ОБНАРУЖЕНИЕ ЦИФРОВЫХ СЛЕДОВ В ВИРТУАЛЬНЫХ УГОЛОВНЫХ ПРОЦЕССАХ: ОБЗОР ИССЛЕДОВАНИЙ ПО ЦИФРОВОЙ КРИМИНАЛИСТИКЕ
DOI:
https://doi.org/10.52754/16948610_2024_2_47Ключевые слова:
цифровая криминалистика, киберпреступность, цифровые следы, анализ данных, инструменты и методыАннотация
По мере развития технологий развивается и криминальный мир. Виртуальный мир теперь стал новым полем битвы для преступников и правоохранительных органов. Цифровая криминология — это быстро развивающаяся область, которая занимается поиском и анализом цифровых следов, созданных во время совершения киберпреступлений. В данной обзорной статье представлен обзор основных концепций и методов, используемых в цифровой криминалистике для выявления, анализа и интерпретации цифровых следов, созданных в ходе уголовного судопроизводства в «виртуальном» мире.
Библиографические ссылки
Alazab, A., Khraisat, A., Singh, S., Alazab, A., Khraisat, A., & Singh, S. (2023). A Review on the Internet of Things (IoT) Forensics: Challenges, Techniques, and Evaluation of Digital Forensic Tools. IntechOpen. https://doi.org/10.5772/intechopen.109840 DOI: https://doi.org/10.5772/intechopen.109840
Altulaihan, E., Alismail, A., Hafizur Rahman, M. M., & Ibrahim, A. A. (2023). Email Security Issues, Tools, and Techniques Used in Investigation. Sustainability, 15(13), 10612. DOI: https://doi.org/10.3390/su151310612
Arakerimath, A., & Gupta, P. K. (2015). Digital footprint: Pros, cons, and future. International Journal of Latest Technology in Engineering, 4(10), 52–56.
Aslam, S., & Nassif, A. B. (2023). Phish-identifier: Machine Learning based classification of Phishing attacks. 2023 Advances in Science and Engineering Technology International Conferences (ASET), 1–6. https://ieeexplore.ieee.org/abstract/document/10180869/ DOI: https://doi.org/10.1109/ASET56582.2023.10180869
Balajinarayan, B. (2019). A Study on Metasploit Payloads. International Journal of Cyber-Security and Digital Forensics, 8(4), 298–308. DOI: https://doi.org/10.17781/P002640
Baykara, M., Daş, R., & Karadoğan, İ. (2013). Bilgi güvenliği sistemlerinde kullanılan araçların incelenmesi. 1st International Symposium on Digital Forensics and Security (ISDFS’13), 20, 21. https://bgys.iku.edu.tr/sites/bgys/files/inline-files/Bilgi%20G%C3%BCvenli%C4%9Fi%20Sistemlerinde%20Kullan%C4%B1lan%20Ara%C3%A7lar%C4%B1n%20%C4%B0ncelenmesi_0.pdf
Bhavsar, V., Kadlak, A., & Sharma, S. (2018). Study on phishing attacks. International Journal of Computer Applications, 182(33), 27–29. DOI: https://doi.org/10.5120/ijca2018918286
Buchanan, B. (2020). The hacker and the state: Cyber attacks and the new normal of geopolitics. Harvard University Press. https://books.google.com/books?hl=en&lr=&id=NE3SDwAAQBAJ&oi=fnd&pg=PP1&dq=hacker+attacks+network+security&ots=MEiekiV82y&sig=WyMvFub_j-G9AoR2gLOCKjO69Nw
Daswani, N., & Elbayadi, M. (2021). The Yahoo Breaches of 2013 and 2014. In N. Daswani & M. Elbayadi, Big Breaches (pp. 155–169). Apress. https://doi.org/10.1007/978-1-4842-6655-7_7 DOI: https://doi.org/10.1007/978-1-4842-6655-7_7
Demirbank.kg. (2024). Demirbank.Kg. https://demirbank.kg/ru/about/news/news-detail?slug=demirbank-33
Dhawan, S. M., Gupta, B. M., & Elango, B. (2021). Global Cyber Security Research Output (1998–2019): A Scientometric Analysis. Science & Technology Libraries, 40(2), 172–189. https://doi.org/10.1080/0194262X.2020.1840487 DOI: https://doi.org/10.1080/0194262X.2020.1840487
