International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020


IJSTR >> Volume 2- Issue 11, November 2013 Edition

International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616

A Survey On Various Methods To Detect Forgery And Computer Crime In Transaction Database

[Full Text]



Pratik Patel, Shailendra Mishra



Index Terms: Computer forensics, Digital forensics, Evidence, FAT file system, Forensic tools, NTFS file system, $Log file.



Abstract: A computer forensic method can be used for detecting the different types of forgeries and computer crime. Forgeries and computer crime are the most major concern of the digital world. Lots of techniques and methods have been used to find a proper solution to these problems. Nowadays, digital forensics are an important topic for research articles. In this paper a general survey has been carried out for different methods used in computer forensics to track the evidences which can be useful for detecting the computer crime and forgery. Forensic tools can be used for making any changes to data or tampering of data. Different rules sets or methods are defined to detect the various errors regarding the changes and the tampering of the data in different windows file system. Digital evidence can also be used to detect forgery or computer crime.



[1] http://en.wikipedia.org/wiki/Digital_forensics

[2] http://en.wikipedia.org/wiki/Digital_evidence

[3] Brian Carrier, “Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers” International Journal of Digital Evidence (2003) pp.1-12.

[4] Simson L. Garfinkel, “Digital forensics research: The next 10 years”, Digital Investigation 7(2010) S64-s73.