{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T06:32:46Z","timestamp":1774074766534,"version":"3.50.1"},"reference-count":0,"publisher":"Zarqa University","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IAJIT"],"published-print":{"date-parts":[[2025]]},"abstract":"<jats:p>Digital forensics is a critically important area of study dealing with the identification and combating of cyber threats in contemporary networked environments. In this paper, we investigate the possibility of utilizing Large Language Models (LLMs) to examine network traffic categorized as risky according to the University of New South Wales-Network-Based 2015 (UNSW-NB15) dataset. The study employs a multi-phase methodology that combines forensic analysis, evidence extraction, security recommendations, contextual evaluation, and detailed reporting. The results demonstrate high accuracy and qualitative performance across tasks. Automated metrics illustrate the forensic analysis with 95% accuracy, and evidence extraction with 94% precision and 95% coverage. Subjective self-assessment, followed by reviewing 100 examples processed through ChatGPT, shows that outputs have a very high level of clarity (5 out of 5) and relevance (4.5 out of 5). These results highlight the revolutionary role of LLMs in digital forensics with respect to precision, scope, and readability<\/jats:p>","DOI":"10.34028\/iajit\/22\/3\/15","type":"journal-article","created":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T07:53:01Z","timestamp":1746431581000},"source":"Crossref","is-referenced-by-count":12,"title":["Agile Proactive Cybercrime Evidence Analysis Model for Digital Forensics"],"prefix":"10.34028","volume":"22","author":[{"given":"Mohammad","family":"Al-Mousa","sequence":"first","affiliation":[]},{"given":"Waleed","family":"Amer","sequence":"additional","affiliation":[]},{"given":"Mosleh","family":"Abualhaj","sequence":"additional","affiliation":[]},{"given":"Sultan","family":"Albilasi","sequence":"additional","affiliation":[]},{"given":"Ola","family":"Nasir","sequence":"additional","affiliation":[]},{"given":"Ghassan","family":"Samara","sequence":"additional","affiliation":[]}],"member":"19944","published-online":{"date-parts":[[2025]]},"container-title":["The International Arab Journal of Information Technology"],"original-title":[],"language":"en","deposited":{"date-parts":[[2025,5,6]],"date-time":"2025-05-06T08:46:39Z","timestamp":1746521199000},"score":1,"resource":{"primary":{"URL":"https:\/\/iajit.org\/upload\/files\/Agile-Proactive-Cybercrime-Evidence-Analysis-Model-for-Digital-Forensics.pdf"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":0,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.34028\/iajit\/22\/3\/15","archive":["Internet Archive"],"relation":{},"ISSN":["2309-4524","1683-3198"],"issn-type":[{"value":"2309-4524","type":"electronic"},{"value":"1683-3198","type":"print"}],"subject":[],"published":{"date-parts":[[2025]]}}}