UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 3 | March 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 6 Issue 2
February-2019
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIRFH06169


Registration ID:
318686

Page Number

1005-1010

Share This Article


Jetir RMS

Title

Memory Forensics and Cyber Threat Analysis: A Review

Abstract

Computers are becoming more widely used in today's culture. Assaults against military data centres, power grids, and proprietary information by commercial or governmental organizations are becoming more common. These kinds of assaults, as well as a variety of other computer-related events, need cyber security specialists to be able to recognize, react to, and report them. If real evidence has never been transferred to storage media, there seems to be no way to rely on disk forensics. On the other hand, even if destructive code from an infection is never transmitted to storage medium such as a hard drive, memory has a high chance of carrying it, partially or completely. Memory forensics can often recover passwords and encryption keys, as well as plain-text information from documents before they are encrypted, providing information that may be used to assess the scope of an attack. OS memory forensics includes Linux memory forensics as a major emphasis area. Businesses and government organizations are among the most passionate Linux users. Linux contains many security vulnerabilities. Memory forensics on Linux systems and advanced data analysis using machine learning should be the focus of research, since both will be very helpful to the Linux cyberspace society. As a result, research is needed to create tools and theories to enhance the security of the operating system, resulting in user cyber protection.

Key Words

Cyber Threat Analysis, Forensic Process, Linux Forensic, Memory Forensic, Windows Forensic.

Cite This Article

"Memory Forensics and Cyber Threat Analysis: A Review", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.6, Issue 2, page no.1005-1010, February-2019, Available :http://www.jetir.org/papers/JETIRFH06169.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"Memory Forensics and Cyber Threat Analysis: A Review", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.6, Issue 2, page no. pp1005-1010, February-2019, Available at : http://www.jetir.org/papers/JETIRFH06169.pdf

Publication Details

Published Paper ID: JETIRFH06169
Registration ID: 318686
Published In: Volume 6 | Issue 2 | Year February-2019
DOI (Digital Object Identifier):
Page No: 1005-1010
Country: -, -, India .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

000319

Print This Page

Current Call For Paper

Jetir RMS