Techniques and Tools For Forensic Investigation of
Techniques and Tools For Forensic Investigation of
net/publication/227859112
Article in International Journal of Network Security & Its Applications · November 2011
DOI: 10.5121/ijnsa.2011.3617
CITATIONS READS
18 15,472
1 author:
M. Tariq Banday
University of Kashmir
126 PUBLICATIONS 286 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
Book captioned "Cryptographic Security Solutions for the Internet of Things" to be published by IGI Global, USA View project
All content following this page was uploaded by M. Tariq Banday on 19 December 2013.
M. Tariq Banday
P. G. Department of Electronics and Instrumentation Technology
University of Kashmir, Srinagar - 6, India
sgrmtb@yahoo.com
ABSTRACT
E-mail has emerged as the most important application on Internet for communication of messages,
delivery of documents and carrying out of transactions and is used not only from computers but many
other electronic gadgets like mobile phones. Over a period of year’s e-mail protocols have been secured
through several security extensions and producers, however, cybercriminals continue to misuse it for
illegitimate purposes by sending spam, phishing e-mails, distributing child pornography, and hate e-
mails besides propagating viruses, worms, hoaxes and Trojan horses. Further, Internet infrastructure
misuse through denial of service, waste of storage space and computational resources are costing every
Internet user directly or indirectly. It is thus essential to identify and eliminate users and machines
misusing e-mail service. E-mail forensic analysis is used to study the source and content of e-mail
message as evidence, identifying the actual sender, recipient and date and time it was sent, etc. to collect
credible evidence to bring criminals to justice. This paper is an attempt to illustrate e-mail architecture
from forensics perspective. It describes roles and responsibilities of different e-mail actors and
components, itemizes meta-data contained in e-mail headers, and lists protocols and ports used in it. It
further describes various tools and techniques currently employed to carry out forensic investigation of
an e-mail message.
KEYWORDS
E-mail Forensics; E-mail Headers; E-mail Security; Header Analysis; E-mail Architecture
1. INTRODUCTION
E-mail system comprises of various hardware and software components that include sender’s
client and server computers and receiver’s client and server computers with required software
and services installed on each. Besides these, it uses various systems and services of the
Internet. The sending and receiving servers are always connected to the Internet but the sender’s
and receiver’s client connects to the Internet as and when required.
An e-mail communication between a sender ‘Alice’ having e-mail address ‘alice@a.com’ and
recipient ‘Bob’ having e-mail address ‘bob@b.com’ is shown in figure 1.
‘Alice’ composes an e-mail message on her computer called client for ‘Bob’ and sends it to her
sending server ‘smtp.a.org’ using SMTP protocol. Sending server performs a lookup for the mail
exchange record of receiving server ‘b.org’ through Domain Name System (DNS) protocol on
DNS server [1] ‘dns.b.org’. The DNS server responds with the highest priority mail exchange
server ‘mx.b.org’ for the domain ‘b.org’. Sending server establishes SMTP connection with the
receiving server and delivers the e-mail message to the mailbox of ‘Bob’ on the receiving
server. ‘Bob’ downloads the message from his mailbox on receiving server to local mailbox on
his client computer using POP3 [2] or IMAP [3] protocols. Optionally, ‘Bob’ can also read the
message stored in his server mailbox without downloading it to the local mailbox by using a
Webmail program.
All types of Mediator user actors set HELO/EHLO, ENVID, RcptTo and Received fields. Alias
actors also typically change To/CC/BCC and MailFrom fields. Identities relevant to ReSender
are: From, Reply-To, Sender, To/CC/BCC, Resent-From, Resent-Sender, Resent-To/CC/BCC
and MailFrom fields. Identities relevant to Mailing List processor are: List-Id, List-*, From,
Reply-To, Sender, To/CC and MailFrom fields. Identities relevant to Gateways are: From,
Reply-To, Sender, To/CC/BCC and MailFrom fileds.
Message Handling Service (MHS) Actors are responsible for end-to-end transfer of messages.
