Search Results: 1 - 10 of 100 matches for " "
All listed articles are free for downloading (OA Articles)
Page 1 /100
Display every page Item
An Approach for Managing Knowledge in Digital Forensics Examinations  [PDF]
April L. Tanne,David A. Dampie
International Journal of Computer Science and Security , 2010,
Abstract: Computers and digital devices are continuing to evolve in the areas of storage, processing power, memory, and features. Resultantly, digital forensic investigations are becoming more complex due to the increasing size of digital storage reaching gigabytes and terabytes. Due to this growth in disk storage, new approaches for managing the case details of a digital forensics investigation must be developed. In this paper, the importance of managing and reusing knowledge in digital forensic examinations is discussed, a modeling approach for managing knowledge is presented, and experimental results are presented that show how this modeling approach was used by law enforcement to manage the case details of a digital forensic examination.
Privacy Impacts of Data Encryption on the Efficiency of Digital Forensics Technology  [PDF]
Adedayo M. Balogun,Shao Ying Zhu
Computer Science , 2013,
Abstract: Owing to a number of reasons, the deployment of encryption solutions are beginning to be ubiquitous at both organizational and individual levels. The most emphasized reason is the necessity to ensure confidentiality of privileged information. Unfortunately, it is also popular as cyber-criminals' escape route from the grasp of digital forensic investigations. The direct encryption of data or indirect encryption of storage devices, more often than not, prevents access to such information contained therein. This consequently leaves the forensics investigation team, and subsequently the prosecution, little or no evidence to work with, in sixty percent of such cases. However, it is unthinkable to jeopardize the successes brought by encryption technology to information security, in favour of digital forensics technology. This paper examines what data encryption contributes to information security, and then highlights its contributions to digital forensics of disk drives. The paper also discusses the available ways and tools, in digital forensics, to get around the problems constituted by encryption. A particular attention is paid to the Truecrypt encryption solution to illustrate ideas being discussed. It then compares encryption's contributions in both realms, to justify the need for introduction of new technologies to forensically defeat data encryption as the only solution, whilst maintaining the privacy goal of users.
Farid Daryabar,Ali Dehghantanha,Nur Izura Udzir,Nor Fazlida binti Mohd Sani
International Journal of Cyber-Security and Digital Forensics , 2013,
Abstract: Nowadays, digital storage of computer data is moving toward cloud computing which is a set of infrastructure provides data storage for organizations and individuals. Due to this large scale, in case an attack occurs in the network of a cloud it would be a big challenge to investigate the cloud. Therefore, digital forensics in cloud computing is a new discipline related to the increasing use of computers, networks and digital storage devices in numerous criminal activities in both traditional and Hi-Tech. This study reviews the literature on some challenges in cloud computing forensic investigation, and it is followed by evaluation and analysis of all types of information on cloud computing and its impacts on computer forensic investigations in publishing alliances with the survey was carried out in the field.
Digital Forensics and Cyber Crime Datamining  [PDF]
K. K. Sindhu, B. B. Meshram
Journal of Information Security (JIS) , 2012, DOI: 10.4236/jis.2012.33024
Abstract: Digital forensics is the science of identifying, extracting, analyzing and presenting the digital evidence that has been stored in the digital devices. Various digital tools and techniques are being used to achieve this. Our paper explains forensic analysis steps in the storage media, hidden data analysis in the file system, network forensic methods and cyber crime data mining. This paper proposes a new tool which is the combination of digital forensic investigation and crime data mining. The proposed system is designed for finding motive, pattern of cyber attacks and counts of attacks types happened during a period. Hence the proposed tool enables the system administrators to minimize the system vulnerability.
Asou Aminnezhad,Ali Dehghantanha,Mohd Taufik Abdullah
International Journal of Cyber-Security and Digital Forensics , 2012,
Abstract: Privacy issues have always been a major concern in computer forensics and security and in case of any investigation whether it is pertaining to computer or not always privacy issues appear. To enable privacya€ s protection in the physical world we need the law that should be legislated, but in a digital world by rapidly growing of technology and using the digital devices more and more that generate a huge amount of private data it is impossible to provide fully protected space in cyber world during the transfer, store and collect data. Since its introduction to the field, forensics investigators, and developers have faced challenges in finding the balance between retrieving key evidences and infringing user privacy. This paper looks into developmental trends in computer forensics and security in various aspects in achieving such a balance. In addition, the paper analyses each scenario to determine the trend of solutions in these aspects and evaluate their effectiveness in resolving the aforementioned issues.
Visualization Techniques for Digital forensics: A Survey
Mr.Sushilkumar Chavhan, Ms.S.M.Nirkhi
International Journal of Advanced Computer Research , 2012,
Abstract: Digital crimes is big problem due to large numbersof data access and insufficient attack analysistechniques so there is the need for improvements inexisting digital forensics techniques. With growingsize of storage capacity these digital forensicinvestigations are getting more difficult.Visualization allows for displaying large amounts ofdata at once. Integrated visualization of datadistribution bars and rules, visualization ofbehaviour and comprehensive analysis, maps allowuser to analyze different rules and data at differentlevel, with any kind of anomaly in data. Datamining techniques helps to improve the process ofvisualization. These papers give comprehensivereview on various visualization techniques withvarious anomaly detection techniques.
