ОБНАРУЖЕНИЕ ЦИФРОВЫХ СЛЕДОВ В ВИРТУАЛЬНЫХ УГОЛОВНЫХ ПРОЦЕССАХ: ОБЗОР ИССЛЕДОВАНИЙ ПО ЦИФРОВОЙ КРИМИНАЛИСТИКЕ

Авторы

  • Кылычбек Таавалдыев Кыргызско-Турецкий университет «Манас»
  • Рита Исмаилова Кыргызско-Турецкий университет «Манас»

DOI:

https://doi.org/10.52754/16948610_2024_2_47

Ключевые слова:

цифровая криминалистика, киберпреступность, цифровые следы, анализ данных, инструменты и методы

Аннотация

По мере развития технологий развивается и криминальный мир. Виртуальный мир теперь стал новым полем битвы для преступников и правоохранительных органов. Цифровая криминология — это быстро развивающаяся область, которая занимается поиском и анализом цифровых следов, созданных во время совершения киберпреступлений. В данной обзорной статье представлен обзор основных концепций и методов, используемых в цифровой криминалистике для выявления, анализа и интерпретации цифровых следов, созданных в ходе уголовного судопроизводства в «виртуальном» мире.

Библиографические ссылки

Alazab, A., Khraisat, A., Singh, S., Alazab, A., Khraisat, A., & Singh, S. (2023). A Review on the Internet of Things (IoT) Forensics: Challenges, Techniques, and Evaluation of Digital Forensic Tools. IntechOpen. https://doi.org/10.5772/intechopen.109840 DOI: https://doi.org/10.5772/intechopen.109840

Altulaihan, E., Alismail, A., Hafizur Rahman, M. M., & Ibrahim, A. A. (2023). Email Security Issues, Tools, and Techniques Used in Investigation. Sustainability, 15(13), 10612. DOI: https://doi.org/10.3390/su151310612

Arakerimath, A., & Gupta, P. K. (2015). Digital footprint: Pros, cons, and future. International Journal of Latest Technology in Engineering, 4(10), 52–56.

Aslam, S., & Nassif, A. B. (2023). Phish-identifier: Machine Learning based classification of Phishing attacks. 2023 Advances in Science and Engineering Technology International Conferences (ASET), 1–6. https://ieeexplore.ieee.org/abstract/document/10180869/ DOI: https://doi.org/10.1109/ASET56582.2023.10180869

Balajinarayan, B. (2019). A Study on Metasploit Payloads. International Journal of Cyber-Security and Digital Forensics, 8(4), 298–308. DOI: https://doi.org/10.17781/P002640

Baykara, M., Daş, R., & Karadoğan, İ. (2013). Bilgi güvenliği sistemlerinde kullanılan araçların incelenmesi. 1st International Symposium on Digital Forensics and Security (ISDFS’13), 20, 21. https://bgys.iku.edu.tr/sites/bgys/files/inline-files/Bilgi%20G%C3%BCvenli%C4%9Fi%20Sistemlerinde%20Kullan%C4%B1lan%20Ara%C3%A7lar%C4%B1n%20%C4%B0ncelenmesi_0.pdf

Bhavsar, V., Kadlak, A., & Sharma, S. (2018). Study on phishing attacks. International Journal of Computer Applications, 182(33), 27–29. DOI: https://doi.org/10.5120/ijca2018918286

Buchanan, B. (2020). The hacker and the state: Cyber attacks and the new normal of geopolitics. Harvard University Press. https://books.google.com/books?hl=en&lr=&id=NE3SDwAAQBAJ&oi=fnd&pg=PP1&dq=hacker+attacks+network+security&ots=MEiekiV82y&sig=WyMvFub_j-G9AoR2gLOCKjO69Nw

Daswani, N., & Elbayadi, M. (2021). The Yahoo Breaches of 2013 and 2014. In N. Daswani & M. Elbayadi, Big Breaches (pp. 155–169). Apress. https://doi.org/10.1007/978-1-4842-6655-7_7 DOI: https://doi.org/10.1007/978-1-4842-6655-7_7

Demirbank.kg. (2024). Demirbank.Kg. https://demirbank.kg/ru/about/news/news-detail?slug=demirbank-33

Dhawan, S. M., Gupta, B. M., & Elango, B. (2021). Global Cyber Security Research Output (1998–2019): A Scientometric Analysis. Science & Technology Libraries, 40(2), 172–189. https://doi.org/10.1080/0194262X.2020.1840487 DOI: https://doi.org/10.1080/0194262X.2020.1840487

Di Nicola, A. (2022). Towards digital organized crime and digital sociology of organized crime. Trends in Organized Crime. https://doi.org/10.1007/s12117-022-09457-y DOI: https://doi.org/10.1007/s12117-022-09457-y