Di Nicola, A. (2022). Towards digital organized crime and digital sociology of organized crime. Trends in Organized Crime. https://doi.org/10.1007/s12117-022-09457-y DOI: https://doi.org/10.1007/s12117-022-09457-y
Economist.kg. (2024, March 12). Фишинг, социальная инженерия, кража данных. Как обезопасить себя от телефонных мошенников? Economist.kg. https://economist.kg/pravo-znat/2024/03/12/fishingh-sotsialnaia-inzhienieriia-krazha-dannykh-kak-raspoznat-tieliefonnykh-moshiennikov/
Ghafarian, A. (2020). An empirical analysis of email forensics tools. Available at SSRN 3624617. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3624617 DOI: https://doi.org/10.2139/ssrn.3624617
Gupta, K., Varol, C., & Zhou, B. (2023). Digital forensic analysis of discord on google chrome. Forensic Science International: Digital Investigation, 44, 301479. https://doi.org/10.1016/j.fsidi.2022.301479 DOI: https://doi.org/10.1016/j.fsidi.2022.301479
Holt, T. J., Bossler, A. M., & Seigfried-Spellar, K. C. (2022). Cybercrime and digital forensics: An introduction. Routledge. https://www.taylorfrancis.com/books/mono/10.4324/9780429343223/cybercrime-digital-forensics-thomas-holt-adam-bossler-kathryn-seigfried-spellar DOI: https://doi.org/10.4324/9780429343223
Iqbal, H., & Naaz, S. (2019). Wireshark as a tool for detection of various LAN attacks. Int. J. Comput. Sci. Eng, 7(5), 833–837. DOI: https://doi.org/10.26438/ijcse/v7i5.833837
Ivanova, M., & Stefanov, S. (2023). Digital Forensics Investigation Models: Current State and Analysis. 2023 8th International Conference on Smart and Sustainable Technologies (SpliTech), 1–4. https://ieeexplore.ieee.org/abstract/document/10193176/ DOI: https://doi.org/10.23919/SpliTech58164.2023.10193176
Jacob, J., Peters, M., & Yang, T. A. (2020). Interdisciplinary Cybersecurity: Rethinking the Approach and the Process. In K.-K. R. Choo, T. H. Morris, & G. L. Peterson (Eds.), National Cyber Summit (NCS) Research Track (Vol. 1055, pp. 61–74). Springer International Publishing. https://doi.org/10.1007/978-3-030-31239-8_6 DOI: https://doi.org/10.1007/978-3-030-31239-8_6
John, E., Kalu, C., & Asuquo, P. (n.d.). Comparative Performance Analysis Of Cybersecurity Tools On A Wireless Network With WPA2 Encryption. Retrieved April 22, 2024, from http://www.jmest.org/wp-content/uploads/JMESTN42354196.pdf
Kaktus.kg. (2023). Kaktus.Kg. https://kaktus.kg/doc/11835_bishkektegi_mektepterge_yniversitetterge_kayradan_bomba_tyyralyy_bildiryy_tyshty.html
Khan, A. A., Shaikh, A. A., Laghari, A. A., Dootio, M. A., Rind, M. M., & Awan, S. A. (2022). Digital forensics and cyber forensics investigation: Security challenges, limitations, open issues, and future direction. International Journal of Electronic Security and Digital Forensics, 14(2), 124. https://doi.org/10.1504/IJESDF.2022.121174 DOI: https://doi.org/10.1504/IJESDF.2022.121174
Kore, A., Hinduja, T., Sawant, A., Indorkar, S., Wagh, S., & Rankhambe, S. (2022). Burp Suite Extension for Script based Attacks for Web Applications. 2022 6th International Conference on Electronics, Communication and Aerospace Technology, 651–657. https://ieeexplore.ieee.org/abstract/document/10009116/ DOI: https://doi.org/10.1109/ICECA55336.2022.10009116