These Actors can generate, modify or look at only transfer data in the message. MHS Actors can
be of following four types (Table 2):
MHS Actor Type Roles and Responsibilities
It ensures that a message is valid for posting and then submits it to a Relay
It is responsible for the functions of the Mail Submission Agent.
It also performs any post-submission that pertain to sending error and delivery
Originator
notice.
The Author creates the message, but the Originator handles any transmission
issues with it
It performs MHS-level transfer-service routing and store-and-forward
function by transmitting or retransmitting the message to its Recipients.
It adds trace information but does not modify the envelope information or the
semantics of message content.
Relay It can modify message content representation, such as changing the form of
transfer encoding from binary to text, but only (as required) to meet the
capabilities of the next hop in the MHS.
When a Relay stops attempting to transfer a message, it becomes an Author
because it sends an error message to the Return Address.
It connects heterogeneous mail services despite differences in their syntax and
semantics.
Gateway It can send a useful message to a Recipient on the other side, without
requiring changes to any components in the Author's or Recipient's mail
services.
It performs final delivery or sends the message to an alternate address.
Receiver It can also perform filtering and other policy enforcement immediately before
or after delivery.
229
International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011
The mail-level transit service is different from packet-level switching. End-to-end packet
transfers usually go through intermediate routers; e-mail exchange across the open Internet can
be directly between the Boundary MTAs of Edge ADMDs. Edge networks can use proprietary
email standards internally. Common examples of ADMDs are: Enterprise Service Providers,
Internet Service Providers (ISP) and E-mail Service Providers.
3. E-MAIL ARCHITECTURE
E-mail system is an integration of several hardware and software components, services and
protocols which provide interoperability between its users and among the components along the
path of transfer. The e-mail architecture shown in figure 2 below specifies the relationship
between its logical components for creation, submission, transmission, delivery and reading
processes of an e-mail message.
Several communicating entities called e-mail nodes which are essentially software units
working on application layer of TCP/IP model are involved in the process of e-mail delivery.
Nodes working on lower layers such as routers and bridges represent options to send e-mail
without using SMTP are not considered in this architecture because almost all e-mail
communication uses SMTP directly or indirectly. Further, proprietary nodes used for internal
deliveries at sending and receiving servers are also not considered in this architecture.
Message/Mail User Agent (MUA): It works for user actors and applications as their
representative within e-mail service. A MUA that works on behalf of Author is called Author
MUA (aMUA) and the one that works on behalf of Receiver is called Receiver MUA (rMUA).
aMUA creates messages and performs initial submission via Mail Submission Agent (MSA).
Besides this, it can also perform creation and posting time archiving in its Message Store. rMUA
processes received mail that includes generation of user level disposition control messages,
displaying and disposing of the received message and closing or expanding the user
communication loop by initiating replies and forwarding new messages. A Mediator performs
message re-posting and as such it is a special MUA. For bulk sending services and automatic
responder (serving out of office notifications), MUA can be automated. The identity fields
relevant to MUA are: From, Reply-To, Sender, To, CC and BCC.
All Mail User Agent (MUA) nodes are software packages that run on client computers and allow
end users to compose, create and read e-mail. Some MUAs may be used to send e-mail to the
receiving MTAs directly or indirectly. ‘Microsoft Outlook’, ‘Microsoft Outlook Express’, ‘Lotus
Notes’, ‘Netscape communicator’, ‘Qualcomm Eudora’, ‘KDE KMail’, ‘Apple Mail’, and
‘Mozilla Thunderbird’ are examples of MUAs. Several Web-based e-mail programs and
services (known as Webmail) such as ‘AIM Mail’, ‘Yahoo Mail’, ‘Gmail’, and ‘Hotmail’ which
integrate e-mail clients and servers behind a Web server are also used as MUAs.
Message/Mail Store (MS): It serves as a long term message store for MUA which can be
located on a remote server or on the machine running MUA. Messages can be organized in a MS
in different ways. The MUA accesses the MS either by a local mechanism or by using POP or
IMAP.
