Published: 2025-08-01
Opportunities and Challenges of Artificial Intelligence in Digital Forensics
DOI: 10.35870/ijsecs.v5i2.4371
Syifaurachman Syifaurachman
Abstract
Digital forensics research remains constrained, while the rapidly evolving digital landscape renders traditional forensic methodologies increasingly inadequate for modern investigative challenges. This work conducts a systematic literature review and bibliometric analysis of computer forensics, specifically targeting digital forensics applications. The study employed a systematic literature evaluation of the Scopus database using "Computer Forensic" as the search term within article titles, abstracts, and keywords. The initial search retrieved 3,222 publications, subsequently refined to 120 academic articles through PRISMA methodology with inclusion criteria encompassing computer science subject areas, final journal articles, English language publications, and open access availability. Three research questions guide this investigation: examining future digital forensic research directions, analyzing current research methodologies, and identifying practical and theoretical implications. Data collection occurred on May 21, 2025, with analysis performed using VOS Viewer bibliometric software. Results reveal that digital forensics research predominantly originates from industrialized nations, particularly the United States and Europe, accounting for 49 of 120 examined articles (40.83%), while Asian and African contributions remain substantially underrepresented. The analysis identified a four-stage digital forensics implementation framework: identification, collection, analysis, and preservation. Furthermore, the investigation examined artificial intelligence applications in digital forensics, particularly NLP-based approaches and machine learning algorithms including CNN models for forensic processes. While AI has revolutionized digital forensics by enhancing accuracy, efficiency, and investigative effectiveness, the analysis reveals persistent challenges including algorithmic bias, data privacy concerns, and decision-making transparency issues. Future research should incorporate additional databases such as Web of Science to enhance data quality and scope. The integration of AI and machine learning models across digital forensics stages promises to deliver more precise and thorough investigative outcomes.
Keywords
Computer Forensics ; Digital Forensics ; Literature Review ; Artificial Intelligence
Article Metadata
Peer Review Process
This article has undergone a double-blind peer review process to ensure quality and impartiality.
Indexing Information
Discover where this journal is indexed at our indexing page to understand its reach and credibility.
Open Science Badges
This journal supports transparency in research and encourages authors to meet criteria for Open Science Badges by sharing data, materials, or preregistered studies.
How to Cite
Article Metrics
- Views0
- Downloads0
- Scopus Citations
- Google Scholar
- Crossref Citations
- Semantic Scholar
- DataCite Metrics
If the link doesn't work, copy the DOI or article title for manual search (API Maintenance).
Article Information
This article has been peer-reviewed and published in the International Journal Software Engineering and Computer Science (IJSECS). The content is available under the terms of the Creative Commons Attribution 4.0 International License.
-
Issue: Vol. 5 No. 2 (2025)
-
Section: Articles
-
Published: August 1, 2025
-
License: CC BY 4.0
-
Copyright: © 2025 Authors
-
DOI: 10.35870/ijsecs.v5i2.4371
AI Research Hub
This article is indexed and available through various AI-powered research tools and citation platforms. Our AI Research Hub ensures that scholarly work is discoverable, accessible, and easily integrated into the global research ecosystem. By leveraging artificial intelligence for indexing, recommendation, and citation analysis, we enhance the visibility and impact of published research.




-
Nelufule, N., Singano, T., & Masango, M. (2024). A comprehensive exploration of digital forensics investigations in embedded systems, ubiquitous computing, fog computing, and edge computing. In 7th International Conference on Artificial Intelligence, Big Data, Computing and Data Communication Systems, icABCD 2024 - Proceedings. IEEE. https://doi.org/10.1109/icABCD62167.2024.10645254
-
Fakhouri, H. N., Alsharaiah, M. A., Al Hwaitat, A. K., Alkalaileh, M., & Dweikat, F. F. (2024). Overview of challenges faced by digital forensic. In 2nd International Conference on Cyber Resilience, ICCR 2024. IEEE. https://doi.org/10.1109/ICCR61006.2024.10532850
-
Firdonsyah, A., Purwanto, P., & Riadi, I. (2023). Framework for digital forensic ethical violations: A systematic literature review. In E3S Web of Conferences (Vol. 448, Article 01003). EDP Sciences. https://doi.org/10.1051/e3sconf/202344801003
-
Adel, A., Ahsan, A., & Davison, C. (2024). ETHICore: Ethical compliance and oversight framework for digital forensic readiness. Information, 15(6), Article 363. https://doi.org/10.3390/info15060363
-
