S. H. Mokhtar, Gopinath Muruti, Z. Ibrahim, Fiza Abdul Rahim, Hairoladenan Kasim
{"title":"大数据环境下证据提取技术综述","authors":"S. H. Mokhtar, Gopinath Muruti, Z. Ibrahim, Fiza Abdul Rahim, Hairoladenan Kasim","doi":"10.1109/ICSCEE.2018.8538437","DOIUrl":null,"url":null,"abstract":"Today, information era where data is being generated at high in volume, variety, and velocity, a new technology is needed to cope with such data. Companies are no longer depends on the traditional tools and techniques to cater and handle data. Not only ending on how to store and process the data, they also wanted to gain insight of the data to optimize business process and gain a larger profit. To satisfy these requirements, a good analytic method must be applied to big data in order to extract value and knowledge from these data sets. While computer engineers are working on that part, this valuable data is also being eyed somewhere else. New attacks and attempts to taint the security, privacy, and integrity of the data are being developed somewhere without we knowing. This paper aims to analyze different analytics methods and tools, which can be applied in big data environment, in actionable time while at the same time extract evidence of intrusion in order for the results to be presented in a court of law fitting a digital forensic process.","PeriodicalId":265737,"journal":{"name":"2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Review of Evidence Extraction Techniques in Big Data Environment\",\"authors\":\"S. H. Mokhtar, Gopinath Muruti, Z. Ibrahim, Fiza Abdul Rahim, Hairoladenan Kasim\",\"doi\":\"10.1109/ICSCEE.2018.8538437\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Today, information era where data is being generated at high in volume, variety, and velocity, a new technology is needed to cope with such data. Companies are no longer depends on the traditional tools and techniques to cater and handle data. Not only ending on how to store and process the data, they also wanted to gain insight of the data to optimize business process and gain a larger profit. To satisfy these requirements, a good analytic method must be applied to big data in order to extract value and knowledge from these data sets. While computer engineers are working on that part, this valuable data is also being eyed somewhere else. New attacks and attempts to taint the security, privacy, and integrity of the data are being developed somewhere without we knowing. This paper aims to analyze different analytics methods and tools, which can be applied in big data environment, in actionable time while at the same time extract evidence of intrusion in order for the results to be presented in a court of law fitting a digital forensic process.\",\"PeriodicalId\":265737,\"journal\":{\"name\":\"2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)\",\"volume\":\"39 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSCEE.2018.8538437\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSCEE.2018.8538437","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Review of Evidence Extraction Techniques in Big Data Environment
Today, information era where data is being generated at high in volume, variety, and velocity, a new technology is needed to cope with such data. Companies are no longer depends on the traditional tools and techniques to cater and handle data. Not only ending on how to store and process the data, they also wanted to gain insight of the data to optimize business process and gain a larger profit. To satisfy these requirements, a good analytic method must be applied to big data in order to extract value and knowledge from these data sets. While computer engineers are working on that part, this valuable data is also being eyed somewhere else. New attacks and attempts to taint the security, privacy, and integrity of the data are being developed somewhere without we knowing. This paper aims to analyze different analytics methods and tools, which can be applied in big data environment, in actionable time while at the same time extract evidence of intrusion in order for the results to be presented in a court of law fitting a digital forensic process.