<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>in the Investigation of Cybercrime⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Vladyslav Bilous</string-name>
          <email>v.bilous@kubg.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Dmytro Bodnenko</string-name>
          <email>d.bodnenko@kubg.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleksandra Lokaziuk</string-name>
          <email>o.lokaziuk@kubg.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Pavlo Skladannyi</string-name>
          <email>p.skladannyi@kubg.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vadym Abramov</string-name>
          <email>v.abramov@kubg.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Borys Grinchenko Kyiv Metropolitan University</institution>
          ,
          <addr-line>18/2 Bulvarno-Kudriavska str., 04053 Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Institute of Mathematics of NAS of Ukraine</institution>
          ,
          <addr-line>3 Tereshchenkivska str., 01024 Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>26</fpage>
      <lpage>37</lpage>
      <abstract>
        <p>Digital forensics is the key element in the detection, preservation, and analysis of digital evidence, and helps in the investigation of complex cybercrimes such as identity theft and corporate espionage. The study emphasizes the importance of methods for analyzing physical data storage devices and arrays in crime investigations, in particular for identifying key individuals in criminal networks, which can lead to critical information. The paper also discusses the main difficulties of implementing digital forensic tools, including legal restrictions, technical problems, human factors, high cost, and complexity of integration. The comparative analysis of digital tools for investigating cybercrime, including data collection, data analysis, and data structure management tools, is made. Particular attention is paid to the author's software “Cyber Evidence”, which offers a wide range of functions for analyzing electronic evidence and integrating with full data sources. This software allows cyber units and forensic experts to work efficiently with data, check for malware, and obtain digital evidence of cybercrime, making it one of the tools in the field of digital forensics.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;cybercrime</kwd>
        <kwd>cyber forensic</kwd>
        <kwd>digital forensic tool</kwd>
        <kwd>data analytics</kwd>
        <kwd>data analysis</kwd>
        <kwd>software cyber evidence</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        In the digital era of growing cybercrime, the problem of the evolution of investigative techniques
arises, with digital forensics becoming a crucial component in the fight against online crime.
Digital forensics is a branch of forensic science that focuses on identifying, acquiring, processing,
analyzing, and reporting electronically stored data [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>
        Digital forensics tools [
        <xref ref-type="bibr" rid="ref2 ref3">2, 3</xref>
        ] play an important role in identifying, preserving, and analyzing
digital evidence, helping law enforcement agencies and organizations solve complex cybercrimes
ranging from identity theft to corporate espionage. The effectiveness of these tools can be
measured by a variety of metrics, including their ability to recover deleted files, track digital traces,
and
      </p>
      <p>
        provide actionable intelligence that leads to successful prosecutions. However, the
implementation of digital forensics is not without its challenges; technical difficulties, such as the
rapid development of technology outpacing forensic capabilities, along with legal and ethical
concerns regarding
privacy
and admissibility
of evidence, complicate the investigative
environment. In addition, limitations inherent in current digital forensics technologies, such as the
inability to effectively analyze encrypted data, underscore the ongoing need for innovation and
adaptation in this area. Establishing best practices for digital forensics investigations, including
systematic protocols for processing evidence and ensuring the reliability of digital evidence, is
crucial to maximizing the effectiveness of these tools. With the multitude of digital forensics tools
available, a comparative analysis of their characteristics and capabilities is essential for
investigators to select the best solutions. Solutions should be tailored to specific cases, including a
thorough evaluation of both open-source and commercial options. As technology evolves, future
trends such as the integration of artificial intelligence into digital forensics [
        <xref ref-type="bibr" rid="ref4 ref5">4, 5</xref>
        ] promise to
improve investigative techniques, but also present new challenges that may redefine the
parameters of digital crime investigations.
      </p>
      <p>The objectives of this study are:


</p>
      <p>Analyze the problems that arise when implementing digital forensics tools.</p>
      <p>Compare the use of tools in the investigation of cybercrime.</p>
      <p>Describe the author’s software Cyber Evidence.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Research methodology</title>
      <p>The following methods were used in the study: analysis of scientific literature on digital forensics
tools; analysis of social networks; analysis of resources and methods for collecting digital evidence;
software development; testing of the author’s software to predict its further development;
visualization of the data obtained to present the results of the study.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Results and discussion</title>
      <sec id="sec-3-1">
        <title>3.1. Problems arising from the implementation of digital forensics tools</title>
        <p>
          Digital forensics tools are indispensable in the modern fight against cybercrime, as they offer
important capabilities for both detecting and prosecuting cybercriminals. These tools are specially
designed to track information related to system or network breaches, and the information obtained
can be important for identifying criminals and further prosecuting them in a forensic investigation
[
          <xref ref-type="bibr" rid="ref6">6</xref>
          ]. The development of cybercrime requires the improvement of digital forensics tools. At the
same time, there are obstacles to interagency cooperation that hinder the fight against cybercrime.
        </p>
        <p>
          When evaluating the effectiveness of digital forensics tools, social network analysis (SNA)
methods should be used [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ]. One of the main functions of SNA is to identify key individuals to
understand the dynamics of criminal networks and increase the effectiveness of investigations.
SNA methods provide insight into the density of communications in the network, which can
indicate the level of interaction and potential collusion between people, revealing the operational
structure of the network. At the same time, analyzing the strength of ties between individuals or
nodes makes it easier for investigators to optimize the investigation (relationships, priorities). The
integration of SNA methods into digital forensics contributes to the efficiency and validity of
investigations.
        </p>
        <p>
          The introduction of digital forensics tools, such as the US Integrated Automated Fingerprint
Identification System (IAFIS) and the UK National DNA Database (NDNAD), demonstrates their
key role in modern crime-solving and intelligence gathering [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ]. These systems are an example of
how the use of advanced databases contributes to criminal investigations. SNA helps in mapping
relationships and influence in networks, IAFIS and NDNAD provide the infrastructure for
identifying individuals using biometric data, helping to narrow down the range of suspects and
verify identities [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ]. The UK’s National Fingerprint Database (IDENT1) complements these systems
by providing additional layers of verification and cross-referencing that together optimize the
investigation process and increase the accuracy of criminal identification [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ]. Databases are being
improved and modernized. Ongoing cooperation between law enforcement agencies and
technology developers is crucial to ensure that tools are effective and adapt to new challenges in
solving crimes.
        </p>
        <p>
          The analysis of sources [
          <xref ref-type="bibr" rid="ref3 ref4 ref6">3, 4, 6</xref>
          ] and the experience of developing and implementing
OSINToriented software [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ] gives grounds to highlight the most important problems that may arise when
implementing digital forensics tools.
        </p>
        <sec id="sec-3-1-1">
          <title>Legal restrictions</title>
          <p>One of the main problems is the gap between the technological capabilities of digital forensics
and the current legal framework. In many countries, legislation does not keep pace with rapid
changes in technology.</p>
          <p>
            International context. Collecting digital evidence often involves accessing data located outside
the jurisdiction of the country of investigation. For example, criminals may store their files on
servers located in countries with strict privacy laws or no international legal assistance
agreements. In 2020, the European Union faced a problem when data obtained through violation of
international cooperation procedures could not be used in court [
            <xref ref-type="bibr" rid="ref9">9</xref>
            ].
          </p>
          <p>
            Maintaining confidentiality. Investigations often involve the extraction of data that contains the
personal information of third parties. For example, analyzing a suspect’s phone may reveal
messages, photos, or other information belonging to third parties who are not parties to the case.
This creates a conflict between the needs of the investigation and personal data protection
legislation, such as the GDPR in the European Union [
            <xref ref-type="bibr" rid="ref10">10</xref>
            ].
          </p>
        </sec>
        <sec id="sec-3-1-2">
          <title>Technical challenges</title>
          <p>Adaptation to new technologies. The development of technology makes the work of digital
forensic scientists more complex. For example, cloud-based technologies such as Amazon Web
Services or Google Cloud allow criminals to quickly transfer data without having to physically
seize the storage media. Another example is encryption, which is becoming a standard in many
apps and services, such as Signal or WhatsApp. In such cases, access to data is often only possible
through sophisticated technical solutions or cooperation with developers.</p>
          <p>Data sets. The sheer volume of digital data is another challenge. For example, investigating a