Economist.kg. (2024, March 12). Фишинг, социальная инженерия, кража данных. Как обезопасить себя от телефонных мошенников? Economist.kg. https://economist.kg/pravo-znat/2024/03/12/fishingh-sotsialnaia-inzhienieriia-krazha-dannykh-kak-raspoznat-tieliefonnykh-moshiennikov/

Ghafarian, A. (2020). An empirical analysis of email forensics tools. Available at SSRN 3624617. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3624617 DOI: https://doi.org/10.2139/ssrn.3624617

Gupta, K., Varol, C., & Zhou, B. (2023). Digital forensic analysis of discord on google chrome. Forensic Science International: Digital Investigation, 44, 301479. https://doi.org/10.1016/j.fsidi.2022.301479 DOI: https://doi.org/10.1016/j.fsidi.2022.301479

Holt, T. J., Bossler, A. M., & Seigfried-Spellar, K. C. (2022). Cybercrime and digital forensics: An introduction. Routledge. https://www.taylorfrancis.com/books/mono/10.4324/9780429343223/cybercrime-digital-forensics-thomas-holt-adam-bossler-kathryn-seigfried-spellar DOI: https://doi.org/10.4324/9780429343223

Iqbal, H., & Naaz, S. (2019). Wireshark as a tool for detection of various LAN attacks. Int. J. Comput. Sci. Eng, 7(5), 833–837. DOI: https://doi.org/10.26438/ijcse/v7i5.833837

Ivanova, M., & Stefanov, S. (2023). Digital Forensics Investigation Models: Current State and Analysis. 2023 8th International Conference on Smart and Sustainable Technologies (SpliTech), 1–4. https://ieeexplore.ieee.org/abstract/document/10193176/ DOI: https://doi.org/10.23919/SpliTech58164.2023.10193176

Jacob, J., Peters, M., & Yang, T. A. (2020). Interdisciplinary Cybersecurity: Rethinking the Approach and the Process. In K.-K. R. Choo, T. H. Morris, & G. L. Peterson (Eds.), National Cyber Summit (NCS) Research Track (Vol. 1055, pp. 61–74). Springer International Publishing. https://doi.org/10.1007/978-3-030-31239-8_6 DOI: https://doi.org/10.1007/978-3-030-31239-8_6

John, E., Kalu, C., & Asuquo, P. (n.d.). Comparative Performance Analysis Of Cybersecurity Tools On A Wireless Network With WPA2 Encryption. Retrieved April 22, 2024, from http://www.jmest.org/wp-content/uploads/JMESTN42354196.pdf

Kaktus.kg. (2023). Kaktus.Kg. https://kaktus.kg/doc/11835_bishkektegi_mektepterge_yniversitetterge_kayradan_bomba_tyyralyy_bildiryy_tyshty.html

Khan, A. A., Shaikh, A. A., Laghari, A. A., Dootio, M. A., Rind, M. M., & Awan, S. A. (2022). Digital forensics and cyber forensics investigation: Security challenges, limitations, open issues, and future direction. International Journal of Electronic Security and Digital Forensics, 14(2), 124. https://doi.org/10.1504/IJESDF.2022.121174 DOI: https://doi.org/10.1504/IJESDF.2022.121174

Kore, A., Hinduja, T., Sawant, A., Indorkar, S., Wagh, S., & Rankhambe, S. (2022). Burp Suite Extension for Script based Attacks for Web Applications. 2022 6th International Conference on Electronics, Communication and Aerospace Technology, 651–657. https://ieeexplore.ieee.org/abstract/document/10009116/ DOI: https://doi.org/10.1109/ICECA55336.2022.10009116

Kotari, M., & Chiplunkar, N. N. (2020). A Survey on Detection and Analysis of Cyber Security Threats Through Monitoring Tools. In Handbook of Research on Intrusion Detection Systems (pp. 77–104). IGI Global. https://www.igi-global.com/chapter/a-survey-on-detection-and-analysis-of-cyber-security-threats-through-monitoring-tools/251798 DOI: https://doi.org/10.4018/978-1-7998-2242-4.ch005

Marchetti, K., & Bodily, P. (2022). John the Ripper: An Examination and Analysis of the Popular Hash Cracking Algorithm. 2022 Intermountain Engineering, Technology and Computing (IETC), 1–6. https://ieeexplore.ieee.org/abstract/document/9796671/ DOI: https://doi.org/10.1109/IETC54973.2022.9796671

Mariani, L. A., Ornelas, J. R. H., & Ricca, B. (2023). Banks’ Physical Footprint and Financial Technology Adoption. Inter-American Development Bank, Department of Research and Chief Economist. https://www.aeaweb.org/conference/2024/program/paper/hBszrffn DOI: https://doi.org/10.18235/0004842

Marin, E., Almukaynizi, M., Sarkar, S., Nunes, E., Shakarian, J., & Shakarian, P. (2021). Exploring Malicious Hacker Communities: Toward Proactive Cyber-Defense. Cambridge University Press. https://books.google.com/books?hl=en&lr=&id=BzMiEAAAQBAJ&oi=fnd&pg=PR9&dq=Ericsson,+Marin.,+Mohammed,+Almukaynizi.,+Soumajyoti,+Sarkar.,+Eric,+Nunes.,+Jana,+Shakarian.,+Paulo,+Shakarian.,+Edward,+G.,+Amoroso.+(2021).+Exploring+Malicious+Hacker+Communities:+Toward+Proactive+Cyber-Defense.+++&ots=DiRawunCjo&sig=0S92fW_I3Cl0WQQZz_YhicCFYa8 DOI: https://doi.org/10.1017/9781108869003

Mbank. (2024). https://www.cbk.kg/ru/news/1499

McCuddy, T. (2022). Digital Disclosure of Delinquency: Online Peers and the Sharing of Offline Crime. Crime & Delinquency, 68(13–14), 2554–2580. https://doi.org/10.1177/00111287211067179 DOI: https://doi.org/10.1177/00111287211067179

Milenkovic, D. (2023). CYBER SECURITY AND DATA COLLECTION. Security Science Journal, 4(1), 102–118. DOI: https://doi.org/10.37458/ssj.4.1.7

Mohammed, F., Rahman, N. A. A., Yusof, Y., & Juremi, J. (2022). Automated nmap toolkit. 2022 International Conference on Advancements in Smart, Secure and Intelligent Computing (ASSIC), 1–7. https://ieeexplore.ieee.org/abstract/document/10088375/ DOI: https://doi.org/10.1109/ASSIC55218.2022.10088375

Moneva, A., Leukfeldt, E. R., & Romagna, M. (2023). Fieldwork Experiences Researching Cybercriminals. In A. M. Díaz-Fernández, C. Del-Real, & L. Molnar (Eds.), Fieldwork Experiences in Criminology and Security Studies (pp. 511–533). Springer International Publishing. https://doi.org/10.1007/978-3-031-41574-6_27 DOI: https://doi.org/10.1007/978-3-031-41574-6_27

OptimaBank. (2024). https://www.optimabank.kg/index.php?option=com_content&view=article&id=5010:attention-there-was-a-phishing-page-in-order-to-steal-funds-from-cards&catid=4&lang=ru&Itemid=110

Paul Joseph, D., & Norman, J. (2020). A Review and Analysis of Ransomware Using Memory Forensics and Its Tools. In S. C. Satapathy, V. Bhateja, J. R. Mohanty, & S. K. Udgata (Eds.), Smart Intelligent Computing and Applications (Vol. 159, pp. 505–514). Springer Singapore. https://doi.org/10.1007/978-981-13-9282-5_48 DOI: https://doi.org/10.1007/978-981-13-9282-5_48

Qabajeh, I., Thabtah, F., & Chiclana, F. (2018). A recent review of conventional vs. Automated cybersecurity anti-phishing techniques. Computer Science Review, 29, 44–55. DOI: https://doi.org/10.1016/j.cosrev.2018.05.003

Quisumbing, L. A. (2017). Global Perspectives on Cyber security Using Latent Dirichlet Allocation Algorithm. International Journal of Applied Engineering Research, 12(20), 10310–10323.

Ramazhamba, P. T., & Venter, H. S. (2023). Using distributed ledger technology for digital forensic investigation purposes on tendering projects. International Journal of Information Technology, 15(3), 1255–1274. https://doi.org/10.1007/s41870-023-01215-9 DOI: https://doi.org/10.1007/s41870-023-01215-9

Sangwan, S. (2022). A REVIEW ON CYBER CRIME PREVENTION USING STEGANOGRAPHY. International Journal for Research Publication and Seminar, 13(1), 176–181. https://jrps.shodhsagar.com/index.php/j/article/view/226

Scanlon, M., Breitinger, F., Hargreaves, C., Hilgert, J.-N., & Sheppard, J. (2023). ChatGPT for digital forensic investigation: The good, the bad, and the unknown. Forensic Science International: Digital Investigation, 46, 301609. https://doi.org/10.1016/j.fsidi.2023.301609 DOI: https://doi.org/10.1016/j.fsidi.2023.301609

Scanlon, M., Nikkel, B., & Geradts, Z. (2023). Digital forensic investigation in the age of ChatGPT. Forensic Science International: Digital Investigation, 44,. https://forensicsandsecurity.com/papers/ChatGPT.php DOI: https://doi.org/10.1016/j.fsidi.2023.301543