Mpungu, C., George, C., & Mapp, G. (2023). Developing a novel digital forensics readiness framework for wireless medical networks using specialised logging. In Advanced Sciences and Technologies for Security Applications (pp. 203-226). Springer. https://doi.org/10.1007/978-3-031-20160-8_12
-
Akotoye, F. X. K., Adeyemi, R. I., & Venter, H. S. (2020). A study on problems of behaviour-based user attribution in computer forensic investigation. In European Conference on Information Warfare and Security, ECCWS (pp. 458-465). https://doi.org/10.34190/EWS.20.117
-
Rawat, R., Oki, O. A., Chakrawarti, R. K., Adekunle, T. S., Lukose, J. M., & Ajagbe, S. A. (2023). Autonomous artificial intelligence systems for fraud detection and forensics in dark web environments. Informatica, 47(9), 51-62. https://doi.org/10.31449/INF.V46I9.4538
-
Dimpe, P. M., & Kogeda, O. P. (2018). Generic digital forensic requirements. In 2018 Open Innovations Conference, OI 2018 (pp. 240-245). IEEE. https://doi.org/10.1109/OI.2018.8535924
-
Chin, J. M., Arabia, A.-M., McKinnon, M., Page, M. J., & Searston, R. A. (2024). A plan for systematic reviews for high-need areas in forensic science. Forensic Science International: Synergy, 9, Article 100542. https://doi.org/10.1016/j.fsisyn.2024.100542
-
-
Nelufule, N., Singano, T., & Masango, M. (2024). A comprehensive exploration of digital forensics investigations in embedded systems, ubiquitous computing, fog computing, and edge computing. In 7th International Conference on Artificial Intelligence, Big Data, Computing and Data Communication Systems, icABCD 2024 - Proceedings. IEEE. https://doi.org/10.1109/icABCD62167.2024.10645254
-
Firdonsyah, A., Purwanto, P., & Riadi, I. (2023). Framework for digital forensic ethical violations: A systematic literature review. In E3S Web of Conferences (Vol. 448, Article 01003). EDP Sciences. https://doi.org/10.1051/e3sconf/202344801003
-
Zareen, M. S., Aslam, B., Tahir, S., Rasheed, I., & Khan, F. (2024). Unveiling the dynamic landscape of digital forensics: The endless pursuit. Computers, 13(12), Article 333. https://doi.org/10.3390/computers13120333
-
Alqahtany, S. S., & Syed, T. A. (2024). ForensicTransMonitor: A comprehensive blockchain approach to reinvent digital forensics and evidence management. Information, 15(2), Article 109. https://doi.org/10.3390/info15020109
-
Felemban, M., Ghaleb, M., Saaim, K., Alsaleh, S., & Almulhem, A. (2024). File fragment type classification using light-weight convolutional neural networks. IEEE Access, 12, 157179-157191. https://doi.org/10.1109/ACCESS.2024.3486180
-
Singh, A., Singh, S. K., Vege, H. K., & Singh, N. (2022). A framework for crime detection and diminution in digital forensics (CD3F). International Journal of Advanced Computer Science and Applications, 13(9), 332-345. https://doi.org/10.14569/IJACSA.2022.0130939
-
Adkins, J., Al Bataineh, A., & Khalaf, M. (2024). Identifying persons of interest in digital forensics using NLP-based AI. Future Internet, 16(11), Article 426. https://doi.org/10.3390/fi16110426
-
Ninos, F., Karalas, K., Dechouniotis, D., & Polemis, M. (2025). On microservice-based architecture for digital forensics applications: A competition policy perspective. Future Internet, 17(4), Article 137. https://doi.org/10.3390/fi17040137
-
Kim, J., Son, B., Yu, J., & Yun, J. (2024). AI-driven prioritization and filtering of Windows artifacts for enhanced digital forensics. Computers, Materials & Continua, 81(2), 3371-3393. https://doi.org/10.32604/cmc.2024.057234
-
Purnaye, P., & Kulkarni, V. (2022). BiSHM: Evidence detection and preservation model for cloud forensics. Open Computer Science, 12(1), 154-170. https://doi.org/10.1515/comp-2022-0241
-
Todd, M. C., & Peterson, G. L. (2024). Temporal metadata analysis: A learning classifier system approach. Forensic Science International: Digital Investigation, 51, Article 301842. https://doi.org/10.1016/j.fsidi.2024.301842
-
Maia, E., Sousa, N., Oliveira, N., Wannous, S., Sousa, O., & Praça, I. (2022). SMS-I: Intelligent security for cyber–physical systems. Information, 13(9), Article 403. https://doi.org/10.3390/info13090403
-
Oh, D. B., Kim, D., & Kim, H. K. (2024). volGPT: Evaluation on triaging ransomware process in memory forensics with Large Language Model. Forensic Science International: Digital Investigation, 49, Article 301756. https://doi.org/10.1016/j.fsidi.2024.301756
-
Chimmanee, K., & Jantavongso, S. (2024). Digital forensic of Maze ransomware: A case of electricity distributor enterprise in ASEAN. Expert Systems with Applications, 249, Article 123652. https://doi.org/10.1016/j.eswa.2024.123652
-
Ng, M., James, J., & Bull, R. (2024). 'What you say in the lab, stays in the lab': A reflexive thematic analysis of current challenges and future directions of digital forensic investigations in the UK. Forensic Science International: Digital Investigation, 51, Article 301839. https://doi.org/10.1016/j.fsidi.2024.301839
-
Chanthiran, M., Ibrahim, A., Abdul Rahman, M. H., Kumar, S., & Dandage, D.-R. (2022, June). A systematic literature review with bibliometric meta-analysis of AI technology adoption in education. EDUCATUM Journal of Science, Mathematics and Technology, 9, 61-71. https://doi.org/10.37134/ejsmt.vol9.sp.7.2022