Data Mining : A Prospective Approach for Digital Forensics
Smita M. Nirkhi,R.V.Dharaskar,V.M.Thakre
International Journal of Data Mining & Knowledge Management Process , 2012,
Abstract: Data mining is part of the interdisciplinary field of knowledge discovery in databases. Research on datamining began in the 1980s and grew rapidly in the 1990s.Specific techniques that have been developedwithin disciplines such as artificial intelligence, machine learning and pattern recognition have beensuccessfully employed in data mining. Data mining has been successfully introduced in many differentfields. An important application area for data mining techniques is the World Wide Web Recently, datamining techniques have also being applied to the field of criminal forensics nothing but Digital forensics.Examples include detecting deceptive criminal identities, identifying groups of criminals who are engagingin various illegal activities and many more. Data mining techniques typically aim to produce insight fromlarge volumes of data.
The Role of Self-Forensics in Vehicle Crash Investigations and Event Reconstruction  [PDF]
Serguei A. Mokhov
Computer Science , 2009,
Abstract: This paper further introduces and formalizes a novel concept of self-forensics for automotive vehicles, specified in the Forensic Lucid language. We argue that self-forensics, with the forensics taken out of the cybercrime domain, is applicable to "self-dissection" of intelligent vehicles and hardware systems for automated incident and anomaly analysis and event reconstruction by the software with or without the aid of the engineering teams in a variety of forensic scenarios. We propose a formal design, requirements, and specification of the self-forensic enabled units (similar to blackboxes) in vehicles that will help investigation of incidents and also automated reasoning and verification of theories along with the events reconstruction in a formal model. We argue such an analysis is beneficial to improve the safety of the passengers and their vehicles, like the airline industry does for planes.
Passive Forensics for Region Duplication Image Forgery Based on Harris Feature Points and Local Binary Patterns  [PDF]
Jie Zhao,Weifeng Zhao
Mathematical Problems in Engineering , 2013, DOI: 10.1155/2013/619564
Abstract: Nowadays the demand for identifying the authenticity of an image is much increased since advanced image editing software packages are widely used. Region duplication forgery is one of the most common and immediate tampering attacks which are frequently used. Several methods to expose this forgery have been developed to detect and locate the tampered region, while most methods do fail when the duplicated region undergoes rotation or flipping before being pasted. In this paper, an efficient method based on Harris feature points and local binary patterns is proposed. First, the image is filtered with a pixelwise adaptive Wiener method, and then dense Harris feature points are employed in order to obtain a sufficient number of feature points with approximately uniform distribution. Feature vectors for a circle patch around each feature point are extracted using local binary pattern operators, and the similar Harris points are matched based on their representation feature vectors using the BBF algorithm. Finally, RANSAC algorithm is employed to eliminate the possible erroneous matches. Experiment results demonstrate that the proposed method can effectively detect region duplication forgery, even when an image was distorted by rotation, flipping, blurring, AWGN, JPEG compression, and their mixed operations, especially resistant to the forgery with the flat area of little visual structures. 1. Introduction Nowadays, with the development of state-of-the-art digital image technologies and the widespread use of powerful image editing software, even people who are not experts in image processing can fake an image easily without leaving any visual tampering clues. Digital image forgeries, which seriously debase the credibility of photographic images as definite records of events, have become so widespread a problem that affects social and legal systems, forensic investigations, intelligence services, and security and surveillance systems. In order to recover people’s confidence in the authenticity of digital images, image forensics aiming to reveal forgery operations in digital images are receiving more and more attention. In recent years, many image forgery detection techniques have been proposed, which can be broadly classified into two categories: active approach and passive approach. Active image forensic techniques represented by digital watermark [1, 2] require prior knowledge about the original image, thus they are not automatic. In addition, the drawback of digital watermark is that an imperceptible digital code (a watermark) must be inserted at the time of
Towards Improving Validation, Verification, Crash Investigations, and Event Reconstruction of Flight-Critical Systems with Self-Forensics  [PDF]
Serguei A. Mokhov
Computer Science , 2009,
Abstract: This paper introduces a novel concept of self-forensics to complement the standard autonomic self-CHOP properties of the self-managed systems, to be specified in the Forensic Lucid language. We argue that self-forensics, with the forensics taken out of the cybercrime domain, is applicable to "self-dissection" for the purpose of verification of autonomous software and hardware systems of flight-critical systems for automated incident and anomaly analysis and event reconstruction by the engineering teams in a variety of incident scenarios during design and testing as well as actual flight data.
Page 1 /100
Display every page Item

Copyright © 2008-2017 Open Access Library. All rights reserved.