan bir nechta umumiy muammolar mavjud. Ularning aksariyati qarshi tahlil usullari, qurilmalardan va bulutli tizimlardan ma’lumotlarni yig‘ish qiyinchiliklar tug‘dirmoqda. Texnik masalalardan tashqari, tadqiqot huquqiy, ilmiy va axloqiy masalalar bo‘yicha protsessual masalalarni hal qilish zarur isoblanadi. Tadqiqot ishidagi tahlil natijalarida raqamli ekspertizaning turli mavzulari bo‘yicha tadqiqotchilar va amaliyotchilarning natijalari keltirilgan.
References
(2019). I. G. C. for Innovation. Global Guidelines for Digital Forensics Laboratories. The European Union Agency for Cybersecurity (ENISA). ENISA Threat Landscape 2021. [Online]. Available: https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021.
C. Pasquini, I. Amerini, and G. Boato, ‘‘Media forensics on social media platforms: A survey,’’ EURASIP J. Inf. Secur., vol. 2021, no. 1, pp. 1–19, Dec. 2021.
K. Nance, H. Armstrong, and C. Armstrong, ‘‘Digital forensics: Defining an education agenda,’’ in Proc. 43rd Hawaii Int. Conf. Syst. Sci., 2010, pp. 1–10.
The European Union Agency for Cybersecurity (ENISA). ENISA Threat Landscape 2021. [Online]. Available: https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021.
M. E. Alex and R. Kishore, ‘‘Forensics framework for cloud computing,’’ Comput. Elect. Eng., vol. 60, pp. 193–205, May 2017.
M. Khanafseh, M. Qatawneh, and W. Almobaideen, ‘‘A survey of various frameworks and solutions in all branches of digital forensics with a focus on cloud forensics,’’ Int. J. Adv. Comput. Sci. Appl., vol. 10, no. 8, pp. 610–629, 2019.
C. Patsakis, F. Casino, N. Lykousas, and V. Katos, ‘‘Unravelling Ariadne’s thread: Exploring the threats of decentralised DNS,’’ IEEE Access, vol. 8, pp. 118559–118571, 2020.
S. Khan, A. Gani, A. W. A. Wahab, M. Shiraz, and I. Ahmad, ‘‘Network forensics: Review, taxonomy, and open challenges,’’ J. Netw. Comput. Appl., vol. 66, pp. 214–235, May 2016.
L. F. Sikos, ‘‘Packet analysis for network forensics: A comprehensive survey,’’ Forensic Sci. Int., Digit. Invest., vol. 32, Mar. 2020.
K. Barmpatsalou, T. Cruz, E. Monteiro, and P. Simoes, ‘‘Current and future trends in mobile device forensics: A survey,’’ ACM Comput. Surv., vol. 51, no. 3, pp. 1–31, 2018.
K. Barmpatsalou, D. Damopoulos, G. Kambourakis, and V. Katos, ‘‘A critical review of 7 years of mobile device forensics,’’ Digit. Invest., vol. 10, no. 4, pp. 323–349, Dec. 2013.
J. Hou, Y. Li, J. Yu, and W. Shi, ‘‘A survey on digital forensics in Internet of Things,’’ IEEE Internet Things J., vol. 7, no. 1, pp. 1–15, Jan. 2020.
A. E. Omolara, A. Alabdulatif, O. I. Abiodun, M. Alawida, A. Alabdulatif, W. H. Alshoura, and H. Arshad, ‘‘The Internet of Things security: A survey encompassing unexplored areas and new insights,’’ Comput. Secur., vol. 112, Jan. 2022.
P. Lutta, M. Sedky, M. Hassan, U. Jayawickrama, and B. B. Bastaki, ‘‘The complexity of Internet of Things forensics: A state-of-the-art review,’’ Forensic Sci. Int., Digit. Invest., vol. 38, Sep. 2021.
A. Ross, S. Banerjee, and A. Chowdhury, ‘‘Security in smart cities: A brief review of digital forensic schemes for biometric data,’’ Pattern Recognit. Lett., vol. 138, pp. 346–354, Oct. 2020.
T. Latzo, R. Palutke, and F. Freiling, ‘‘A universal taxonomy and survey of forensic memory acquisition techniques,’’ Digit. Invest., vol. 28, pp. 56–69, Mar. 2019.
A. Case and G. G. Richard, ‘‘Memory forensics: The path forward,’’ Digit. Invest., vol. 20, pp. 23–33, Mar. 2017.
A. Al-Dhaqm, S. A. Razak, D. A. Dampier, K.-K. R. Choo, K. Siddique, R. A. Ikuesan, A. Alqarni, and V. R. Kebande, ‘‘Categorization and organization of database forensic investigation processes,’’ IEEE Access, vol. 8, pp. 112846–112858, 2020.
T. K. Dasaklis, F. Casino, and C. Patsakis, ‘‘Sok: Blockchain solutions for forensics,’’ in Technology Development for Security Practitioners. Cham, Switzerland: Springer, 2021.
M. Saad, J. Spaulding, L. Njilla, C. Kamhoua, S. Shetty, D. Nyang, and D. Mohaisen, ‘‘Exploring the attack surface of blockchain: A comprehensive survey,’’ IEEE Commun. Surveys Tuts., vol. 22, no. 3, pp. 1977–2008, 3rd Quart., 2020.
M. Dalal and M. Juneja, ‘‘Steganography and steganalysis (in digital forensics): A cybersecurity guide,’’ Multimedia Tools Appl., vol. 80, no. 4, pp. 5723–5771, Feb. 2021.
E. Nowroozi, A. Dehghantanha, R. M. Parizi, and K.-K.-R. Choo, ‘‘A survey of machine learning techniques in adversarial image forensics,’’ Comput. Secur., vol. 100, Jan. 2021.
136. S. Alharbi, J. Weber-Jahnke, and I. Traore, ‘‘The proactive and reactive digital forensics investigation process: A systematic literature review,’’ in Information Security and Assurance, T.-H. Kim, H. Adeli, R. J. Robles, and M. Balitanas, Eds. Berlin, Heidelberg: Springer, 2011, pp. 87–100.
A. Al-Dhaqm, R. A. Ikuesan, V. R. Kebande, S. Razak, and F. M. Ghabban, ‘‘Research challenges and opportunities in drone forensics models,’’Electronics, vol. 10, no. 13, p. 1519, Jun. 2021.
E. Mantas and C. Patsakis, ‘‘Who watches the new watchmen? The challenges for drone digital forensics investigations,’’ arXiv preprint arXiv:2021.12640, 2021.
Christa Miller. Career Paths In Digital Forensics: Practical Applications. Retrieved from https://articles.forensicfocus.com/2019/07/31/career-paths-in-digital-forensics-practical-applications/
Roussev, V. Digital forensic science: issues, methods, and challenges. Synthesis Lectures on Information Security, Privacy, & Trust. 2016.
C. Grajeda, F. Breitinger, and I. Baggili, ‘‘Availability of datasets for digital forensics- and what is missing,’’ Digit. Invest., vol. 22, pp. S94–S105, Aug. 2017. [Online].Available: https://www.sciencedirect.com/science/article/pii/S1742287617301913