International Journal for Electronic Crime Investigation http://ijeci.lgu.edu.pk/index.php/ijeci <p>IJECI is an open access, peer reviewed quarterly Journal published by LGU Society of<br>Computer Sciences. The Journal publishes original research articles and high quality<br>review papers covering all aspects of Computer Science and Technology.</p> <p>The following note set out some general editorial principles. A more detailed style docu-<br>ment can be download at www.research.lgu.edu.pk is available. All queries regarding</p> <p>publications should be addressed to editor at email IJECI@lgu.edu.pk. The document<br>must be in word format, other format like pdf or any other shall not be accepted.<br>The format of paper should be as follows:<br>• Title of the study (center aligned, font size 14)<br>• Full name of author(s) (center aligned, font size 10)<br>• Name of Department<br>• Name of Institution<br>• Corresponding author email address.<br>• Abstract<br>• Keywords<br>• Introduction<br>• Literature Review<br>• Theoretical Model/Framework and Methodology<br>• Data analysis/Implementation/Simulation<br>• Results/ Discussion and Conclusion<br>• References.<br>Heading and sub-heading should be differentiated by numbering sequences like, 1.<br>HEADING (Bold, Capitals) 1.1 Subheading (Italic, bold) etc. The article must be typed in<br>Times New Roman with 12 font size 1.5 space, and should have margin 1 inches on the<br>left and right. Length of paper should not be longer than 15 pages, including figures,<br>tables, exhibits and bibliography. Table must have standard caption at the top while<br>figures below with. Figure and table should be in continues numbering. Citation must be<br>in according to the IEEE 2006 style</p> en-US Wed, 13 Mar 2024 00:00:00 +0500 OJS 3.1.2.4 http://blogs.law.harvard.edu/tech/rss 60 A Comprehensive Study for Malware Detection through Machine Learning in Executable Files http://ijeci.lgu.edu.pk/index.php/ijeci/article/view/185 <p>Two methods are frequently used to analyze malware and start specimens: static analysis and <br>dynamic analysis. Following analysis, distinct characteristics are retrieved to distinguish malware <br>from benign samples. The detection capacity of malware is contingent upon the effectiveness with <br>which discriminative malware characteristics are retrieved through analysis methods. While <br>conventional approaches and techniques were used inadvertently, machine learning algorithms are <br>now utilized to classify malware, which can deal with the complexity and velocity of malware <br>creation. However, even though a few research papers have been published, recent classifications of <br>signature, behavioral and hybrid machine learning is not introduced well. Based on this demand, we <br>provide a comprehensive analysis of malware detection using machine learning, as well as address <br>the different difficulties associated with building the malware classifier. Finally, future work is <br>addressed to build an effective malware detection system by addressing different malware detection <br>problems.</p> Zohaib Ahmad Copyright (c) 2024 http://ijeci.lgu.edu.pk/index.php/ijeci/article/view/185 Wed, 13 Mar 2024 00:00:00 +0500 Online shopping, Cyber frauds and Fraud prevention Strategies http://ijeci.lgu.edu.pk/index.php/ijeci/article/view/186 <p>Online shopping is increasingly being targeted by hackers and cyber criminals, who exploit the <br>anonymity of the internet to deceive unsuspecting shoppers. These scams involve fake websites or <br>ads, posing as legitimate sellers, damaging innocent citizens' bank accounts and databases, and <br>causing damage to customers. Online shopping fraud involves using stolen credit or debit cards for <br>purchases, while identity theft involves stealing personal information for fraudulent purposes like <br>credit or illegal purchases. We discuss, the safety tips to avoid online shopping scams, using these <br>safety tips before making a purchase. In United states a government agency FTC has been entrusted <br>the task of implementation the civil law related to anti-trust; it also indorses and promotes the <br>protection of consumers rights while working with Justice Department. Online shopping scams were <br>the second most common fraud category in 2021, according to the FTC. To avoid them, use safety <br>tips to identify and avoid scams. Cybercriminals steal and can use personal information to make <br>unauthorized purchases or engage in fraudulent activities. Identity theft is a crime involving capturing and the misuse of another's personal identifying information like Id-card, credit card and bank <br>account information. Fraudsters often use stolen credit cards to purchase items, return them for <br>refunds, and then sell the refunded money or goods. Machine learning is a rapidly evolving technology that can significantly enhance online shopping security and user awareness which is coupled <br>with artificial intelligence<br><br></p> Aftab Ahmad Malik Copyright (c) 2024 http://ijeci.lgu.edu.pk/index.php/ijeci/article/view/186 Wed, 13 Mar 2024 00:00:00 +0500 IoT Malware: A Comprehensive Survey of Threats, Vulnerabilities, and Mitigation Strategies http://ijeci.lgu.edu.pk/index.php/ijeci/article/view/187 <p>The proliferation of the Internet of Things (IoT) has ushered in a new era of connectivity and <br>convenience, linking a vast array of devices from household appliances to industrial machinery. <br>However, this interconnectivity also introduces significant security vulnerabilities, making IoT <br>systems attractive targets for malicious actors. This comprehensive survey delves into the multifaceted world of IoT malware, exploring the evolving landscape of threats that plague these systems. <br>We methodically analyze various types of IoT malware, identifying common attack vectors and the <br>intrinsic vulnerabilities that IoT devices often possess. These vulnerabilities range from inadequate <br>security protocols to the use of default credentials and unpatched software. Furthermore, the paper <br>highlights real-world instances where IoT devices have been compromised, leading to significant <br>disruptions and breaches of privacy. In addressing these challenges, we outline an array of mitigation strategies. These strategies include but are not limited to, enhanced encryption methods, regular <br>firmware updates, network segmentation, and the adoption of robust authentication mechanisms. <br>We also discuss the role of machine learning and artificial intelligence in predicting and preventing <br>IoT malware attacks. Moreover, our survey extends to the regulatory and ethical considerations <br>surrounding IoT security, advocating for a more proactive approach in standard-setting and compliance enforcement. The findings of this study aim to serve as a foundational resource for researchers, <br>cybersecurity professionals, and policymakers, emphasizing the need for a collective and informed <br>effort in fortifying the IoT ecosystem against the ever-growing threat of malware.</p> Muhammad Shairoze Malik Copyright (c) 2024 http://ijeci.lgu.edu.pk/index.php/ijeci/article/view/187 Wed, 13 Mar 2024 00:00:00 +0500 Enhancement of Security and Privacy of Smart Contracts in Blockchain http://ijeci.lgu.edu.pk/index.php/ijeci/article/view/188 <p>Smart contracts, leveraging the power of blockchain technology, have revolutionized the execution <br>and enforcement of agreements. However, their adoption also brings forth substantial challenges in <br>terms of security and privacy. This research paper aims to identify the recent areas of focus and <br>provide a comprehensive perspective on blockchain applications and smart contracts, highlighting <br>their main issues and corresponding solutions. Furthermore, it seeks to address the gaps in current <br>research and outline future avenues of investigation. The primary objective is to assess the security <br>and privacy concerns associated with smart contracts in blockchain and propose effective measures <br>to enhance their robustness. By conducting a thorough analysis of vulnerabilities, attack vectors, and <br>privacy considerations, this study offers valuable insights into the risks involved in smart contracts. <br>It also puts forth practical solutions and best practices to mitigate these risks, ensuring a more secure <br>and privacy-preserving environment for the deployment and execution of smart contracts. <br><br></p> Syed Khurram Hassan Copyright (c) 2024 http://ijeci.lgu.edu.pk/index.php/ijeci/article/view/188 Wed, 13 Mar 2024 00:00:00 +0500 Digital Investigations: Navigating Challenges in Tool Selection for Operating System Forensics http://ijeci.lgu.edu.pk/index.php/ijeci/article/view/189 <p>The process of gathering, identifying, extracting, and documenting electronic evidence for use in <br>court is known as "digital forensics." We have a lot of tools at our disposal to make this procedure <br>quick and straightforward. Four tools have been selected for investigation and analysis in this work. <br>For every kind of digital forensics, the top tools have been selected based on several criteria. For <br>computer forensic tools, (Stellar and Forensic Tool Kit) have been investigated; for network forensic <br>tools, Network Map has been selected, and OSF mount has been examined as a live forensic tool. <br>Other forensic tool types, such as database, operating system, and mail forensic tools, are also <br>covered in this work. The role of Artificial intelligence in Digital Forensic tools has been discussed <br>in this paper by using both Decision Stump and Bayes net machine learning techniques. After <br>making an investigation of the IoT device traffic dataset using these two techniques, Decision Stump <br>gives us less accurate results compared with Bayes net.<br><br></p> Kausar Parveen Copyright (c) 2024 http://ijeci.lgu.edu.pk/index.php/ijeci/article/view/189 Wed, 13 Mar 2024 00:00:00 +0500 Role of Technology by Police to Maintain Peace During Muharram http://ijeci.lgu.edu.pk/index.php/ijeci/article/view/190 <p>Over the past several decades, policing agencies have implemented an array of technological advancements <br>to improve operational efficiency. Pakistan has increased security measures across the country for muharram <br>processions carried out for Ashura. Security has been enhanced across the country for the peaceful observance <br>of Ashura due to wave of religious terrorism from previous few decads. For this, a huge personnel of regular <br>police officers, along with an additional reserve officers, are deployed to guard mourning processions and <br>gatherings across the country and to keep the law and order situation under control. Role of police in providing peace during muharram is very significant. Police personel perform their duties for late nights with great <br>spirit during 1st week of Muharram under harsh weather (usually hot days), and danger of terrorism despite <br>limited resources. Good behavior, determination, dedication of police force during the muharram duties is <br>praise worthy and exemplary and it ensured maintenance of atmosphere of law and order work with diligence <br>and commitment. Police officers remain alert to counter any untoward incident and keep keen eye on sensitive <br>areas during Ashura. Police sealed many parts of inner as part of security for Ashura. They blocked roads and <br>streets leading to these places. cellular phone signals remained suspended as part of upgraded security. Checkpoints are kept functional across the country and additional security personnel is served during 9th and10th <br>muharram. District police personnel, bomb disposal units, Scouts, platoons of Constabulary and soldiers are <br>deployed to protect processions and sacred places and authorities took extraordinary measures to confirm the <br>security of people and religious gatherings during Ashura. Police installed closed circuit television cameras <br>(CCTV) along the procession routes. Police champions bear tough circumstances and nothing can down the <br>determination of the of Police force. We hope that the law enforcement agencies would continue to perform <br>their duties in the same way to ensure the protection of life and property of the citizens across the country<br><br></p> Gulam Rasul Zahid Copyright (c) 2024 http://ijeci.lgu.edu.pk/index.php/ijeci/article/view/190 Wed, 13 Mar 2024 00:00:00 +0500 Malware Detection and Analysis Using Reverse Engineering http://ijeci.lgu.edu.pk/index.php/ijeci/article/view/191 <p>The pervasive and persistent nature of malware in the contemporary digital realm demands sophisticated methodologies for detection and analysis. Reverse engineering has emerged as a pivotal strategy in malware analysis, offering the means to unravel the intricate workings of malicious code. This <br>research paper presents a comprehensive exploration of the role of reverse engineering in the <br>domain of malware detection and analysis. It delves into the fundamental stages of the reverse <br>engineering process, encompassing code disassembly, static analysis, and dynamic analysis. Additionally, reverse engineering facilitates meticulous analysis of malware, encompassing intricate <br>examination of its structural attributes, operational mechanisms, and behavioral characteristics. <br>However, the landscape of reverse engineering is not devoid of challenges. Malware authors employ <br>sophisticated obfuscation techniques and antianalysis mechanisms to impede reverse engineering <br>endeavors. These measures encompass code encryption, packing, anti-debugging, and anti-virtualization strategies. By providing a comprehensive examination of the important role of reverse <br>engineering in malware detection and analysis, this research paper will elucidate an extensive array <br>of tools and methodologies.<br><br></p> Muhammad Taseer Suleman Copyright (c) 2024 http://ijeci.lgu.edu.pk/index.php/ijeci/article/view/191 Wed, 13 Mar 2024 00:00:00 +0500