Kotari, M., & Chiplunkar, N. N. (2020). A Survey on Detection and Analysis of Cyber Security Threats Through Monitoring Tools. In Handbook of Research on Intrusion Detection Systems (pp. 77–104). IGI Global. https://www.igi-global.com/chapter/a-survey-on-detection-and-analysis-of-cyber-security-threats-through-monitoring-tools/251798 DOI: https://doi.org/10.4018/978-1-7998-2242-4.ch005
Marchetti, K., & Bodily, P. (2022). John the Ripper: An Examination and Analysis of the Popular Hash Cracking Algorithm. 2022 Intermountain Engineering, Technology and Computing (IETC), 1–6. https://ieeexplore.ieee.org/abstract/document/9796671/ DOI: https://doi.org/10.1109/IETC54973.2022.9796671
Mariani, L. A., Ornelas, J. R. H., & Ricca, B. (2023). Banks’ Physical Footprint and Financial Technology Adoption. Inter-American Development Bank, Department of Research and Chief Economist. https://www.aeaweb.org/conference/2024/program/paper/hBszrffn DOI: https://doi.org/10.18235/0004842
Marin, E., Almukaynizi, M., Sarkar, S., Nunes, E., Shakarian, J., & Shakarian, P. (2021). Exploring Malicious Hacker Communities: Toward Proactive Cyber-Defense. Cambridge University Press. https://books.google.com/books?hl=en&lr=&id=BzMiEAAAQBAJ&oi=fnd&pg=PR9&dq=Ericsson,+Marin.,+Mohammed,+Almukaynizi.,+Soumajyoti,+Sarkar.,+Eric,+Nunes.,+Jana,+Shakarian.,+Paulo,+Shakarian.,+Edward,+G.,+Amoroso.+(2021).+Exploring+Malicious+Hacker+Communities:+Toward+Proactive+Cyber-Defense.+++&ots=DiRawunCjo&sig=0S92fW_I3Cl0WQQZz_YhicCFYa8 DOI: https://doi.org/10.1017/9781108869003
Mbank. (2024). https://www.cbk.kg/ru/news/1499
McCuddy, T. (2022). Digital Disclosure of Delinquency: Online Peers and the Sharing of Offline Crime. Crime & Delinquency, 68(13–14), 2554–2580. https://doi.org/10.1177/00111287211067179 DOI: https://doi.org/10.1177/00111287211067179
Milenkovic, D. (2023). CYBER SECURITY AND DATA COLLECTION. Security Science Journal, 4(1), 102–118. DOI: https://doi.org/10.37458/ssj.4.1.7
Mohammed, F., Rahman, N. A. A., Yusof, Y., & Juremi, J. (2022). Automated nmap toolkit. 2022 International Conference on Advancements in Smart, Secure and Intelligent Computing (ASSIC), 1–7. https://ieeexplore.ieee.org/abstract/document/10088375/ DOI: https://doi.org/10.1109/ASSIC55218.2022.10088375
Moneva, A., Leukfeldt, E. R., & Romagna, M. (2023). Fieldwork Experiences Researching Cybercriminals. In A. M. Díaz-Fernández, C. Del-Real, & L. Molnar (Eds.), Fieldwork Experiences in Criminology and Security Studies (pp. 511–533). Springer International Publishing. https://doi.org/10.1007/978-3-031-41574-6_27 DOI: https://doi.org/10.1007/978-3-031-41574-6_27
OptimaBank. (2024). https://www.optimabank.kg/index.php?option=com_content&view=article&id=5010:attention-there-was-a-phishing-page-in-order-to-steal-funds-from-cards&catid=4&lang=ru&Itemid=110
Paul Joseph, D., & Norman, J. (2020). A Review and Analysis of Ransomware Using Memory Forensics and Its Tools. In S. C. Satapathy, V. Bhateja, J. R. Mohanty, & S. K. Udgata (Eds.), Smart Intelligent Computing and Applications (Vol. 159, pp. 505–514). Springer Singapore. https://doi.org/10.1007/978-981-13-9282-5_48 DOI: https://doi.org/10.1007/978-981-13-9282-5_48
Qabajeh, I., Thabtah, F., & Chiclana, F. (2018). A recent review of conventional vs. Automated cybersecurity anti-phishing techniques. Computer Science Review, 29, 44–55. DOI: https://doi.org/10.1016/j.cosrev.2018.05.003
Quisumbing, L. A. (2017). Global Perspectives on Cyber security Using Latent Dirichlet Allocation Algorithm. International Journal of Applied Engineering Research, 12(20), 10310–10323.
