Digital forensics investigations and network security issues in tracking the trails of cybercriminals

Oyelakin, Oyetunji, Yeboah-Ofori, Abel ORCID: https://orcid.org/0000-0001-8055-9274, Ganiyu, Aishat and Oguntoyinbo, Oluwole (2025) Digital forensics investigations and network security issues in tracking the trails of cybercriminals. In: 2024 International Conference on Electrical and Computer Engineering Researches (ICECER), 04-06 Dec 2024, Gaborone, Botswana.

[thumbnail of PDF/A]
Preview
PDF (PDF/A)
Digital forensics investigations and network security issues in tracking the trails of cybercriminals_accessible.pdf - Accepted Version
Available under License Creative Commons Attribution.

Download (1MB) | Preview

Abstract

The application of digital forensics investigations (DFI) and the legal implications in network security have become imperative due to increased connectivity and cyberattacks. The DFI process requires investigating computers and their associated media to determine if they have been used to commit a crime or gain unauthorized access. However, in a network environment, attackers can intercept, interrupt, modify content, and modify contents and fabricate the victims. Thus, it is imperative that these cyberattacks are considered from a legal perspective considering the challenges. The paper explores the digital forensics investigations process and its legal implications from network security to assist in determining indicators of compromise, attribution, and prosecution. The contribution of the paper is threefold. First, we explore DFI challenges from a network security perspective, including the legal and the standards. Secondly, we implement attacks on a network and use DFI tools such as Splunk to detect interruptions, modifications, and disruptions during the investigation process. Finally, we discuss some DFI challenges that impinge on national and international law during investigations and prosecutions and recommend improvement. The results show that the DFI process in the network security environment is relevant in detecting, preventing, and prosecuting these threats.

Item Type: Conference or Workshop Item (Paper)
ISBN: 9798331539733
Identifier: 10.1109/ICECER62944.2024.10920466
Page Range: pp. 1-8
Identifier: 10.1109/ICECER62944.2024.10920466
Keywords: Fabrication, Computers, Law, Digital forensics, Network security, Predictive models, Real-time systems, Standards, Surface treatment, Open source software
Subjects: Computing > Information security > Cyber security
Depositing User: Abel Yeboah-Ofori
Date Deposited: 22 Apr 2025 09:44
Last Modified: 22 Apr 2025 09:45
URI: https://repository.uwl.ac.uk/id/eprint/13485

Downloads

Downloads per month over past year

Actions (login required)

View Item View Item

Menu