Power of analytic tools in Oxygen Forensic® Detective based on NIST cybersecurity framework

Tole Sutikno, Iqbal Busthomi

Abstract


The National Institute of Standards and Technology (NIST) cybersecurity framework is a systematic approach for assessing and improving cybersecurity procedures in digital investigations. Oxygen Forensic® Detective is a digital forensic software that integrates multiple analytic tools to assist investigators in extracting valuable insights from digital evidence. The analytic tools, including timeline, social graph, image categorization, facial categorization, maps, data search, key evidence, optical character recognition, statistics, and translation, assist investigators in thoroughly analyzing digital artifacts, establishing connections, and accurately classifying images with precision and effectiveness. By incorporating these analytical resources into Oxygen Forensic® Detective, a comprehensive strategy is established to effectively combat cyber threats. The NIST cybersecurity framework is incorporated into the tool, offering a methodical approach to identifying and reducing cybersecurity risks. Law enforcement agencies can enhance the productivity and effectiveness of their forensic methodologies by implementing these advanced technologies. This can result in successful prosecutions and improved cybersecurity practices.  Overall, the utilization of analytical tools in criminological inquiries has experienced a substantial rise in the contemporary digital era.

Keywords


Cybersecurity; Digital forensic tool; Digital investigation; NIST cybersecurity framework; Oxygen Forensic® Detective

Full Text:

PDF

References


B. K. Jaisawal, Y. Perwej, S. K. Singh, S. Kumar, J. P. Dixit, and N. K. Singh, “An empirical investigation of human identity verification methods,” International Journal of Scientific Research in Science, Engineering and Technology, pp. 16–38, Jan. 2023, doi: 10.32628/IJSRSET2310012.

G. Sarkar and S. K. Shukla, “Behavioral analysis of cybercrime: paving the way for effective policing strategies,” Journal of Economic Criminology, vol. 2, 2023, doi: 10.1016/j.jeconc.2023.100034.

H. Swofford and C. Champod, “Probabilistic reporting and algorithms in forensic science: stakeholder perspectives within the american criminal justice system,” Forensic Science International: Synergy, vol. 4, 2022, doi: 10.1016/j.fsisyn.2022.100220.

“Oxygen forensic detective,” Oxygen Forensics. Accessed: Oct. 12, 2024. [Online]. Available: https://www.oxygenforensics.com/en/products/oxygen-forensic-detective/

“Top 10 analytic features available in oxygen forensic® detective,” Oxygen Forensics, 2024. Accessed: Oct. 12, 2024. [Online]. Available: https://www.oxygenforensics.com/en/resources/10-analytical-features-available-in-oxygen-forensic-detective/

NIST, The NIST cybersecurity framework (CSF) 2.0. United States: National Institute of Standards and Technology, 2024,

doi: 10.6028/NIST.CSWP.29

S. Sachdeva, B. L. Raina, and A. Sharma, “Analysis of digital forensic tools,” Journal of Computational and Theoretical Nanoscience, vol. 17, no. 6, pp. 2459–2467, 2020, doi: 10.1166/jctn.2020.8916.

S. Satpathy and S. Mohanty, Big data analytics and computing for digital forensic investigations, 1st ed. Boca Raton, Florida: CRC Press, 2020.

C. Pollard and R. Anzaldua, Computer forensics for dummies, 1st ed. Hoboken, United States: John Wiley & Sons, 2008.

A. Zannin and L. Huber, “Crime scene investigation,” in Manual of Forensic Science: an International Survey, 1st ed., Boca Raton, Florida: CRC Press, 2017.

F. R. Moreira, D. A. D. S. Filho, G. D. A. Nze, R. T. D. S. Junior, and R. R. Nunes, “Evaluating the performance of nist’s framework cybersecurity controls through a constructivist multicriteria methodology,” IEEE Access, vol. 9, pp. 129605–129618, 2021, doi: 10.1109/ACCESS.2021.3113178.

K. Kent, S. Chevalier, T. Grance, and H. Dang, “Guide to integrating forensic techniques into incident response: recommendations of the National Institute of Standards and Technology,” in Computer Security, vol. 10, 2006, pp. 800–886.

NIST, “Cybersecurity framework,” National Institute of Standards and Technology. [Online]. Available: https://www.nist.gov/cyberframework

NIST, “The CSF 1.1 five functions,” Cybersecurity Framework. [Online]. Available: https://www.nist.gov/cyberframework/getting-started/online-learning/five-functions

W. Akpose, “NIST cybersecurity framework: a practitioner’s perspective,” 6igma Associates, 2016.

Y. Chabot, “Construction, enrichment and semantic analysis of timelines - application to digital forensics,” Ph.D Thesis, Department Computer Science, University College Dublin, Belfield, Ireland, 2015.

R. Ayers, S. Brothers, and W. Jansen, Guidelines on mobile device forensics, National Institute of Standards and Technology, US Department of Commerce, 2014, doi: 10.6028/NIST.SP.800-101r1.

“Advanced analytics: facial categorization,” Oxygen Forensic. Accessed: Oct. 12, 2024. [Online]. Available: https://www.oxygenforensics.com/en/resources/advanced-facial-categorization/

D. Wolf, T. Göbel, and H. Baier, “Hypervisor-based data synthesis: on its potential to tackle the curse of client-side agent remnants in forensic image generation,” Forensic Science International: Digital Investigation, vol. 48, Mar. 2024, doi: 10.1016/j.fsidi.2023.301690.

S. Latifi, Information technology-new generations. Switzerland: Springer Cham, 2018, doi: 10.1007/978-3-319-32467-8.

K. Ruan, Cybercrime and cloud forensics: applications for investigation processes. IGI Global, 2013, doi: 10.4018/978-1-4666-2662-1.

A. W. Malik, D. S. Bhatti, T. J. Park, H. U. Ishtiaq, J. C. Ryou, and K. Il Kim, “Cloud digital forensics: beyond tools, techniques, and challenges,” Sensors, vol. 24, no. 2, 2024, doi: 10.3390/s24020433.

C. M. Miller, “A survey of prosecutors and investigators using digital evidence: a starting point,” Forensic Science International: Synergy, vol. 6, 2023, doi: 10.1016/j.fsisyn.2022.100296.

T. Göbel, H. Baier, and F. Breitinger, “Data for digital forensics: why a discussion on ‘how realistic is synthetic data’ is dispensable,” Digital Threats: Research and Practice, vol. 4, no. 3, 2023, doi: 10.1145/3609863.

S. Majumdar, P. Shirani, and L. Wang, Innovations in digital forensics. World Scientific Publishing, 2023, doi: 10.1142/13330.




DOI: https://doi.org/10.11591/csit.v6i1.p8-19

Refbacks

  • There are currently no refbacks.


Computer Science and Information Technologies
ISSN: 2722-323X, e-ISSN: 2722-3221
This journal is published by the Institute of Advanced Engineering and Science (IAES) in collaboration with Universitas Ahmad Dahlan (UAD).

CSIT Visitor Stats

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.