CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

Design of Tool for Digital Forensics in Virtual Environment

by Shagufta Rajguru, Aayush Pathak, Danish K. Chaus, Akshay J. Boramani
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 163 - Number 4
Year of Publication: 2017
Authors: Shagufta Rajguru, Aayush Pathak, Danish K. Chaus, Akshay J. Boramani
10.5120/ijca2017913516

Shagufta Rajguru, Aayush Pathak, Danish K. Chaus, Akshay J. Boramani . Design of Tool for Digital Forensics in Virtual Environment. International Journal of Computer Applications. 163, 4 ( Apr 2017), 50-52. DOI=10.5120/ijca2017913516

@article{ 10.5120/ijca2017913516,
author = { Shagufta Rajguru, Aayush Pathak, Danish K. Chaus, Akshay J. Boramani },
title = { Design of Tool for Digital Forensics in Virtual Environment },
journal = { International Journal of Computer Applications },
issue_date = { Apr 2017 },
volume = { 163 },
number = { 4 },
month = { Apr },
year = { 2017 },
issn = { 0975-8887 },
pages = { 50-52 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume163/number4/27387-2017913516/ },
doi = { 10.5120/ijca2017913516 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:09:18.025680+05:30
%A Shagufta Rajguru
%A Aayush Pathak
%A Danish K. Chaus
%A Akshay J. Boramani
%T Design of Tool for Digital Forensics in Virtual Environment
%J International Journal of Computer Applications
%@ 0975-8887
%V 163
%N 4
%P 50-52
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Virtual Environment Forensics is the process of performing the digital forensics in virtual environment. In recent time, virtualization technology has become one of the most important and popular technologies for individuals and companies due to its many advantages like cost benefits for storage, processing and computing resources. New techniques and methods of cybercrimes against virtual environments are used by attackers. Thus there is a need for designing and developing new techniques and tools to investigate new type of cybercrimes.[1] In this paper, the computer forensic investigations with respect to the vital role of virtual environments have been analysed. Vulnerabilities in a virtual environment and some existing forensic tools are studied. We propose design of a forensic tool to analyse the evidences left by an attacker. Further this tool will try to relate the evidences in a presentable form which can be readily used by law enforcement to lead to the final suspect.

References
  1. Manjaiah D.H, Ezz El-Din Hemdan “Digital Forensics in Virtual Environment” CSI Magazine, March_2016.
  2. Shagufta Rajguru, Deepak Sharma “Database Tamper Detection and Analysis” International Journal of Computer Applications (0975 – 8887) Volume 105 – No. 15, November 2014.
  3. International Journal of Digital Evidence - Fall 2002, Volume 1, Issue 3 http://www.utica.edu/academic/institutes/ecii/publications/articles/A04A40DC-A6F6-F2C1-98F94F16AF57232D.pdf
  4. https://en.wikipedia.org/wiki/VirtualBox
  5. Victor, Jeff, Jeff Savit, and Gary Combs. "Oracle Solaris 10 System Virtualization Essentials." InformIT: The Trusted Technology Source for IT Pros and Developers. N.p., n.d. Web. 31 July 2016.
  6. Cherilyn Neal “Forensic Recovery of Evidence from deleted Oracle VirtualBox Virtual Machines” Project Report, Utica College.
  7. https://blogs.oracle.com/fatbloke/entry/virtualbox_log_files
  8. http://searchvmware.techtarget.com/definition/VMware-snapshot
  9. Shweta Tripathi, Bandu Baburao Meshram “Digital Evidence for Database Tamper Detection” Journal of Information Security, 2012, 3, ***-*** Published Online April 2012 (http://www.SciRP.org/journal/jis)
Index Terms

Computer Science
Information Sciences

Keywords

Digital Forensics VirtualBox Virtualisation Evidence Law