cybercrime may involve analyzing terabytes of information from a company’s servers or cloud
storage. This requires high-performance systems and algorithms that can quickly process such
data. However, even with modern technology, such investigations can take days or weeks.</p>
        </sec>
        <sec id="sec-3-1-3">
          <title>Human factor</title>
          <p>
            Insufficient qualifications. The biggest challenge is staff training. For instance, the use of
sophisticated tools such as FTK [
            <xref ref-type="bibr" rid="ref11">11</xref>
            ] or EnCase [
            <xref ref-type="bibr" rid="ref12">12</xref>
            ] requires specialized knowledge. Inexperienced
professionals may make mistakes, for example, failing to record the chain of custody of evidence,
which will lead to its discredit in court [
            <xref ref-type="bibr" rid="ref13">13</xref>
            ].
          </p>
          <p>Errors in the process. Even minor mistakes during data extraction or analysis can have serious
consequences. For instance, if an investigator accidentally changes the metadata of a file, it can be
seen as tampering and cast doubt on the reliability of the evidence.</p>
        </sec>
        <sec id="sec-3-1-4">
          <title>High cost</title>
          <p>
            The cost of licenses and equipment. Many modern digital forensics tools are commercial and cost
tens of thousands of dollars. For instance, a license for EnCase [
            <xref ref-type="bibr" rid="ref12">12</xref>
            ] can cost from 20,000 dollars,
and specialized devices for analyzing mobile phones, such as Cellebrite UFED, have a similar price.
This becomes a serious barrier to the implementation of such tools in countries with limited
budgets.
          </p>
          <p>Additional costs. In addition to purchasing licenses, you need to consider the costs of staff
training, technical support, software, and infrastructure upgrades. This creates a significant
financial burden even for large organizations.</p>
        </sec>
        <sec id="sec-3-1-5">
          <title>Complexity of integration</title>
          <p>Inconsistencies in data formats. Digital forensics tools often use different data formats, which
makes it difficult to use them in an integrated manner. For example, one tool may generate reports
in XML format, while another only supports CSV. To combine such data, additional software or
manual work is required.</p>
          <p>Time spent on integration. It can take months to integrate a new tool into an existing system,
especially if the organization is using legacy systems. For example, institutions running on older
operating systems often have problems with compatibility with modern tools.</p>
        </sec>
        <sec id="sec-3-1-6">
          <title>The speed of development of cyber threats</title>
          <p>
            Increasing complexity of threats. Hackers are constantly improving their methods. For example,
ransomware has become more sophisticated, using double encryption and multi-level attacks. In
the case of the WannaCry attack in 2017 [
            <xref ref-type="bibr" rid="ref14">14</xref>
            ], thousands of organizations suffered losses due to a
lack of preparedness for such threats.
          </p>
          <p>
            Use of anonymization. Anonymization via Tor or VPN makes it much more difficult for
criminals to identify the perpetrators. Even after the device is removed, all act ivities can be hidden
through encryption systems, anonymous accounts, and dynamic IP addresses [
            <xref ref-type="bibr" rid="ref15 ref16 ref17">15–17</xref>
            ].
          </p>
        </sec>
      </sec>
      <sec id="sec-3-2">
        <title>3.2. Examples of the use of OSINT to document war crimes in Ukraine</title>
        <p>
          A successful digital forensics investigation depends on several key steps to ensure both
thoroughness and accuracy. First and foremost, organizations must establish robust training
requirements for personnel involved in digital forensics investigations to ensure that they have the
necessary skills and knowledge to handle complex cases. This training should cover the
identification, handling, and storage of evidence, as these components are critical to maintaining
the integrity of evidence throughout the investigation process. In addition, assessing and
improving IT governance structures play a key role in supporting an effective digital forensics
strategy. They provide the necessary structure and policies to manage digital evidence and align
investigative practices with organizational goals. To increase preparedness, an organization should
adopt a proactive approach to digital forensics (ProDF) by implementing measures that strengthen
readiness for potential investigations or compliance tests. This includes defining clear goals, steps,
and deliverables for ProDF to ensure a structured and efficient investigation process [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ].
Comprehensive training facilitates successful investigations and enables organizations to respond
effectively to potential digital threats or incidents. The comprehensive approach includes the
implementation of standardized procedures for collecting, preserving, storing, and presenting digital
evidence, which is critical to maintaining its integrity throughout the investigation process [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ].
        </p>
        <p>
          When working with digital forensics tools, it is crucial to follow recommended protocols to
ensure the integrity and reliability of digital evidence. One of the main aspects of these protocols is
to follow best practices in forensic data processing [
          <xref ref-type="bibr" rid="ref20">20</xref>
          ]. It is important to use:
        </p>
        <sec id="sec-3-2-1">
          <title>Standardized methods for collecting, storing, and analyzing digital evidence. For</title>
          <p>example, when collecting data from a mobile device, software tools such as Cellebrite or XRY
should be used to minimize the risk of data modification. In the case of analyzing a computer’s
