Detection of Crime Patterns in Digital Forensic Investigation to Trace the Adversaries

Muhammad ilyas
{"title":"Detection of Crime Patterns in Digital Forensic Investigation to Trace the Adversaries","authors":"Muhammad ilyas","doi":"10.54692/lgurjcsit.2021.0502205","DOIUrl":null,"url":null,"abstract":"The use of the internet has increased significantly over the past couple of years. Access to the internet has become so common that a person without computer knowledge can also use this facility easily. This ease of availability has provided a lot of benefits to society but on the other hand misuse of the internet for personal or corporate benefits is also increasing. To prosecute cybercriminals and make some lawful checks on everyone's digital activities, digital forensic science comes into the light. In this context, we developed a new framework that improves the digital forensic investigation process. This research paper proposes a method in which we can identify the illegal activities and trace the adversaries. We capture the TCP (Transmission Control Protocol) packets from the servers and workstations. This data collected from the TCP log is stored in the database and preprocessed to eliminate redundant data. Furthermore, the database also contains past data. The proposed framework has three major processes collection of TCP packets, storing and preprocessing of collected data in a database, and mining of the pattern through a digital forensic anomaly collection algorithm. For the evaluation of our proposed framework, we have developed a java based application. The results are shown in the form of reports and tables.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2021-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Lahore Garrison University Research Journal of Computer Science and Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.54692/lgurjcsit.2021.0502205","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The use of the internet has increased significantly over the past couple of years. Access to the internet has become so common that a person without computer knowledge can also use this facility easily. This ease of availability has provided a lot of benefits to society but on the other hand misuse of the internet for personal or corporate benefits is also increasing. To prosecute cybercriminals and make some lawful checks on everyone's digital activities, digital forensic science comes into the light. In this context, we developed a new framework that improves the digital forensic investigation process. This research paper proposes a method in which we can identify the illegal activities and trace the adversaries. We capture the TCP (Transmission Control Protocol) packets from the servers and workstations. This data collected from the TCP log is stored in the database and preprocessed to eliminate redundant data. Furthermore, the database also contains past data. The proposed framework has three major processes collection of TCP packets, storing and preprocessing of collected data in a database, and mining of the pattern through a digital forensic anomaly collection algorithm. For the evaluation of our proposed framework, we have developed a java based application. The results are shown in the form of reports and tables.
数字取证调查中犯罪模式的检测以追踪对手
在过去的几年里,互联网的使用显著增加。接入互联网已经变得如此普遍,一个没有计算机知识的人也可以很容易地使用这个设施。这种易用性为社会带来了很多好处,但另一方面,滥用互联网为个人或企业利益也在增加。为了起诉网络罪犯并对每个人的数字活动进行合法检查,数字法医学应运而生。在此背景下,我们开发了一个新的框架,以改进数字法医调查过程。本文提出了一种识别非法活动和追踪对手的方法。我们从服务器和工作站捕获TCP(传输控制协议)数据包。从TCP日志中收集的数据存储在数据库中,并进行预处理以消除冗余数据。此外,数据库还包含过去的数据。该框架包括三个主要过程:TCP数据包的收集,收集到的数据在数据库中存储和预处理,以及通过数字取证异常收集算法挖掘模式。为了评估我们提出的框架,我们开发了一个基于java的应用程序。结果以报告和表格的形式显示。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信