Message/Mail Submission Agent (MSA): Mail Submission Agent (MSA) accepts the message
submitted by the aMUA for posting. It enforces the policies of the hosting ADMD and the
requirements of Internet standards before posting the message from an Authors environment to
the MHS. These include adding header fields such as Date and Message-ID and expanding an
address to its formal Internet Mail Format (IMF) representation. The hMSA is responsible for
transiting the message to MTA. The identity fields relevant to MSA are: HELO/EHLO, ENVID,
MailFrom, RcptTo, Received, and SourceAddr. The responsibilities of MUA and MSA may be
integrated in a single Agent.
Message/Mail Transfer Agent (MTA): A Message Transfer Agent (MTA) relays mail for one
application-level "hop". MTA nodes are in effect postal sorting agents that have the
responsibility of retrieving the relevant Mail eXchange (MX) record from the DNS Server for
each e-mail to be send and thus map the distinct e-mail addressee’s domain name with the
relevant IP address information. DNS is a distributed directory database that correlated domain
names to IP addresses. MTAs can also be used to compose and create e-mail messages.
‘Sendmail’, ‘Postfix’, ‘Exim’, and ‘Exchange Server’, are examples of MTAs. A receiving MTA
can also perform the operation of delivering e-mail message to the respective mailbox of the
receiver on the mail server and thus is also called Mail Delivery Agent (MDA). Unlike typical
packet switches (and Instant Messaging services), MTAs are expected to store messages in a
manner that allows recovery across service interruptions, such as host-system shutdown. The
offered degree of robustness and persistence by MTAs can vary. An MTA can perform well
established roles of Boundary MTAs (Onbound or Inbound) or Final MTAs. The identity fields
relevant to MTAs are: HELO/EHLO, ENVID, MailFrom, RcptTo, Received, and SourceAddr.
Message/Mail Delivery Agent (MDA): Both hMDA and rMDA are responsible for accepting the
message for delivery to distinct addresses. hMDA functions as a SMTP server engine and rMDA
performs the delivery action. The identity fields relevant to MDA are: Return-Path and
Received.
231
International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011
Relays: SMTP-Relays are the nodes that perform e-mail relaying. Relaying is the process of
receiving e-mail message from one SMTP e-mail node and forward it to another one. They are
like packet switches or IP routers and make routing assessments to move the message closer to
the Recipients. They also add trace information and have all roles of MTA’s.
Gateway: Gateway nodes are used to convert e-mail messages from one application layer
protocol to other. Gateway nodes named GWSMTP, B accept SMTP protocol based e-mails and
transfer them with protocols other that SMTP and GWA, SMTP performs the inverse process at
incoming and outgoing interfaces. Gateway nodes GWA,B do not use SMTP either for incoming
or outgoing interfaces. A process called Proxy may be done at these nodes when incoming and
outgoing interfaces use same protocols.
Web Server (WebServ): These nodes are the e-mail Web servers that provide the Web
environment to compose, send and read an e-mail message.
Mai Server (MailServ): They represent e-mail servers providing users mail access service using
IMAP or POP3 protocols. They can also provide an internal interface to a Web server for HTTP
based e-mail access.
The e-mail nodes establish connections with one or more nodes on specific ports for possible e-
mail flow between them using a particular protocol. SMTP is an application layer protocol for
TCP/IP based Internet infrastructure which sets conversational and grammatical rules for
exchanging e-mail between computers. The most commonly-used protocols for e-mail retrieval
by client programs are Post Office Protocol Version 3 (POP3) and Internet Message Access
Protocol (IMAP). Table 4, lists the protocols used in e-mail flow between two possible e-mail
nodes.
ESP specific protocols and procedures for internal e-mail delivery between
e-mail nodes.
232
International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011
All e-mail access protocols used to transfer e-mails from the recipient e-mail
server to MUA that include IMAP version 4 (RFC 1730), MAPI and POP
version 3 (RFC 1939).
For networks, a port means an endpoint to a logical connection. The port number identifies what
type (application/service offered) of port it is. The commonly used default port numbers used in
e-mail are shown in Table 5. A complete list of default port numbering assignment is given in
[5].
