##plugins.themes.academic_pro.article.main##

Abstract

The field of digital forensics involves examining and analyzing data, with computers being a primary means of communication that investigators can use to gather relevant information. Forensic analysis can be conducted in either a static or live mode. While the traditional static approach may provide incomplete evidence, live analysis tools offer a more precise and consistent view of current and previous processes. Certain critical system-related data stored in volatile memory cannot be effectively retrieved with static analysis techniques. This paper provides a brief overview of both static and live analysis methods and outlines various tools and techniques utilized in digital forensic analysis.

Keywords

Cybersecurity Digital Forensics Static Forensic Live Forensic

##plugins.themes.academic_pro.article.details##

How to Cite
Nurbek Nasrullayev, Homidov Qudratillo Hamza ugli, Tuyboyov Oybek Valijonovich, & Djurayev Musurmon Avlakulovich. (2023). Static and Live Digital Forensics, along with practical examples of tools used for each approach. Texas Journal of Engineering and Technology, 19, 21–27. Retrieved from https://zienjournals.com/index.php/tjet/article/view/3740

References

  1. Rajaboevich, G. S., Baxtiyarovich, N. N., & Salimovna, F. D. (2020, November). Methods and intelligent mechanisms for constructing cyberattack detection components on distance-learning systems. In 2020 International Conference on Information Science and Communications Technologies (ICISCT) (pp. 1-6). IEEE.
  2. Bakhodir, Y., Nurbek, N., & Odiljon, Z. (2019). Methods for applying of scheme of packet filtering rules. International Journal of Innovative Technology and Exploring Engineering, 8(11), 1014-1019.
  3. Gulomov, S. R., & Bakhtiyorovich, N. N. (2016, November). Method for security monitoring and special filtering traffic mode in info communication systems. In 2016 International Conference on Information Science and Communications Technologies (ICISCT) (pp. 1-6). IEEE.
  4. Malikovich, K. M., Rajaboevich, G. S., & Karamatovich, Y. B. (2019, November). Method of constucting packet filtering rules. In 2019 International Conference on Information Science and Communications Technologies (ICISCT) (pp. 1-4). IEEE.
  5. Насруллаев, Н. Б., & Файзиева, Д. С. (2020). Анализ средств службы информационной безопасности в дистанционном обучении. Молодой ученый, (31), 14-18.
  6. Baxtiyorovich, N. N., & Ubaydullaevna, H. I. (2019, November). Method of analyzing of antivirus errors when audit provides. In 2019 International Conference on Information Science and Communications Technologies (ICISCT) (pp. 1-3). IEEE.
  7. Komil, T., & Nurbek, N. (2015). Development method of code detection system on based racewalk algorithm on platform FPGA. In Proceedings of International Conference on Application of Information and Communication Technology and Statistics in Economy and Education (ICAICTSEE) (p. 278). International Conference on Application of Information and Communication Technology and Statistics and Economy and Education (ICAICTSEE).
  8. Safoev, N., & Nasrullaev, N. (2021, November). Low area QCA Demultiplexer Design. In 2021 International Conference on Information Science and Communications Technologies (ICISCT) (pp. 01-05). IEEE.
  9. Yakubdjanovna, I. D., Bakhtiyarovich, N. N., & lqbol Ubaydullayevna, X. (2020, November). Implementation of intercorporate correlation of information security messages and audits. In 2020 International Conference on Information Science and Communications Technologies (ICISCT) (pp. 1-4). IEEE.
  10. Cohen, M. I., Bilby, D., & Caronni, G. (2011). Distributed forensics and incident response in the enterprise. digital investigation, 8, S101-S110.
  11. Mrdovic, S., Huseinovic, A., & Zajko, E. (2009, October). Combining static and live digital forensic analysis in virtual environment. In 2009 XXII International Symposium on Information, Communication and Automation Technologies (pp. 1-6). IEEE.
  12. Hay, B., Bishop, M., & Nance, K. (2009). Live analysis: Progress and challenges. IEEE Security & Privacy, 7(2), 30-37.
  13. Wang, L., Zhang, R., & Zhang, S. (2009, December). A model of computer live forensics based on physical memory analysis. In 2009 First International Conference on Information Science and Engineering (pp. 4647-4649). IEEE.
  14. Alazab, M., Venkatraman, S., & Watters, P. (2009, June). Digital forensic techniques for static analysis of NTFS images. In Proceedings of ICIT2009, Fourth International Conference on Information Technology, IEEE Xplore.
  15. Sherzod Rajaboevich, G., Dilmurod Gulamovich, A., & Nurbek Bakhtiyorovich, N. (2019). Method for determination of the probabilities of functioning states of information of protection on cloud computing. International Journal of Mechanical Engineering and Technology, 10(3).
  16. Shakarov, M., Safoev, N., & Nasrullaev, N. (2022). Обеспечение безопасности интернет вещей в промышленности 4.0 с использованием WAF. Research and Education, 1(9), 386-393.
  17. Насруллаев, Н., Муминова, С., Сейдуллаев, М., & Сафоев, Н. (2022). Внедрение DMZ для повышения сетевой безопасности веб-тестирования. Scientific Collection «InterConf», (110), 641-649.
  18. Rajaboevich, G. S., Baxtiyorovich, N. N., & Komilovich, T. S. (2021, November). A model for preventing malicious traffic in DNS servers using machine learning. In 2021 International Conference on Information Science and Communications Technologies (ICISCT) (pp. 1-4). IEEE.