Arjun Chetry | Assam Don Bosco University (original) (raw)
Papers by Arjun Chetry
Springer eBooks, Aug 2, 2020
Internet is a collection of various technologies which is becoming a platform for both positive a... more Internet is a collection of various technologies which is becoming a platform for both positive and negative activities. Deep web is the section of the Internet which requires credentials to access the data, whereas in surface web, data is publicly available. Since data of deep web is not available for public analysis, there is technology available for doing illegal activity using deep web. Due to anonymity feature, dark web is becoming a challenge to investigator. Dark web is not accessible through standard browsers and is not indexed by search engines, which makes it anonymous. Web site over dark web may not cooperate with law enforcement agencies during investigation, thereby creating a challenge to investigator or forensics expert. Therefore, if we can retrieve some evidences from end devices through forensics analysis, it may give some evidence for investigator to proceed in the case.
International Journal of Experimental Research and Review
In the digital age, cybercrime facilitated by anonymous communication apps raises significant con... more In the digital age, cybercrime facilitated by anonymous communication apps raises significant concerns. Criminals exploit the anonymity provided by these apps, creating challenges for law enforcement and cybersecurity professionals when investigating and combating cybercrime. The complexity of decentralized applications (DApps) without centralized servers further complicates evidence certification. Although anonymity features to protect privacy, they impede the establishment of connections between digital accounts and real-world identities. In centralized server environments, data access for investigations is relatively straightforward. However, this study reveals that DApps present challenges due to decentralized control, anonymity, encrypted communication, and jurisdictional issues. DApps designed for anonymous communication allow users to interact without revealing their identities, making it challenging to trace criminals. While cybercrime investigations in centralized environme...
Lecture notes in networks and systems, Sep 27, 2022
2019 6th International Conference on Computing for Sustainable Global Development (INDIACom), 2019
Advancement of technology not only coercing our society to depend on technology but it also attra... more Advancement of technology not only coercing our society to depend on technology but it also attracting criminals towards this technical world or cyberspace, and also providing the criminals with adequate number of tools and techniques for committing serious crimes as well as to hide their identity or clearing their tracks (criminal activities). Moreover, due to worldwide acceptance of digital forensics for investigation, criminals are constantly using technology which avoids storing any evidences in permanent storage media and deploying their attack through volatile memory. Therefore, memory forensics is accepted as part of incident response procedure for investigation and it is evolving constantly. In this study, we surveyed various memory acquisition tools and techniques giving emphasis on online crimes where live CD/USB, portable browsers, virtualization, The Onion Router (Tor) is involved. This paper also pointed out the various contributions by researcher and academician for th...
Advances in Intelligent Systems and Computing, 2020
Internet is a collection of various technologies which is becoming a platform for both positive a... more Internet is a collection of various technologies which is becoming a platform for both positive and negative activities. Deep web is the section of the Internet which requires credentials to access the data, whereas in surface web, data is publicly available. Since data of deep web is not available for public analysis, there is technology available for doing illegal activity using deep web. Due to anonymity feature, dark web is becoming a challenge to investigator. Dark web is not accessible through standard browsers and is not indexed by search engines, which makes it anonymous. Web site over dark web may not cooperate with law enforcement agencies during investigation, thereby creating a challenge to investigator or forensics expert. Therefore, if we can retrieve some evidences from end devices through forensics analysis, it may give some evidence for investigator to proceed in the case.
Digital Forensics (4n6) Journal, 2020
2015 International Symposium on Advanced Computing and Communication (ISACC), 2015
The timeline of the events surrounding an incident being investigated is one of the most importan... more The timeline of the events surrounding an incident being investigated is one of the most important facets to forensic investigation. As a result, sometimes it is crucial to know when a suspect USB device might have been connected or disconnected from a system .A variety of forensic artifacts associated with the insertion and removal of USB devices are located in the windows registry, event logs etc. The existing forensically important locations, methodology and techniques for determining the traces left behind by the usage of USB devices in Windows XP, Vista and Windows 7 may not be the same for upcoming versions of Windows. This work aims to mainly study the forensic artifacts related to insertion and removal time stamps of various Mass Storage Class (MSC), Media Transport Protocol (MTP) and Picture Transport Protocol (PTP) enabled USB devices in Windows 8 operating system. In this paper the Windows 8 registry and Windows event logs were mainly considered as artifacts for analysis. This research explores forensic artifacts aimed to help a forensic investigator in enumerating the first insertion and last removal time stamps of various MSC, MTP and PTP enabled USB devices in Windows 8 computing environment by demonstrating the crucial Windows 8 registry keys , event logs and related metadata.
SMAC is the latest hype in the IT world and it is absolutely revolutionary. It's a Technology... more SMAC is the latest hype in the IT world and it is absolutely revolutionary. It's a Technology Ecosystem of Social, Mobility, Analytics and Cloud. It is creating mammoth event for those who are embarrassing it by overlooking the Security pitfalls that SMAC Technologies offer. As companies coin new relationships with SMAC, it's principal that they review their contracts to secure data rights, protect data with contractual, operational and legal defenses; and manage the charted risks that can come with heap, analyzing, evaluating, adjutant and acting on SMAC-generated data. The more data a company collects on SMAC, the greater is the risk that the data will be exposed. This paper discusses the various Security escape clauses of SMAC and the move to fix them.