Port No Protocols/Services Description
Simple Mail Transfer Protocol - core Internet protocol
SMTP
25 used to transfer from client to server (MUA to MTA)
SMTP e-mail server
and server to server (MTA to MTA)
POP3 Post Office Protocol allows clients (MUA's) to retrieve
110
POP e-mail server stored e-mail
IMAP Internet Message Access Protocol provides a means of
143 IMAP(4) e-mail managing e-mail messages on a remote server and
server retrieve stored e-mail
SMTPS
WSMTP (SSMTP)
465 SMTP via SSL encrypted connection (Unofficial)
protocol over
TLS|SSL
IMAPS
993 IMAP via SSL encrypted connection
SSL encrypted IMAP
POP3S SPOP
995 POP via SSL encrypted connection
SSL encrypted POP
587 MSA Outgoing Mail (Submission)
80 HTTP Webmail
ENVID are message identifiers which respectively pertain to message content and transfer.
Message-ID is used for threading, aiding identification for duplications and DNS tracking. The
ENVelope Identifier (ENVID) is used for the purpose of message tracking. Message-ID and
ENVID are discussed further in the section 7.
E-mail message comprises of envelope that contains transit-handling information used by the
MHS and message content which consists of two parts namely Body and Header. The Body is
text but can also include multimedia elements in Hyper Text Markup Language (HTML) and
attachments encoded in Multi-Purpose Internet Mail Extensions (MIME) [6]. The Header is a
structured set of fields that include ‘From’, ‘To’, ‘Subject’, ‘Date’, ‘CC’, ‘BCC’, ‘Return-To’,
etc. Headers are included in the message by the sender or by a component of the e-mail system
and also contain transit-handling trace information. Further, the message also contains special
control data pertaining to Delivery Status and Message Disposition Notifications, etc.
Various identities called fields are present in the message and are used in different parts of e-
mail architecture called Layers. These fields serve a specific function in the system and are set
by some component of the system. Table 6 lists main identifier fields present in the message
during transit along with their description and the actor responsible for specifying their value.
These identities are used for analysing e-mail to determine the source (originator and the
author).
234
International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011
235
International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011
Layer: IP
It contains the source Address of the host immediately preceding
Source Latest Relay the current receiving SMTP server from which the IP datagram (e-
Address Client mail message is fragmented into IP packets) was send. It is
independent of the mail system and is supplied by the IP layer.
trace the address of the computer responsible for making the e-mail transaction. However,
servers store the copies of e-mail and server logs only for some limited periods and some may
not co-operate with the investigators. Further, SMTP servers which store data like credit card
number and other data pertaining to owner of a mailbox can be used to identify person behind
an e-mail address.
5.4. Network Device Investigation
In this form of e-mail investigation, logs maintained by the network devices such as routers,
firewalls and switches are used to investigate the source of an e-mail message. This form of
investigation is complex and is used only when the logs of servers (Proxy or ISP) are
unavailable due to some reason, e.g. when ISP or proxy does not maintain a log or lack of co-
operation by ISP’s or failure to maintain chain of evidence.
5.5. Software Embedded Identifiers
Some information about the creator of e-mail, attached files or documents may be included with
the message by the e-mail software used by the sender for composing e-mail. This information
may be included in the form of custom headers or in the form of MIME content as a Transport
Neutral Encapsulation Format (TNEF). Investigating the e-mail for these details may reveal
some vital information about the senders e-mail preferences and options that could help client
side evidence gathering. The investigation can reveal PST file names, Windows logon
username, MAC address, etc. of the client computer used to send e-mail message.
5.6. Sender Mailer Fingerprints
Identification of software handling e-mail at server can be revealed from the Received header
field and identification of software handling e-mail at client can be ascertained by using
different set of headers like “X-Mailer” or equivalent. These headers describe applications and
their versions used at the clients to send e-mail. This information about the client computer of
the sender can be used to help investigators devise an effective plan and thus prove to be very
useful.
6. E-MAIL FORENSIC TOOLS
There are many tools which may assist in the study of source and content of e-mail message so
that an attack or the malicious intent of the intrusions may be investigated. These tools while
providing easy to use browser format, automated reports, and other features, help to identify the
origin and destination of the message, trace the path traversed by the message; identify spam
and phishing networks, etc. This section introduces some of these tools.