hard disk, methods of creating copies of the disk using write-blocker devices are used to ensure the
preservation of original information.</p>
        </sec>
        <sec id="sec-3-2-2">
          <title>Integrity and chain of custody of digital evidence. For instance, when storing files from the</title>
          <p>suspect’s servers, it is necessary to use hash functions such as MD5 or SHA-256 to record the file’s
checksum. This allows you to confirm that the data has not been altered during the investigation.
Each step of evidence processing, including the transfer of evidence between experts, should be
documented in the form of a “storage log.”</p>
        </sec>
        <sec id="sec-3-2-3">
          <title>A clear and documented data processing trail. For example, when removing email from a</title>
          <p>server, all actions should be documented, including the tools used, their versions, and the
timestamps of each operation. The report should indicate which method was used, for example,
exporting mail via IMAP or taking a snapshot of the server.</p>
          <p>By implementing these practices, forensic investigators can effectively support court
proceedings and ensure justice.</p>
          <p>
            Comparison of digital forensics tools. Through a comparison of digital forensics tools [
            <xref ref-type="bibr" rid="ref21 ref22 ref23 ref24 ref25 ref26 ref27 ref28 ref29 ref30 ref31 ref32 ref33 ref34 ref35 ref36">21–
36</xref>
            ], we emphasize the distinctive features and capabilities that distinguish open-source solutions
from their commercial counterparts. We have analyzed the functionality and capabilities of digital
forensics tools in specialized areas (Table 1).
anCneatapwltyuozrreek atnradffic Spuroptpoocrotlssmany bCeogminpnleexrsfor
Pmaocnkietotring Simple usage
          </p>
        </sec>
        <sec id="sec-3-2-4">
          <title>Network Traffic Analysis Tools</title>
          <p>Data
extraction
from phones,
IoT devices</p>
        </sec>
        <sec id="sec-3-2-5">
          <title>Mobile Device Analysis Tools</title>
          <p>Supports many Expensive
models, regular license, high
updates system re
Fewer features Proprietary
Windows</p>
        </sec>
        <sec id="sec-3-2-6">
          <title>Magnet</title>
        </sec>
        <sec id="sec-3-2-7">
          <title>AXIOM</title>
        </sec>
        <sec id="sec-3-2-8">
          <title>Volatility</title>
        </sec>
        <sec id="sec-3-2-9">
          <title>Belkasoft RAM</title>
        </sec>
        <sec id="sec-3-2-10">
          <title>Capturer</title>
        </sec>
        <sec id="sec-3-2-11">
          <title>CaseMap</title>
        </sec>
        <sec id="sec-3-2-12">
          <title>Nuix</title>
          <p>Email format
support,
MailXaminer metadata/IP
analysis
Email
conversion,
Aid4Mail attachment
analysis</p>
        </sec>
        <sec id="sec-3-2-13">
          <title>Email Analysis Tools</title>
          <p>Wide format
support, Expensive
multilingual license
analysis
The limited
Fast processing free version
lacks forensic</p>
        </sec>
        <sec id="sec-3-2-14">
          <title>Memory Analysis Tools</title>
          <p>Memory
adkpn/urpoamaclysepsssswsis/o,nredtwor Fprluege,inwsiudpeport lcCiomommitpmleaxnitdy-,line
discovery
Real-time Simple Only captures,
memory interface, small no analysis
capture size tools</p>
        </sec>
        <sec id="sec-3-2-15">
          <title>Case Management Tools</title>
          <p>Case database Intuitive
creation, interface, easy Limited
evidence case integration
linkage management
eadDmnoaactaulaiy/lm/steiesxntt/ scAuocpmcpuporlarettxe,fiflaest, cnEoexmwpepnulessixevrefso,r
Data
extraction,
cloud
integration,
social media
analysis</p>
          <p>
            Supports many
data sources,
quick
processing
rEexspoeunrsciev-eh,eavy Commercial
Open-source tools can corroborate evidence found with other products, which underscores their
value in the verification process [
            <xref ref-type="bibr" rid="ref8">8</xref>
            ]. Although open-source tools are a cost-effective option, they
require additional time and expertise, which requires targeted training interventions and capacity
building in digital forensic investigations.
          </p>
          <p>It is important to consider the tool’s search and indexing capabilities; cross-platform
capabilities; and the tool’s ability to quickly process large volumes of digital forensic data. These
criteria ensure that the selected tool meets the specific requirements of the investigation.</p>
          <p>In the field of digital forensics, the choice between open-source and commercial tools involves
weighing various factors such as cost, functionality, and support.</p>
        </sec>
      </sec>
      <sec id="sec-3-3">
        <title>3.3. The author’s software “Cyber Evidence”</title>
        <p>In the context of cybercrime investigations, we have created proprietary software that provides the
following functions: Tools for data capture; Tools for analyzing digital evidence (RAID, RAW, etc.);
Tools for data array recovery (Arsenal Image Mounter software is connected); Tools for analyzing
mobile device operating systems (sleuthkit-4.12.0 framework is connected); Tools for analyzing
registries (sleuthkit-4.12.0 framework is connected); Tools for analyzing various types of email
(analogous to PSTViewer Pro). It is worth noting that part of the software functionality includes
the OpenAI key API, which is used to obtain data on Verizon, Verifone API (mobile number
databases), and digital embedded analytics of multimedia files. Artificial intelligence capabilities are
built into Cyber Evidence and are used to analyze and provide analytics of multimedia files.</p>
        <p>The name of the author’s software is Cyber Evidence. This is a digital forensic tool that provides
an intuitive interface for analyzing images of mounted disks of various formats (*.iso, *.dd, *.E01,
etc.) and includes some functionalities that help forensic experts extract and view the contents of
various file and multimedia formats.</p>
        <p>Features of the software product:













</p>
        <p>Mounting images: Mounts forensic disk images (Windows only).</p>
        <p>Tree viewer: Navigate through the disk image structure, including partitions and files.
Detailed file analysis: View file contents in various formats such as HEX, text, and
application-specific formats.</p>
        <p>Extract EXIF data: Extract and display EXIF metadata from photos.</p>
        <p>View registry: View and explore Windows registry files.</p>
        <p>Basic file recovery: Recover deleted files from disk images.</p>
        <p>Integration with Virus Total API: Scan files for malware using the Virus Total API.
Integration with Verizone API: Search for phone numbers in an international database for
identification purposes.</p>
        <p>
          Scanning and recovery: Thanks to the built-in AI of the Dan model package, it is possible to
recover deleted and damaged files [
          <xref ref-type="bibr" rid="ref33">33</xref>
          ].
        </p>
        <p>E01 Image Verification: Verifies the integrity of E01 disk images.</p>
        <p>Convert E01 to raw: Converts E01 disk images to a raw format.</p>
        <p>Message decoding: Decode messages from base64, binary, and other encodings. When
testing the application, the following was done.</p>
        <p>Tested formats: The tool has been tested primarily with dd and E01 files. Although these
formats are well supported, additional testing with other formats such as Ex01, Lx01, s01,
and others is needed.</p>
        <p>File systems are tested: Currently, the tool is tested only on the NTFS file system. To ensure
wider compatibility, testing with other file systems such as FAT32, exFAT, HFS+, APFS,
EXT4, and others is required.</p>
        <p>Here are fragments of the program’s operation. The program allows you to open various types
of files inside it without harming your PC. An example of opening a mounted rosatom.iso image
containing files from the servers of this structure (Fig. 1). The system automatically scans for
vulnerabilities in the image, but manual scanning is also available and then allows you to view the
file structure and open various types of files without harming your PC. In the example above, you
can view a pdf file.
Here is an example of a general overview of all files on the mounted image (Fig. 2). You can
determine the actual dates of creation and modification of files.
An example of encryption and decryption code for collecting checksums is in Fig. 3.
The following program snippet shows the connection of the artificial intelligence API to find
vulnerabilities using VirusTotal, a cloud-based scanner for rootkits, randomizers, trojans, etc. This
example shows the connection of both manual and automatic scanning in Fig. 4.
Prospects for further research are seen in improving the software (and creating instructions for
using the software) to expand the following functionality:
</p>
        <p>Live video/audio playback: Currently, the video and audio player temporarily store files
before playing them, which can cause delays. The goal is to enable direct playback to speed
up the experience.</p>
        <p>Integrated file search and browsing: The file search function is not yet connected to the
View tab, which displays HEX, text, application-specific views, metadata, and other details.
This integration needs to be implemented.</p>
        <p>Cross-platform image mounting: Image mounting currently only works on Windows using
the Arsenal Image Mounter executable. The goal is to make this feature work on all
platforms without relying on external executables.</p>
        <p>File cutting and integration with viewers: The file-cutting functionality is not yet connected
to the “Viewer Tab” where users can view HEX, text, application-specific views, and
metadata. In addition, the current file cut process does not distinguish between deleted and
uninstalled files; it “cuts” all files of the selected file type from the disk image.</p>
        <p>Problems with color in dark mode: The program is currently experiencing some color display
issues on Linux and macOS systems when using dark mode. Certain interface elements may be
fuzzy or display incorrectly.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Conclusions</title>
      <p>The results of this study highlight the important role of methods of digital data analytics in
improving investigative outcomes by identifying key influencers in criminal networks, which can
lead to the disclosure of critical information that might otherwise remain hidden.</p>
      <p>Based on the analysis of using of digital forensics tools, the authors identify the main difficulties
that may arise in their implementation, including legal restrictions (international context and
confidentiality), technical challenges (adaptation to new technologies and data sets), human factor
(lack of qualifications and errors in the process), high cost (cost of licenses and equipment,
additional costs), complexity of integration (inconsistencies in data formats and time spent on
integration), speed of cyber threats (increasing complexity of threats and the use of
anonymization).</p>
      <p>A comparative analysis and systematization of digital tools that can be used in the investigation
of cybercrime is carried out. A list of titles of digital forensics tools is provided by key
functionality, which includes Features, Advantages, Disadvantages, License Type, and Supported
Platforms. Each of the proposed tools was recommended for use among software products: Data
Acquisition Tools, Data Analysis Tools, Data Recovery Tools, Network Traffic Analysis Tools
Mobile, Device Analysis Tools, Memory Analysis Tools, Email Analysis Tools, and Case
Management Tools.</p>
      <p>
        This study proposes the author’s software “Cyber Evidence,” which is a digital forensics tool
that provides a wide range of functions for analyzing and processing data in the context of
cybercrime. The software includes tools for capturing data, analyzing electronic evidence,
recovering information from disks, and integrating with APIs to retrieve data from various sources.
The system allows users (e.g., cyber specialists and/or forensic experts) to work with disk ima ges of
various formats, view file contents, obtain digital evidence of cybercrime, and check for malware
[
        <xref ref-type="bibr" rid="ref37">37</xref>
        ]. The work contains screenshots of fragments of software and software code snippets [
        <xref ref-type="bibr" rid="ref38 ref39">38, 39</xref>
        ].
      </p>
    </sec>
    <sec id="sec-5">
      <title>Acknowledgments</title>
      <p>The research was carried out within the framework of: the complex scientific theme of the Faculty
of Information Technologies and Mathematics “Mathematical methods and digital technologies in
education, science, technology,” DR No. 0121U111924; the scientific theme of the Department of
Information and Cyber Security named after Professor Volodymyr Buryachok of Borys Grinchenko
Kyiv Metropolitan University “Methods and models of ensuring cyber security of information
processing systems and functional security of software and technical complexes of critical
infrastructure management,” DR No. 0122U200483, and the research by a grant from the Simons
Foundation (1290607, O. L.).</p>
    </sec>
    <sec id="sec-6">
      <title>Declaration on Generative AI</title>
      <p>While preparing this work, the authors used the AI programs Grammarly Pro to correct text
grammar and Strike Plagiarism to search for possible plagiarism. After using this tool, the authors
reviewed and edited the content as needed and took full responsibility for the publication’s content.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Interpol</surname>
          </string-name>
          .int, Digital forensics,
          <year>2024</year>
          . URL: https://www.interpol.int/How-we-work/ Innovation/Digital-forensics
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>K.</given-names>
             