Springer eBooks, Aug 2, 2020
Internet is a collection of various technologies which is becoming a platform for both positive a... more Internet is a collection of various technologies which is becoming a platform for both positive and negative activities. Deep web is the section of the Internet which requires credentials to access the data, whereas in surface web, data is publicly available. Since data of deep web is not available for public analysis, there is technology available for doing illegal activity using deep web. Due to anonymity feature, dark web is becoming a challenge to investigator. Dark web is not accessible through standard browsers and is not indexed by search engines, which makes it anonymous. Web site over dark web may not cooperate with law enforcement agencies during investigation, thereby creating a challenge to investigator or forensics expert. Therefore, if we can retrieve some evidences from end devices through forensics analysis, it may give some evidence for investigator to proceed in the case.
International Journal of Experimental Research and Review
In the digital age, cybercrime facilitated by anonymous communication apps raises significant con... more In the digital age, cybercrime facilitated by anonymous communication apps raises significant concerns. Criminals exploit the anonymity provided by these apps, creating challenges for law enforcement and cybersecurity professionals when investigating and combating cybercrime. The complexity of decentralized applications (DApps) without centralized servers further complicates evidence certification. Although anonymity features to protect privacy, they impede the establishment of connections between digital accounts and real-world identities. In centralized server environments, data access for investigations is relatively straightforward. However, this study reveals that DApps present challenges due to decentralized control, anonymity, encrypted communication, and jurisdictional issues. DApps designed for anonymous communication allow users to interact without revealing their identities, making it challenging to trace criminals. While cybercrime investigations in centralized environme...
Lecture notes in networks and systems, Sep 27, 2022
2019 6th International Conference on Computing for Sustainable Global Development (INDIACom), 2019
Advancement of technology not only coercing our society to depend on technology but it also attra... more Advancement of technology not only coercing our society to depend on technology but it also attracting criminals towards this technical world or cyberspace, and also providing the criminals with adequate number of tools and techniques for committing serious crimes as well as to hide their identity or clearing their tracks (criminal activities). Moreover, due to worldwide acceptance of digital forensics for investigation, criminals are constantly using technology which avoids storing any evidences in permanent storage media and deploying their attack through volatile memory. Therefore, memory forensics is accepted as part of incident response procedure for investigation and it is evolving constantly. In this study, we surveyed various memory acquisition tools and techniques giving emphasis on online crimes where live CD/USB, portable browsers, virtualization, The Onion Router (Tor) is involved. This paper also pointed out the various contributions by researcher and academician for th...
Advances in Intelligent Systems and Computing, 2020
Internet is a collection of various technologies which is becoming a platform for both positive a... more Internet is a collection of various technologies which is becoming a platform for both positive and negative activities. Deep web is the section of the Internet which requires credentials to access the data, whereas in surface web, data is publicly available. Since data of deep web is not available for public analysis, there is technology available for doing illegal activity using deep web. Due to anonymity feature, dark web is becoming a challenge to investigator. Dark web is not accessible through standard browsers and is not indexed by search engines, which makes it anonymous. Web site over dark web may not cooperate with law enforcement agencies during investigation, thereby creating a challenge to investigator or forensics expert. Therefore, if we can retrieve some evidences from end devices through forensics analysis, it may give some evidence for investigator to proceed in the case.
Digital Forensics (4n6) Journal, 2020
2015 International Symposium on Advanced Computing and Communication (ISACC), 2015
The timeline of the events surrounding an incident being investigated is one of the most importan... more The timeline of the events surrounding an incident being investigated is one of the most important facets to forensic investigation. As a result, sometimes it is crucial to know when a suspect USB device might have been connected or disconnected from a system .A variety of forensic artifacts associated with the insertion and removal of USB devices are located in the windows registry, event logs etc. The existing forensically important locations, methodology and techniques for determining the traces left behind by the usage of USB devices in Windows XP, Vista and Windows 7 may not be the same for upcoming versions of Windows. This work aims to mainly study the forensic artifacts related to insertion and removal time stamps of various Mass Storage Class (MSC), Media Transport Protocol (MTP) and Picture Transport Protocol (PTP) enabled USB devices in Windows 8 operating system. In this paper the Windows 8 registry and Windows event logs were mainly considered as artifacts for analysis. This research explores forensic artifacts aimed to help a forensic investigator in enumerating the first insertion and last removal time stamps of various MSC, MTP and PTP enabled USB devices in Windows 8 computing environment by demonstrating the crucial Windows 8 registry keys , event logs and related metadata.
SMAC is the latest hype in the IT world and it is absolutely revolutionary. It's a Technology... more SMAC is the latest hype in the IT world and it is absolutely revolutionary. It's a Technology Ecosystem of Social, Mobility, Analytics and Cloud. It is creating mammoth event for those who are embarrassing it by overlooking the Security pitfalls that SMAC Technologies offer. As companies coin new relationships with SMAC, it's principal that they review their contracts to secure data rights, protect data with contractual, operational and legal defenses; and manage the charted risks that can come with heap, analyzing, evaluating, adjutant and acting on SMAC-generated data. The more data a company collects on SMAC, the greater is the risk that the data will be exposed. This paper discusses the various Security escape clauses of SMAC and the move to fix them.