6.1. eMailTrackerPro
eMailTrackerPro [8] analyses the headers of an e-mail to detect the IP address of the machine
that sent the message so that the sender can be tracked down. It can trace multiple e-mails at the
same time and easily keep track of them. The geographical location of an IP address is key
information for determining the threat level or validity of an e-mail message. This tool can pin
point the city that the e-mail most likely came from. It identifies the network provider (or ISP)
of the sender and provide contact information for further investigation. The actual path to the
sender's IP address is reported in a routing table, providing additional location information to
help determine the sender's true location. The abuse reporting feature in it can be used to make
further investigation easier. It checks the mail against DNS blacklists such as Spamcop to further
safeguard against spam and malicious emails. It supports Japanese, Russian and Chinese
language spam filters besides English language. A major feature of this tool is abuse reporting
that can create a report that can be sent to the ISP of sender. The ISP can then takes steps to
prosecuting the account holder and help put a stop to spam.
237
International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011
6.2. EmailTracer
EmailTracer [9] is an Indian effort in cyber forensics by the Resource Centre for Cyber
Forensics (RCCF) which is a premier centre for cyber forensics in India. It develops cyber
forensic tools based on the requirements of law enforcement agencies. Among several other
digital forensic tools, it has developed an e-mail tracer tool named EmailTracer. This tool traces
the originating IP address and other details from e-mail header, generates detailed HTML report
of email header analysis, finds the city level details of the sender, plots route traced by the mail
and display the originating geographic location of the e-mail. Besides these, it has keyword
searching facility on e-mail content including attachment for its classification.
6.3. Adcomplain
Adcomplain [10] is a tool for reporting inappropriate commercial e-mail and usenet postings, as
well as chain letters and "make money fast" postings. It automatically analyses the message,
composes an abuse report, and mails the report to the offender's internet service provider by
performing a valid header analysis. The report is displayed for approval prior to mailing to U.S.
Federal Trade Commission. Adcomplain can be invoked from the command line or
automatically from many news and mail readers.
6.4. Aid4Mail Forensic
Aid4Mail Forensic [11] is e-mail investigation software for forensic analysis, e-discovery, and
litigation support. It is an e-mail migration and conversion tool, which supports various mail
formats including Outlook (PST, MSG files), Windows Live Mail, Thunderbird, Eudora, and
mbox. It can search mail by date, header content, and by message body content. Mail folders and
files can be processed even when disconnected (unmounted) from their email client including
those stored on CD, DVD, and USB drives. Aid4Mail Forensic can search PST files and all
supported mail formats, by date range and by keywords in the message body or in the headers.
Special Boolean operations are supported. It is able to process unpurged (deleted) e-mail from
mbox files and can restore unpurged e-mail during exportation.
6.5. AbusePipe
AbusePipe [12] analyses abuse complaint e-mails and determines which of ESP’s customers is
sending spam based on the information in e-mailed complaints. It automatically generates
reports reporting customers violating ESP’s acceptable user policy so that action to shut them
down can be taken immediately. AbusePipe can be configured to automatically reply to people
reporting abuse. It can assist in meeting legal obligations such as reporting on the customers
connected to a given IP address at a given date and time.
6.6. AccessData’s FTK
AccessData’s FTK [13] is standard court-validated digital investigations platform computer
forensics software delivering computer forensic analysis, decryption and password
cracking within an intuitive and customizable interface. It has speed, analytics and enterprise-
class scalability. It is known for its intuitive interface, e-mail analysis, customizable data views
and stability. It supports popular encryption technologies, such as Credant, SafeBoot, Utimaco,
EFS, PGP, Guardian Edge, Sophos Enterprise and S/MIME. Its current supported e-mail types
are: Lotus Notes NSF, Outlook PST/OST, Exchange EDB, Outlook Express DBX, Eudora, EML
(Microsoft Internet Mail, Earthlink, Thunderbird, Quickmail, etc.), Netscape, AOL and RFC
833.