            <surname>Sindhu</surname>
          </string-name>
          ,
          <string-name>
            <surname>B.</surname>
          </string-name>
           
          <article-title>Meshram, Digital forensics and cyber crime datamining</article-title>
          ,
          <source>J. Inf. Secur</source>
          .
          <volume>03</volume>
          (
          <issue>03</issue>
          ) (
          <year>2012</year>
          )
          <fpage>196</fpage>
          -
          <lpage>201</lpage>
          . doi:
          <volume>10</volume>
          .4236/jis.
          <year>2012</year>
          .
          <volume>33024</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>K.</given-names>
             
            <surname>Kaushik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
             
            <surname>Ouaissa</surname>
          </string-name>
          ,
          <string-name>
            <surname>A.</surname>
          </string-name>
           
          <article-title>Chaudhary, Advanced techniques and applications of cybersecurity and forensics</article-title>
          ,
          <source>Chapman and Hall</source>
          ,
          <year>2024</year>
          . URL: https://f.eruditor.link/file/4195730/
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>M. </surname>
          </string-name>
          <article-title>Omar, Digital forensics in the age of AI</article-title>
          , IGI Global,
          <year>2025</year>
          . doi:
          <volume>10</volume>
          .4018/979-8-
          <fpage>3373</fpage>
          -0857-9.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>H.</given-names>
            <surname> Zangana</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
             
            <surname>Omar</surname>
          </string-name>
          ,
          <article-title>Introduction to digital forensics and artificial intelligence</article-title>
          ,
          <source>Advances in Digital Crime</source>
          , Forensics, and
          <string-name>
            <surname>Cyber Terrorism</surname>
          </string-name>
          (
          <year>2025</year>
          )
          <fpage>1</fpage>
          -
          <lpage>30</lpage>
          . doi:
          <volume>10</volume>
          .4018/979-8-
          <fpage>3373</fpage>
          -0857- 9.
          <fpage>ch001</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <article-title>[6] Enisa Europa, Report on the State of cybersecurity in the union-condensed version</article-title>
          ,
          <source>Publication</source>
          ,
          <year>2024</year>
          . URL: https://www.enisa.europa.eu/publications/2024
          <article-title>-report-on-the-state-ofthe-cybersecurity-in-the-union</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>A.</given-names>
             
            <surname>Irons</surname>
          </string-name>
          ,
          <string-name>
            <surname>H.</surname>
          </string-name>
           
          <article-title>Lallie, Digital forensics to intelligent forensics</article-title>
          ,
          <source>Future Internet</source>
          ,
          <volume>6</volume>
          (
          <year>2014</year>
          )
          <fpage>584</fpage>
          -
          <lpage>596</lpage>
          . doi:
          <volume>10</volume>
          .3390/fi6030584
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>V.</given-names>
             
            <surname>Bilous</surname>
          </string-name>
          , et al.,
          <article-title>Open source intelligence for war crime documentation</article-title>
          ,
          <source>in: Cybersecurity Providing in Information and Telecommunication Systems</source>
          , vol.
          <volume>3654</volume>
          ,
          <year>2024</year>
          ,
          <fpage>368</fpage>
          -
          <lpage>375</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Hudoc</surname>
             Echr Coe,
            <given-names>HUDOC</given-names>
          </string-name>
          , European court of human rights,
          <year>2024</year>
          . URL: https://hudoc.echr.coe.int/ukr#{%22documentcollectionid2%
          <fpage>22</fpage>
          : [%22GRANDCHAMBER%
          <fpage>22</fpage>
          ,%22CHAMBER%
          <fpage>22</fpage>
          ,%22DECGRANDCHAMBER%22]}
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Eur-Lex</surname>
            <given-names>Europa</given-names>
          </string-name>
          ,
          <article-title>Consolidated text: Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data</article-title>
          ,
          <source>and repealing Directive</source>
          <volume>95</volume>
          /46/EC (General
          <source>Data Protection Regulation)</source>
          ,
          <year>2016</year>
          . URL: http://data.europa.eu/eli/reg/2016/679/2016-05-04
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Exterro</surname>
          </string-name>
          .Com, FTK forensic toolkit,
          <year>2025</year>
          . URL: https://www.exterro.com/digital-forensicssoftware/forensic-toolkit/
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Cybermarket</surname>
          </string-name>
          .Com, EnCase forensic,
          <year>2022</year>
          . URL: https://cybermarket.com.ua/product/encaseforensic/
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>Z.</given-names>
             B. 
            <surname>Hu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
             