Ramazhamba, P. T., & Venter, H. S. (2023). Using distributed ledger technology for digital forensic investigation purposes on tendering projects. International Journal of Information Technology, 15(3), 1255–1274. https://doi.org/10.1007/s41870-023-01215-9 DOI: https://doi.org/10.1007/s41870-023-01215-9
Sangwan, S. (2022). A REVIEW ON CYBER CRIME PREVENTION USING STEGANOGRAPHY. International Journal for Research Publication and Seminar, 13(1), 176–181. https://jrps.shodhsagar.com/index.php/j/article/view/226
Scanlon, M., Breitinger, F., Hargreaves, C., Hilgert, J.-N., & Sheppard, J. (2023). ChatGPT for digital forensic investigation: The good, the bad, and the unknown. Forensic Science International: Digital Investigation, 46, 301609. https://doi.org/10.1016/j.fsidi.2023.301609 DOI: https://doi.org/10.1016/j.fsidi.2023.301609
Scanlon, M., Nikkel, B., & Geradts, Z. (2023). Digital forensic investigation in the age of ChatGPT. Forensic Science International: Digital Investigation, 44,. https://forensicsandsecurity.com/papers/ChatGPT.php DOI: https://doi.org/10.1016/j.fsidi.2023.301543
Schwarz, K., & Creutzburg, R. (2021). Design of professional laboratory exercises for effective state-of-the-Art OSINT investigation tools-Part 3: Maltego. Electronic Imaging, 33, 1–23. DOI: https://doi.org/10.2352/ISSN.2470-1173.2021.3.MOBMU-045
Semko, M., & Krakhmalyov, O. (2023). Electronic information as evidence. Вестник Национального Технического Университета “ХПИ.” https://doi.org/10.20998/2227-6890.2021.1.07 DOI: https://doi.org/10.20998/2227-6890.2021.1.07
Seo, S., Seok, B., & Lee, C. (2023). Digital forensic investigation framework for the metaverse. The Journal of Supercomputing, 79(9), 9467–9485. https://doi.org/10.1007/s11227-023-05045-1 DOI: https://doi.org/10.1007/s11227-023-05045-1
Serebrennikova, A. V., & Serebrennikova, M. S. (2021). Criminological innovations in criminality prevention: Status and perspectives. SHS Web of Conferences, 108, 03002. https://www.shs-conferences.org/articles/shsconf/abs/2021/19/shsconf_blf2021_03002/shsconf_blf2021_03002.html DOI: https://doi.org/10.1051/shsconf/202110803002
Singh, C., Tara, H., & Mishra, A. (2022). Digital Evidence Collection. In Manual of Crime Scene Investigation (pp. 145–156). CRC Press. https://www.taylorfrancis.com/chapters/edit/10.4324/9781003129554-9/digital-evidence-collection-chintan-singh-harshita-tara-amarnath-mishra DOI: https://doi.org/10.4324/9781003129554-9
Singh, S., & Kumar, S. (2020). Qualitative Assessment of Digital Forensic Tools. Asian J. Electr. Sci, 9(1), 25–32. DOI: https://doi.org/10.51983/ajes-2020.9.1.2372
Sumadinata, W. S. (2023). CYBERCRIME AND GLOBAL SECURITY THREATS: A CHALLENGE IN INTERNATIONAL LAW. Russian Law Journal, 11(3), 438–444. DOI: https://doi.org/10.52783/rlj.v11i3.1112
Tomer, S., Apurva, A., Ranakoti, P., Yadav, S., & Roy, N. R. (2017). Data recovery in Forensics. 2017 International Conference on Computing and Communication Technologies for Smart Nation (IC3TSN), 188–192. https://ieeexplore.ieee.org/abstract/document/8284474/ DOI: https://doi.org/10.1109/IC3TSN.2017.8284474
Tudosi, A.-D., Balan, D. G., & Potorac, A. D. (2022). New Snort rule for detection and prevention of SMTP e-mail bomb attacks. 2022 International Conference on Development and Application Systems (DAS), 78–84. https://ieeexplore.ieee.org/abstract/document/9786213/ DOI: https://doi.org/10.1109/DAS54948.2022.9786213
van der Kleij, R., Wijn, R., & Hof, T. (2020). An application and empirical test of the Capability Opportunity Motivation-Behaviour model to data leakage prevention in financial organizations. Computers & Security, 97, 101970. DOI: https://doi.org/10.1016/j.cose.2020.101970
Verma, A., & Shri, C. (2022). Cyber Security: A Review of Cyber Crimes, Security Challenges and Measures to Control. Vision: The Journal of Business Perspective, 097226292210747. https://doi.org/10.1177/09722629221074760 DOI: https://doi.org/10.1177/09722629221074760
Winter, C., & Gundur, R. V. (2024). Challenges in gaining ethical approval for sensitive digital social science studies. International Journal of Social Research Methodology, 27(1), 31–46. https://doi.org/10.1080/13645579.2022.2122226 DOI: https://doi.org/10.1080/13645579.2022.2122226
Приколотина, Ю. Л. (2022). Проблемы и возможности криминологических исследований в условиях преобразующейся реальности. Вестник Полоцкого Государственного Университета. Серия D. Экономические и Юридические Науки, 12, 152–157.
Серебренникова, А. В. (2020). Криминологические проблемы цифрового мира (Цифровая криминология). Всероссийский Криминологический Журнал, 14(3), 423–430.
Загрузки
Опубликован
Как цитировать
Выпуск
Раздел
Лицензия
Copyright (c) 2024 The Author(s)
Это произведение доступно по лицензии Creative Commons «Attribution-NonCommercial» («Атрибуция — Некоммерческое использование») 4.0 Всемирная.