-
Buchholz, F., & Spafford, E. H. (2007). Run-time label propagation for forensic audit data. Computers & Security, 26(7-8), 496-513. https://doi.org/10.1016/j.cose.2007.07.002
-
Khalid, Z., Iqbal, F., & Fung, B. C. M. (2024). Towards a unified XAI-based framework for digital forensic investigations. Forensic Science International: Digital Investigation, 50, Article 301806. https://doi.org/10.1016/j.fsidi.2024.301806
-
Yang, H., Kim, J., & Park, J. (2024). Video source identification using machine learning: A case study of 16 instant messaging applications. Forensic Science International: Digital Investigation, 50, Article 301812. https://doi.org/10.1016/j.fsidi.2024.301812
-
Kao, H.-H. (2025). Accelerating multilingual cryptocurrency forensics: An NLP-driven approach for efficient mnemonic identification. IEEE Access, 13, 10513-10526. https://doi.org/10.1109/ACCESS.2025.3528829
-
Joseph, D. P., & Perumal, V. (2025). Optimizing forensic file classification: Enhancing SFCS with βk hyperparameter tuning. PeerJ Computer Science, 11, Article e2608. https://doi.org/10.7717/peerj-cs.2608
-
Nisioti, A., Loukas, G., Laszka, A., & Panaousis, E. (2021). Data-driven decision support for optimizing cyber forensic investigations. IEEE Transactions on Information Forensics and Security, 16, 2397-2412. https://doi.org/10.1109/TIFS.2021.3054966
-
Obioha, J. I., Mohan, A. P., & Louafi, H. (2023). Digital evidence collection in IoT environment. In Innovations in Digital Forensics (pp. 263-292). World Scientific. https://doi.org/10.1142/9789811273209_0008
-
Steele, J. (2007). Digital forensics and analyzing data. In Alternate Data Storage Forensics (pp. 1-38). Syngress. https://doi.org/10.1016/B978-159749163-1/50001-9
-
Barrère, M., Betarte, G., & Rodriguez, M. (2011). Towards machine-assisted formal procedures for the collection of digital evidence. In 2011 9th Annual International Conference on Privacy, Security and Trust, PST 2011 (pp. 32-35). IEEE. https://doi.org/10.1109/PST.2011.5971960
-
Bryant, R. (2016). Criminological and psychological perspectives. In Policing Digital Crime (pp. 43-61). Routledge. https://doi.org/10.4324/9781315601083-8
-
Kennedy, I., & Day, E. (2016). Digital forensic analysis. In Policing Digital Crime (pp. 161-185). Routledge. https://doi.org/10.4324/9781315601083-14
-
Abdul-Samad, A., Md Siraj, M., Hajar Othman, S., Hafiz Rahman, M., & Zaharudin Ahmad Darus, M. (2024). Comprehensive review on data preservation models and standards in digital forensic. In 2024 International Conference on Data Science and Its Applications, ICoDSA 2024 (pp. 277-282). IEEE. https://doi.org/10.1109/ICoDSA62899.2024.10651616
-
Granja, F. M., & Rafael, G. D. R. (2015). Preservation of digital evidence: Application in criminal investigation. In Proceedings of the 2015 Science and Information Conference, SAI 2015 (pp. 1284-1292). IEEE. https://doi.org/10.1109/SAI.2015.7237309
-
Granja, F. M., & Rodríguez, G. (2015). Digital preservation and criminal investigation: A pending subject. In Advances in Intelligent Systems and Computing (pp. 299-309). Springer. https://doi.org/10.1007/978-3-319-16486-1_30.

This work is licensed under a Creative Commons Attribution 4.0 International License.
Copyright and Licensing Agreement
Authors who publish with this journal agree to the following terms:
1. Copyright Retention and Open Access License
- Authors retain full copyright of their work
- Authors grant the journal right of first publication under the Creative Commons Attribution 4.0 International License (CC BY 4.0)
- This license allows unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited
2. Rights Granted Under CC BY 4.0
Under this license, readers are free to:
- Share — copy and redistribute the material in any medium or format
- Adapt — remix, transform, and build upon the material for any purpose, including commercial use
- No additional restrictions — the licensor cannot revoke these freedoms as long as license terms are followed
3. Attribution Requirements
All uses must include:
- Proper citation of the original work
- Link to the Creative Commons license
- Indication if changes were made to the original work
- No suggestion that the licensor endorses the user or their use
4. Additional Distribution Rights
Authors may:
- Deposit the published version in institutional repositories
- Share through academic social networks
- Include in books, monographs, or other publications
- Post on personal or institutional websites
Requirement: All additional distributions must maintain the CC BY 4.0 license and proper attribution.
5. Self-Archiving and Pre-Print Sharing
Authors are encouraged to:
- Share pre-prints and post-prints online
- Deposit in subject-specific repositories (e.g., arXiv, bioRxiv)
- Engage in scholarly communication throughout the publication process
6. Open Access Commitment
This journal provides immediate open access to all content, supporting the global exchange of knowledge without financial, legal, or technical barriers.