            <surname>Buriachok</surname>
          </string-name>
          ,
          <string-name>
            <surname>V.</surname>
          </string-name>
           
          <article-title>Sokolov, Implementation of social engineering attack at institution of higher education</article-title>
          ,
          <source>in: 1st International Workshop on Cyber Hygiene &amp; Conflict Management in Global Information Networks (CybHyg)</source>
          , vol.
          <volume>2654</volume>
          (
          <issue>2020</issue>
          ) pp.
          <fpage>155</fpage>
          -
          <lpage>164</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>S.</surname>
          </string-name>
           Mohurle,
          <string-name>
            <given-names>M.</given-names>
             
            <surname>Patil</surname>
          </string-name>
          ,
          <article-title>A brief study of wannacry threat: Ransomware attack 2017, Int</article-title>
          .
          <source>J. Adv. Res. Comput. Sci. 8</source>
          (
          <year>2017</year>
          )
          <fpage>1938</fpage>
          -
          <lpage>1940</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>O.</given-names>
             
            <surname>Mykhaylova</surname>
          </string-name>
          , et al.,
          <article-title>Mobile application as a critical infrastructure cyberattack surface</article-title>
          ,
          <source>in: Workshop on Cybersecurity Providing in Information and Telecommunication Systems II, CPITS-II</source>
          , vol.
          <volume>3550</volume>
          (
          <year>2023</year>
          )
          <fpage>29</fpage>
          -
          <lpage>43</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>M. TajDini</surname>
          </string-name>
          , V. 
          <string-name>
            <surname>Sokolov</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
           Skladannyi,
          <article-title>Performing sniffing and spoofing attack against ADS-B and Mode S using Software Define Radio</article-title>
          ,
          <source>in: IEEE International Conference on Information and Telecommunication Technologies and Radio Electronics</source>
          (
          <year>2021</year>
          )
          <fpage>7</fpage>
          -
          <lpage>11</lpage>
          . doi:
          <volume>10</volume>
          .1109/UkrMiCo52950.
          <year>2021</year>
          .9716665
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>M. TajDini</surname>
          </string-name>
          , V. 
          <string-name>
            <surname>Sokolov</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
           
          <article-title>Buriachok, Men-in-the-middle attack simulation on low energy wireless devices using software define radio</article-title>
          ,
          <source>in: 8th International Conference on “Mathematics. Information Technologies. Education:” Modern Machine Learning Technologies and Data Science</source>
          , vol.
          <volume>2386</volume>
          (
          <year>2019</year>
          )
          <fpage>287</fpage>
          -
          <lpage>296</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>C.</given-names>
             
