Systematic Review: Anti-Forensic Computer Techniques
Autor:
González Arias, Rafael
; Bermejo Higuera, Javier
; J. Javier, Rainer Granados
; Bermejo Higuera, Juan Ramón
; Sicilia Moltalvo, Juan Antonio
Fecha:
2024Palabra clave:
Revista / editorial:
Applied SciencesCitación:
González Arias, R., Bermejo Higuera, J., Rainer Granados, J. J., Bermejo Higuera, J. R., & Sicilia Montalvo, J. A. (2024). Systematic Review: Anti-Forensic Computer Techniques. Applied Sciences, 14(12), 5302. https://doi.org/10.3390/app14125302Tipo de Ítem:
articleDirección web:
https://www.mdpi.com/2076-3417/14/12/5302
Resumen:
The main purpose of anti-forensic computer techniques, in the broadest sense, is to hinder the investigation of a computer attack by eliminating traces and preventing the collection of data contained in a computer system. Nowadays, cyber-attacks are becoming more and more frequent and sophisticated, so it is necessary to understand the techniques used by hackers to be able to carry out a correct forensic analysis leading to the identification of the perpetrators. Despite its importance, this is a poorly represented area in the scientific literature. The disparity of the existing works, together with the small number of articles, makes it challenging to find one’s way around the vast world of computer forensics. This article presents a comprehensive review of the existing scientific literature on anti-forensic techniques, mainly DFIR (digital forensics incident response), organizing the studies according to their subject matter and orientation. It also presents key ideas that contribute to the understanding of this field of forensic science and details the shortcomings identified after reviewing the state of the art.
Ficheros en el ítem
Este ítem aparece en la(s) siguiente(s) colección(es)
Estadísticas de uso
| Año |
| 2012 |
| 2013 |
| 2014 |
| 2015 |
| 2016 |
| 2017 |
| 2018 |
| 2019 |
| 2020 |
| 2021 |
| 2022 |
| 2023 |
| 2024 |
| 2025 |
| 2026 |
| Vistas |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 1 |
| Descargas |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 0 |
| 1 |
Ítems relacionados
Mostrando ítems relacionados por Título, autor o materia.
-
Unsupervised Approaches in Anomaly Detection
Bermejo Higuera, Juan Ramón; Bermejo Higuera, Javier; Sicilia Moltalvo, Juan Antonio; González Crespo, Rubén (Springer, 2024)[Resumen no disponible] -
Benchmarking Android Malware Analysis Tools
Bermejo Higuera, Javier; Morales Moreno, Javier; Bermejo Higuera, Juan Ramón; Sicilia Moltalvo, Juan Antonio; Barreiro Martillo, Gustavo Javier; Sureda Riera, Tomas Miguel (Electronics, 2024)Today, malware is arguably one of the biggest challenges organisations face from a cybersecurity standpoint, regardless of the types of devices used in the organisation. One of the most malware-attacked mobile operating ... -
Secure Development Methodology for Full Stack Web Applications: Proof of the Methodology Applied to Vue. js, Spring Boot and MySQL
Rey Rodríguez, Kevin; Avellaneda Galindo, Julián David; Tárrega Juan, Josep; Bermejo Higuera, Juan Ramón; Bermejo Higuera, Javier; Sicilia Moltalvo, Juan Antonio (Computers, Materials & Continua, 2025)In today’s rapidly evolving digital landscape, web application security has become paramount as organizations face increasingly sophisticated cyber threats. This work presents a comprehensive methodology for implementing ...





