SSL based Webmail Forensic Engine
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2017, Vol 8, Issue 1
Abstract
In this era of information technology, email applications are the foremost and extensively used electronic communication technology. Emails are profusely used to exchange data and information using several frontend applications from various service providers by its users. Currently most of the email clients and service providers now moved to secured data communications using SSL or TLS security for their data exchanged. Cyber criminals and terrorists have started by means of this mode for exchanging their malicious information in their transactions. Forensic experts have to face greater difficulty and multiple challenges in tracing crucial forensic information from network packets as the communication is secured. These challenges might affect the digital forensic experts in procuring substantial evidences against such criminals from their working environments. This research work revels working background of SSL based webmail forensic engine, which decrypt respective communication or network session and also reconstruct the actual message contents of webmail applications. This digital forensic engine is compatible to work with in proxy servers and other computing environments and enables forensic reconstruction followed by analysis of webmail clients. Proposed forensic engine employs is a high-speed packet capturing hardware module, a sophisticated packet reformation algorithm; restores email header and messages from encrypted stream of SMTP and POP3 network sessions. Proposed forensic engine also support cyber investigation team with generated forensic report and prosecution of culprits by judiciary system of the specific country.
Authors and Affiliations
Manesh T, Abdalla A Alameen, Mohemmed Sha M, Mohamed Mustaq Ahmed A, Mohamed Yacoab M. Y. , Bhadran V K, Abraham Varghese
Comparison of Digital Signature Algorithm and Authentication Schemes for H.264 Compressed Video
In this paper we present the advantages of the elliptic curve cryptography for the implementations of the electronic signature algorithms “elliptic curve digital signature algorithm, ECDSA”, compared with “the digital si...
Implication of Genetic Algorithm in Cryptography to Enhance Security
In today’s age of information technology secure transmission of information is a big challenge. Symmetric and asymmetric cryptosystems are not appropriate for high level of security. Modern hash function based systems ar...
Predicting Return Donor and Analyzing Blood Donation Time Series using Data Mining Techniques
Since blood centers in most countries typically rely on volunteer donors to meet the hospitals' needs, donor retention is critical for blood banks. Identifying regular donors is critical for the advance planning of blood...
Stemmer Impact on Quranic Mobile Information Retrieval Performance
Stemming algorithms are employed in information retrieval (IR) to reduce verity variants of the same word with several endings to a standard stem. Stemmers can also help IR systems by unifying vocabulary, reducing term v...
Simulated Annealing with Levy Distribution for Fast Matrix Factorization-Based Collaborative Filtering
Matrix factorization is one of the best approaches for collaborative filtering because of its high accuracy in presenting users and items latent factors. The main disadvantages of matrix factorization are its complexity,...