            <surname>Grobler</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
             
            <surname>Louwrens</surname>
          </string-name>
          ,
          <string-name>
            <surname>S.</surname>
          </string-name>
          <article-title> von Solms, A framework to guide the implementation of proactive digital forensics in organisations</article-title>
          , in: 2010 International Conference on Availability,
          <source>Reliability and Security</source>
          ,
          <year>2010</year>
          ,
          <fpage>677</fpage>
          -
          <lpage>682</lpage>
          . doi:
          <volume>10</volume>
          .1109/ARES.
          <year>2010</year>
          .62
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <surname>J. Sachowski</surname>
          </string-name>
          ,
          <article-title>Implementing digital forensic readiness: From reactive to proactive process</article-title>
          , Boca Raton: CRC Press,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>A.</given-names>
            <surname>Malik</surname>
          </string-name>
          , et al.,
          <article-title>Cloud digital forensics: Beyond tools, techniques, and challenges</article-title>
          ,
          <source>Sensors</source>
          <volume>24</volume>
          (
          <year>2024</year>
          ). doi:
          <volume>10</volume>
          .3390/s24020433
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <surname>Exterro</surname>
          </string-name>
          ,
          <source>FTK imager 4.7.3.81</source>
          ,
          <year>2025</year>
          . URL: https://www.exterro.com/ftk-product
          <source>-downloads/ftkimager-4-7-3-81</source>
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <surname>Cellebrite</surname>
          </string-name>
          ,
          <string-name>
            <surname>Cellebrite</surname>
            <given-names>UFED</given-names>
          </string-name>
          ,
          <article-title>The industry standard for lawfully accessing and collecting digital data</article-title>
          ,
          <year>2025</year>
          . URL: https://cellebrite.com/en/ufed/
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <surname>Guidancesoftware</surname>
            ,
            <given-names>OpenText Forensic</given-names>
          </string-name>
          (EnCase),
          <year>2025</year>
          . URL: https://www.guidancesoftware.com/encase-forensic
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <surname>X-Ways</surname>
          </string-name>
          ,
          <article-title>X-Ways forensics: Integrated computer forensics software</article-title>
          ,
          <year>2025</year>
          . URL: https://xways.net/forensics/
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <surname>Ccleaner</surname>
          </string-name>
          ,
          <article-title>Recuva, recover your deleted files quickly and easily, 2025</article-title>
          . URL: https://www.ccleaner.com/recuva
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <surname>R-Studio</surname>
          </string-name>
          ,
          <article-title>Disk recovery software and hard drive recovery tool</article-title>
          ,
          <year>2025</year>
          . URL: https://www.rstudio.com/
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <article-title>Wireshark.org, The world's most popular network protocol analyzer</article-title>
          ,
          <year>2025</year>
          . URL: https://www.wireshark.org/
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>Network</given-names>
            <surname>Miner</surname>
          </string-name>
          ,
          <year>2025</year>
          . URL: https://www.netresec.com/?page=NetworkMiner
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <surname>Oxygenforensics</surname>
          </string-name>
          .Com, Oxygen Forensic Suite,
          <year>2025</year>
          . URL: https://www.oxygen-forensic.com/en/products/oxygen-forensic-detective
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <surname>Magnetforensics</surname>
          </string-name>
          .Com,
          <string-name>
            <surname>Magnet</surname>
            <given-names>AXIOM</given-names>
          </string-name>
          ,
          <year>2025</year>
          . URL: https://www.magnetforensics.com/ products/magnet-axiom/
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31]
          <string-name>
            <surname>Volatilityfoundation</surname>
          </string-name>
          , Volatility,
          <year>2025</year>
          . URL: https://www.volatilityfoundation.org/
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [32]
          <string-name>
            <surname>Belkasoft</surname>
          </string-name>
          ,
          <source>Belkasoft RAM Capturer</source>
          ,
          <year>2025</year>
          . URL: https://belkasoft.com/ram-capturer
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [33]
          <string-name>
            <surname>Mail</surname>
          </string-name>
           Xaminer,
          <source>Know MailXaminer's Range &amp; Areas of Investigation</source>
          ,
          <year>2025</year>
          . URL: https://www.mailxaminer.com/
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          [34]
          <fpage>Aid4Mail</fpage>
          ,
          <article-title>Software for email forensics</article-title>
          ,
          <source>eDiscovery &amp; Conversion</source>
          ,
          <year>2025</year>
          . URL: https://www.aid4mail.com/
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          [35]
          <string-name>
            <surname>Cloudnine</surname>
          </string-name>
          ,
          <article-title>Discovery document review software for law firms</article-title>
          and enterprises,
          <year>2025</year>
          . URL: https://cloudnine.com/ediscovery-software/cloudnine-review/
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          [36]
          <string-name>
            <surname>Nuix</surname>
          </string-name>
          .Com,
          <article-title>Helping to protect, govern and leverage enterprise data</article-title>
          ,
          <year>2025</year>
          . URL: https://www.nuix.com/
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          [37]
          <string-name>
            <given-names>R. </given-names>
            <surname>Marusenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
             
            <surname>Sokolov</surname>
          </string-name>
          ,
          <string-name>
            <surname>P.</surname>
          </string-name>
           Skladannyi,
          <article-title>Social engineering penetration testing in higher education institutions, Advances in Computer Science for Engineering and Education VI, vol</article-title>
          .
          <volume>181</volume>
          (
          <year>2023</year>
          )
          <fpage>1132</fpage>
          -
          <lpage>1147</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          [38]
          <string-name>
            <given-names>M.</given-names>
             
            <surname>Astafieva</surname>
          </string-name>
          , et al.,
          <article-title>Formation of high school students' resistance to destructive information influences</article-title>
          ,
          <source>in: Cybersecurity Providing in Information and Telecommunication Systems</source>
          , vol.
          <volume>3421</volume>
          (
          <year>2023</year>
          )
          <fpage>87</fpage>
          -
          <lpage>96</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          [39]
          <string-name>
            <given-names>V.</given-names>
             
            <surname>Buriachok</surname>
          </string-name>
          , et al.,
          <article-title>Implementation of active cybersecurity education in Ukrainian higher school</article-title>
          ,
          <source>Information Technology for Education, Science, and Technics</source>
          , vol.
          <volume>178</volume>
          (
          <year>2023</year>
          )
          <fpage>533</fpage>
          -
          <lpage>551</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>031</fpage>
          -35467-0_
          <fpage>32</fpage>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>