6.7. EnCase Forensic
EnCase Forensic [14] is computer forensic application that provides investigators the ability to
image a drive and preserve it in a forensic manner using the EnCase evidence file format (LEF
238
International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011
or E01), a digital evidence container vetted by courts worldwide. It contains a full suite of
analysis, bookmarking and reporting features. Guidance Software and third party vendors
provide support for expanded capabilities to ensure that forensic examiners have the most
comprehensive set of utilities. Including many other network forensics investigations, it also
supports Internet and e-mail investigation. It included Instant Messenger toolkit for Microsoft
Internet Explorer, Mozilla Firefox, Opera and Apple Safari. The e-mail support includes for
Outlook PSTs/OSTs, Outlook Express DBXs, Microsoft Exchange EDB Parser, Lotus Notes,
AOL, Yahoo, Hotmail, Netscape Mail and MBOX archives.
6.8. FINALeMAIL
FINALeMAIL [15] can recover the e-mail database file and locates lost e-mails that do not have
data location information associated with them. FINALeMAIL has the capability of restoring
lost e-mails to their original state, recover full e-mail database files even when such files are
attacked by viruses or damaged by accidental formatting. It can recover E- mail messages and
attachments emptied from the ‘Deleted Items folder’ in Microsoft Outlook Express, Netscape
Mail, and Eudora.
6.9. Sawmill-GroupWise
Sawmill-GroupWise [16] is a GroupWise Post Office Agent log analyser which can process log
files in GroupWise Post Office Agent format, and generate dynamic statistics from them,
analysing and reporting events. It can parse these logs, import them into a MySQL, Microsoft
SQL Server, or Oracle database (or its own built-in database), aggregate them, and generate
dynamically filtered reports, through a web interface. It supports Window, Linux, FreeBSD,
OpenBSD, Mac OS, Solaris, other UNIX, and several other platforms.
239
International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011
According to Simson L. Garfinkel [19] current forensic tools are designed to help examiners in
finding specific pieces of evidence and are not assisting in investigations. Further, these tools
were created for solving crimes committed against people where the evidence resides on a
computer; they were not created to assist in solving typical crimes committed with computers or
against computers. Current tools must be re-imagined to facilitate investigation and exploration.
This is especially important when the tools are used outside of the law enforcement context for
activities such as cyber-defence and intelligence. Construction of a modular forensic processing
framework for digital forensics that implements the “Visibility, Filter and Report” model would
be the first logical step in this direction.
7. RELATED WORK
The term “Computer Forensics” science deals with the preservation, identification, extraction
and documentation of computer evidence, and like any other forensic science, relates law and
science and was coined back in 1991 [20]. Kara Nance et al [21] have proposed six categories of
Digital forensics including Network Forensics. Tools and Techniques for E-mail forensics fall
under the category of network forensic. Many studies have been carried out for analyzing tools
and techniques used in network forensics [22, 23, 24, 25] which also include e-mail forensics
tools and techniques.
8. CONCLUSION
E-mail is a widely used and highly distributed application involving several actors that play
different roles. These actors include hardware and software components, services and protocols
which provide interoperability between its users and among the components along the path of
transfer. Cybercriminals forge e-mail headers or send it anonymously for illegitimate purposes
which lead to several crimes and thus make e-mail forensic investigation crucial. This paper
portrays e-mail actors, roles and their responsibilities. It illustrated logical e-mail architecture
and underlining various core components, modules and protocols used in the system. It presents
the meta-data contained in e-mail message and various techniques used for e-mail forensics. The
paper also introduces several software e-mail forensic tools that have functionalities to
automatically analyse e-mail and produce reports providing diverse information about it.
REFERENCES
[1] Suzuki, S., Nakamura, M. (2005). “Domain Name System—Past, Present and Future”,
IEICE Transactions of Communication, E88b (3), pp. 857-864.
[2] Tzerefos, Smythe, Stergiou, Cvetkovic, (1997). ‘A comparative study of Simple Mail
Transfer Protocol (SMTP), Post Office Protocol (POP) and X.400 Electronic Mail
Protocols’ In Proceedings of the 22nd Annual IEEE Conference on Local Computer
Networks, pp. 545–554.
