Next Article in Journal
STOD: Towards Scalable Task-Oriented Dialogue System on MultiWOZ-API
Previous Article in Journal
AtomGID: An Atomic Gesture Identifier for Qualitative Spatial Reasoning
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
This is an early access version, the complete PDF, HTML, and XML versions will be available soon.
Review

Systematic Review: Anti-Forensic Computer Techniques

by
Rafael González Arias
,
Javier Bermejo Higuera
,
J. Javier Rainer Granados
,
Juan Ramón Bermejo Higuera
and
Juan Antonio Sicilia Montalvo
*
Escuela Superior de Ingeniería y Tecnología, Universidad Internacional de La Rioja, Avenida de La Paz, 137, 26006 La Rioja, Spain
*
Author to whom correspondence should be addressed.
Submission received: 30 April 2024 / Revised: 5 June 2024 / Accepted: 17 June 2024 / Published: 19 June 2024
(This article belongs to the Special Issue Data Mining and Machine Learning in Cybersecurity)

Abstract

The main purpose of anti-forensic computer techniques, in the broadest sense, is to hinder the investigation of a computer attack by eliminating traces and preventing the collection of data contained in a computer system. Nowadays, cyber-attacks are becoming more and more frequent and sophisticated, so it is necessary to understand the techniques used by hackers to be able to carry out a correct forensic analysis leading to the identification of the perpetrators. Despite its importance, this is a poorly represented area in the scientific literature. The disparity of the existing works, together with the small number of articles, makes it challenging to find one’s way around the vast world of computer forensics. This article presents a comprehensive review of the existing scientific literature on anti-forensic techniques, mainly DFIR (digital forensics incident response), organizing the studies according to their subject matter and orientation. It also presents key ideas that contribute to the understanding of this field of forensic science and details the shortcomings identified after reviewing the state of the art.
Keywords: computer anti-forensic; computer forensic; computer security computer anti-forensic; computer forensic; computer security

Share and Cite

MDPI and ACS Style

González Arias, R.; Bermejo Higuera, J.; Rainer Granados, J.J.; Bermejo Higuera, J.R.; Sicilia Montalvo, J.A. Systematic Review: Anti-Forensic Computer Techniques. Appl. Sci. 2024, 14, 5302. https://0-doi-org.brum.beds.ac.uk/10.3390/app14125302

AMA Style

González Arias R, Bermejo Higuera J, Rainer Granados JJ, Bermejo Higuera JR, Sicilia Montalvo JA. Systematic Review: Anti-Forensic Computer Techniques. Applied Sciences. 2024; 14(12):5302. https://0-doi-org.brum.beds.ac.uk/10.3390/app14125302

Chicago/Turabian Style

González Arias, Rafael, Javier Bermejo Higuera, J. Javier Rainer Granados, Juan Ramón Bermejo Higuera, and Juan Antonio Sicilia Montalvo. 2024. "Systematic Review: Anti-Forensic Computer Techniques" Applied Sciences 14, no. 12: 5302. https://0-doi-org.brum.beds.ac.uk/10.3390/app14125302

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop