Difference between revisions of "Fall 2025: Cyber Forensics"

From MKWiki
Jump to navigation Jump to search
 
(22 intermediate revisions by the same user not shown)
Line 6: Line 6:
  
 
== Course Overview ==
 
== Course Overview ==
* As per the Delhi University Course Guidelines
+
* As per the Delhi University Course [https://cs.du.ac.in/uploads/syllabus/NEP/pdfs2022/DSE/Cyber_Forensics.pdf Syllabus/Guidelines]
  
 
== Lectures ==
 
== Lectures ==
Line 18: Line 18:
 
| style="width: 12%; " |  Unit-1  
 
| style="width: 12%; " |  Unit-1  
 
| style="width: 60%" |  '''''Digital Forensics:''''':  
 
| style="width: 60%" |  '''''Digital Forensics:''''':  
| style="width: 15%" | [http://mkbhandari.com/mkwiki/data/spring2023/DM/1Intro.pdf '''1Intro.pdf''']   
+
| style="width: 15%" | [unit1.pdf]   
 
| Chapter 1 (CB1)
 
| Chapter 1 (CB1)
 
|-
 
|-
 
| Unit 2  
 
| Unit 2  
 
|  '''''Windows OS Forensics:'''''
 
|  '''''Windows OS Forensics:'''''
|  [http://mkbhandari.com/mkwiki/data/spring2023/DM/2DMT.pdf '''2DMT.pdf''']
+
|  [unit2.pdf]  
 
| Chapter 2 (CB1)
 
| Chapter 2 (CB1)
 
|-
 
|-
 
| Unit 3  
 
| Unit 3  
 
|  '''''Evidence Recovery:'''''
 
|  '''''Evidence Recovery:'''''
|  [http://mkbhandari.com/mkwiki/data/spring2023/DM/3AR.pdf '''3AR.pdf''']   
+
|  [unit3.pdf]   
 
| Chapter 6 (CB1)
 
| Chapter 6 (CB1)
 
|-
 
|-
 
| Unit 4
 
| Unit 4
 
|  '''''Investigation:'''''  
 
|  '''''Investigation:'''''  
|  [http://mkbhandari.com/mkwiki/data/spring2023/DM/4CL.pdf '''4Classification.pdf''']
+
|  [unit4.pdf]  
 
| Chapter 4 (CB1)
 
| Chapter 4 (CB1)
 
|-
 
|-
 
| Unit 5
 
| Unit 5
 
|  '''''Cyber Crimes and Cyber Laws:'''''  
 
|  '''''Cyber Crimes and Cyber Laws:'''''  
| [https://www-users.cse.umn.edu/~kumar001/dmbook/index.php#item4 Read from Authors' web page]   
+
| [unit5.pdf]   
 
| Chapter 5 (CB1)
 
| Chapter 5 (CB1)
 
|}
 
|}
Line 50: Line 50:
 
* '''Test 1''' :
 
* '''Test 1''' :
 
* '''Test 2''' :
 
* '''Test 2''' :
 +
 +
==Labs==
 +
 +
'''Instructions'''
 +
* Please be on time to avoid the '''Attendance Penalty'''.
 +
* Please put your mobile phone on '''Silent Mode'''.
 +
* Each lab assignment needs to be submitted in the '''Google Classroom''' for evaluation(will be notified in the GC lab-wise, submit before the deadline).
 +
* Turn off'''(shut down) your assigned computer and arrange the chair''' before you leave the lab.
 +
 +
== Lab 1: ( week of 18<sup>th</sup> August 2025 ) ==
 +
{| class="wikitable" style="text-align: justify;
 +
|-
 +
! Task. No. 
 +
! Task
 +
! Assessment Period
 +
! Submission Deadline
 +
|-
 +
| style="width: 8%"  | 1
 +
| style="width: 60%" | Study of Network related Commands (Linux)
 +
* Network Discovery: - '''''Ping, Traceroute/Tracepath, Nmap, MTR'''''
 +
* Traffic Analysis: - '''''Tcpdump, Iftop/Bmon, Iperf'''''
 +
* DNS/Domain Forensics: - '''''Dig, Nslookup, Whois, Host'''''
 +
* Host configuration:- '''''Ifconfig/Ip, SS/Netstat, Ethtool, Hostname'''''
 +
* Address/Routing Analysis: - '''''ARP, Route, Iproute2'''''
 +
* Data Transfer/File Retrieval: - '''''wget, curl'''''
 +
| style="width: 15%" |  18/08/2025 - 25/08/2025
 +
|  26/08/2025
 +
|}
  
 
== Resources ==
 
== Resources ==
* '''R1''': Data Mining: Concepts and Techniques, 3nd edition,Jiawei Han and Micheline Kamber. <br>
+
'''References:'''
* '''R2''': Data Mining: A Tutorial Based Primer, Richard Roiger, Michael Geatz, Pearson Education 2003. <br>
+
* '''R1''': Marjee T. Britz, Computer Forensics and Cyber Crime: An Introduction, Pearson Education, 2013. <br>
* '''R3''': Introduction to Data Mining with Case Studies, G.K. Gupta, PHI 2006. <br>
+
* '''R2''': C. Altheide & H. Carvey Digital Forensics with Open Source Tools, Syngress, 2011. <br>
* '''R4''': Insight into Data mining: Theory and Practice, Soman K. P., DiwakarShyam, Ajay V., PHI 2006
+
 
 +
'''Additional References:'''
 +
# Computer Forensics: Investigating Network Intrusions and Cybercrime" by Cameron H. Malin, Eoghan Casey, and James M. Aquilina
 +
# Online Course management System: https://esu.desire2learn.com/
 +
# Computer Forensics, Computer Crime Investigation by John R,Vacca, Firewall Media, New Delhi.
 +
# Computer Forensics and Investigations by Nelson, Phillips Enfinger, Steuart,CENGAGE Learning
 +
# Real Digital Forensics by Keith j.Jones, Richard Bejitlich,Curtis W.Rose, AddisonWesley Pearson Education

Latest revision as of 23:17, 25 August 2025

Logistics

  • Class Timings: Tuesdays and Thursdays 2:30 pm - 3:30 pm, Fridays 12:30 pm - 1:30 pm
  • Classroom: Tue and Thu: R2; Fri: CL-4
  • Lab Timings: Mondays 3:30 pm - 5:30 pm
  • Labs: CS Lab 5

Course Overview

Lectures

Lecture Topic Lecture Slides Readings
Unit-1 Digital Forensics:: [unit1.pdf] Chapter 1 (CB1)
Unit 2 Windows OS Forensics: [unit2.pdf] Chapter 2 (CB1)
Unit 3 Evidence Recovery: [unit3.pdf] Chapter 6 (CB1)
Unit 4 Investigation: [unit4.pdf] Chapter 4 (CB1)
Unit 5 Cyber Crimes and Cyber Laws: [unit5.pdf] Chapter 5 (CB1)

Assignments and Tests

Class Assignments

  • Assignment No. 1,
  • Assignment No. 2,

Tests and Quizzes

  • Test 1 :
  • Test 2 :

Labs

Instructions

  • Please be on time to avoid the Attendance Penalty.
  • Please put your mobile phone on Silent Mode.
  • Each lab assignment needs to be submitted in the Google Classroom for evaluation(will be notified in the GC lab-wise, submit before the deadline).
  • Turn off(shut down) your assigned computer and arrange the chair before you leave the lab.

Lab 1: ( week of 18th August 2025 )

Task. No. Task Assessment Period Submission Deadline
1 Study of Network related Commands (Linux)
  • Network Discovery: - Ping, Traceroute/Tracepath, Nmap, MTR
  • Traffic Analysis: - Tcpdump, Iftop/Bmon, Iperf
  • DNS/Domain Forensics: - Dig, Nslookup, Whois, Host
  • Host configuration:- Ifconfig/Ip, SS/Netstat, Ethtool, Hostname
  • Address/Routing Analysis: - ARP, Route, Iproute2
  • Data Transfer/File Retrieval: - wget, curl
18/08/2025 - 25/08/2025 26/08/2025

Resources

References:

  • R1: Marjee T. Britz, Computer Forensics and Cyber Crime: An Introduction, Pearson Education, 2013.
  • R2: C. Altheide & H. Carvey Digital Forensics with Open Source Tools, Syngress, 2011.

Additional References:

  1. Computer Forensics: Investigating Network Intrusions and Cybercrime" by Cameron H. Malin, Eoghan Casey, and James M. Aquilina
  2. Online Course management System: https://esu.desire2learn.com/
  3. Computer Forensics, Computer Crime Investigation by John R,Vacca, Firewall Media, New Delhi.
  4. Computer Forensics and Investigations by Nelson, Phillips Enfinger, Steuart,CENGAGE Learning
  5. Real Digital Forensics by Keith j.Jones, Richard Bejitlich,Curtis W.Rose, AddisonWesley Pearson Education