[3] Graham, J. (1999). Enterprise wide electronic mail using IMAP, SIGUCCS '99:
Proceedings of the 27th annual ACM SIGUCCS conference on User services: Mile high
expectations, November, 1999.
[4] Crocker, D. (2009). “Internet Mail Architecture”, RFC 5598, July 2009.
http://tools.ietf.org/pdf/rfc5598.pdf.
[5] Internet Assigned Numbers Authority (IANA), http://www.iana.org/assignments/port-
numbers
[6] Resnick P, Ed. (2001). “Internet message format”, Internet Engineering Task Force
(IETF); 2001. RFC 2822.
[7] Marwan Al-Zarouni. (2004). “Tracing E-mail Headers”, Proceedings of Australian
Computer, Network & Information Forensics Conference on 25th November, School of
240
International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011
Computer and Information Science, Edith Cowan University Western Australia 2004, pp.
16-30.
[8] eMailTrackerPro, http://www.emailtrackerpro.com/
[9] EmailTracer, http://www.cyberforensics.in
[10] Adcomplain, http://www.rdrop.com/users/billmc/adcomplain.html
[11] Aid4Mail Forensic, http://www.aid4mail.com/
[12] AbusePipe, http://www.datamystic.com/abusepipe.html
[13] AccessData’s FTK, http://www.accessdata.com/
[14] EnCase Forensic, http://www.guidancesoftware.com
[15] FINALeMAIL, http://finaldata2.com
[16] Sawmill-GroupWise, http://www.sawmill.net
[17] Forensics Investigation Toolkit (FIT), http://www.edecision4u.com/FIT.html
[18] Paraben (Network) E-mail Examiner, http://www.paraben.com/email-examiner.html
[19] Simson L. Garfinkel, (2010), “Digital forensics research: The next 10 years”, Digital
Investigation, Vol. 7, pp. 64-73, doi:10.1016/j.diin.2010.05.009.
[20] New Techno logies Inc. “Computer Forensics Defined”. http://www.forensics-
intl.com/def4.html.
[21] Kara Nance, Brian Hay, Matt Bishop. (2009). Digital Forensics: Defining a Research
Agenda, Proceedings of the 42nd Hawaii International Conference on System Sciences –
2009.
[22] Arthur, K. K., & Venter, H. S. (2004). An Investigation into Computer Forensic Tools.
ISSA. Pretoria: Information and Computer Security Architectures (ICSA) Research
Group.
[23] Natarajan Meghanathan, Sumanth Reddy Allam and Loretta A. Moore. (2009). Tools and
Techniques For Network Forensic, International Journal of Network Security & Its
Applications (IJNSA), Vol .1, No.1,April 2009.
[24] Matthew Geiger. (2005), Evaluating Commercial Counter-Forensic Tools, 2005 Digital
Forensic Research Workshop (DFRWS), New Orleans, LA.
[25] Himal Lalla, Stephen V. Flowerda. (2010). Towards a Standardised Digital Forensic
Process: E-mail Forensics, Proceedings of the 2010 Information Security for South Africa
(ISSA 2010) Conference 2 – 4 August 2010, Sandton Convention Centre, Sandton, South
Africa, http://icsa.cs.up.ac.za/issa/2010/Proceedings/Research/05_paper.pdf
Authors
M. Tariq Banday did his M. Sc., M. Phil. and Ph. D. Degrees from the Department
of Electronics, University of Kashmir, Srinagar, India in 1996, 2008 and 2011
respectively. He did advanced diploma course in computers and qualified UGC NET
examination in 1997 and 1998. At present he is working as Sr. Assistant Professor in
the Department of Electronics & Instrumentation Technology, University of Kashmir,
Srinagar, India. He has to his credit several research publications in reputed journals
and conference proceedings. He is a member of Computer Society of India,
International Association of Engineers and ACM. His current research interests
include Network Security, Internet Protocols and Network Architecture.
241