Schwarz, K., & Creutzburg, R. (2021). Design of professional laboratory exercises for effective state-of-the-Art OSINT investigation tools-Part 3: Maltego. Electronic Imaging, 33, 1–23. DOI: https://doi.org/10.2352/ISSN.2470-1173.2021.3.MOBMU-045

Semko, M., & Krakhmalyov, O. (2023). Electronic information as evidence. Вестник Национального Технического Университета “ХПИ.” https://doi.org/10.20998/2227-6890.2021.1.07 DOI: https://doi.org/10.20998/2227-6890.2021.1.07

Seo, S., Seok, B., & Lee, C. (2023). Digital forensic investigation framework for the metaverse. The Journal of Supercomputing, 79(9), 9467–9485. https://doi.org/10.1007/s11227-023-05045-1 DOI: https://doi.org/10.1007/s11227-023-05045-1

Serebrennikova, A. V., & Serebrennikova, M. S. (2021). Criminological innovations in criminality prevention: Status and perspectives. SHS Web of Conferences, 108, 03002. https://www.shs-conferences.org/articles/shsconf/abs/2021/19/shsconf_blf2021_03002/shsconf_blf2021_03002.html DOI: https://doi.org/10.1051/shsconf/202110803002

Singh, C., Tara, H., & Mishra, A. (2022). Digital Evidence Collection. In Manual of Crime Scene Investigation (pp. 145–156). CRC Press. https://www.taylorfrancis.com/chapters/edit/10.4324/9781003129554-9/digital-evidence-collection-chintan-singh-harshita-tara-amarnath-mishra DOI: https://doi.org/10.4324/9781003129554-9

Singh, S., & Kumar, S. (2020). Qualitative Assessment of Digital Forensic Tools. Asian J. Electr. Sci, 9(1), 25–32. DOI: https://doi.org/10.51983/ajes-2020.9.1.2372

Sumadinata, W. S. (2023). CYBERCRIME AND GLOBAL SECURITY THREATS: A CHALLENGE IN INTERNATIONAL LAW. Russian Law Journal, 11(3), 438–444. DOI: https://doi.org/10.52783/rlj.v11i3.1112

Tomer, S., Apurva, A., Ranakoti, P., Yadav, S., & Roy, N. R. (2017). Data recovery in Forensics. 2017 International Conference on Computing and Communication Technologies for Smart Nation (IC3TSN), 188–192. https://ieeexplore.ieee.org/abstract/document/8284474/ DOI: https://doi.org/10.1109/IC3TSN.2017.8284474

Tudosi, A.-D., Balan, D. G., & Potorac, A. D. (2022). New Snort rule for detection and prevention of SMTP e-mail bomb attacks. 2022 International Conference on Development and Application Systems (DAS), 78–84. https://ieeexplore.ieee.org/abstract/document/9786213/ DOI: https://doi.org/10.1109/DAS54948.2022.9786213

van der Kleij, R., Wijn, R., & Hof, T. (2020). An application and empirical test of the Capability Opportunity Motivation-Behaviour model to data leakage prevention in financial organizations. Computers & Security, 97, 101970. DOI: https://doi.org/10.1016/j.cose.2020.101970

Verma, A., & Shri, C. (2022). Cyber Security: A Review of Cyber Crimes, Security Challenges and Measures to Control. Vision: The Journal of Business Perspective, 097226292210747. https://doi.org/10.1177/09722629221074760 DOI: https://doi.org/10.1177/09722629221074760

Winter, C., & Gundur, R. V. (2024). Challenges in gaining ethical approval for sensitive digital social science studies. International Journal of Social Research Methodology, 27(1), 31–46. https://doi.org/10.1080/13645579.2022.2122226 DOI: https://doi.org/10.1080/13645579.2022.2122226

Приколотина, Ю. Л. (2022). Проблемы и возможности криминологических исследований в условиях преобразующейся реальности. Вестник Полоцкого Государственного Университета. Серия D. Экономические и Юридические Науки, 12, 152–157.

Серебренникова, А. В. (2020). Криминологические проблемы цифрового мира (Цифровая криминология). Всероссийский Криминологический Журнал, 14(3), 423–430.

Загрузки

Опубликован

27-06-2024

Как цитировать

Таавалдыев , К., & Исмаилова , Р. (2024). ОБНАРУЖЕНИЕ ЦИФРОВЫХ СЛЕДОВ В ВИРТУАЛЬНЫХ УГОЛОВНЫХ ПРОЦЕССАХ: ОБЗОР ИССЛЕДОВАНИЙ ПО ЦИФРОВОЙ КРИМИНАЛИСТИКЕ. Вестник Ошского государственного университета, (2), 479–494. https://doi.org/10.52754/16948610_2024_2_47