使用机器学习方法的高效计算机取证分析

Tanmay Toraskar, Ujwala M. Bhangale, Suchitra Patil, Neelkamal More
{"title":"使用机器学习方法的高效计算机取证分析","authors":"Tanmay Toraskar, Ujwala M. Bhangale, Suchitra Patil, Neelkamal More","doi":"10.1109/IBSSC47189.2019.8973099","DOIUrl":null,"url":null,"abstract":"In this digital era, the number of Cybercrimes is increasing that has resulted in increased number of pending cybercrimes cases such as artifacts as a malware, hacking and cyber fraud or e-harassment. In order to deal with these cases, digital forensics must include the concrete law enforcement in the court of law. In digital forensics, it is challenging task to detect reliable evidence because of worldwide use and advancements in digital communication technologies.Common approaches such as file signature analysis and the data carving can be done using the forensics tools, however, digital evidence examiners are keen to find the relevant data which helps in finding the truth behind the case. To reduce the examination time in the data examination or analysis process, this paper explores the role of unsupervised pattern recognition to identify the notable artefact. The Self-Organising Map (SOM) is used to automatically cluster notable artefacts. In this work, four cases are presented to demonstrate the use of SOM in examining the digital data saved in a CSV format. Multiple SOMs are created including Extension Mismatch SOM that represents the intentional changes done on the default extension of the file in order to hide it from the forensic examiner. Other types of SOM are created for the EXIF Metadata (i.e. MAC attributes). USB Device Attached (Device Make, Device Model, Device ID, Date/Time, Source File, Tags).","PeriodicalId":148941,"journal":{"name":"2019 IEEE Bombay Section Signature Conference (IBSSC)","volume":"162 4","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Efficient Computer Forensic Analysis Using Machine Learning Approaches\",\"authors\":\"Tanmay Toraskar, Ujwala M. Bhangale, Suchitra Patil, Neelkamal More\",\"doi\":\"10.1109/IBSSC47189.2019.8973099\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this digital era, the number of Cybercrimes is increasing that has resulted in increased number of pending cybercrimes cases such as artifacts as a malware, hacking and cyber fraud or e-harassment. In order to deal with these cases, digital forensics must include the concrete law enforcement in the court of law. In digital forensics, it is challenging task to detect reliable evidence because of worldwide use and advancements in digital communication technologies.Common approaches such as file signature analysis and the data carving can be done using the forensics tools, however, digital evidence examiners are keen to find the relevant data which helps in finding the truth behind the case. To reduce the examination time in the data examination or analysis process, this paper explores the role of unsupervised pattern recognition to identify the notable artefact. The Self-Organising Map (SOM) is used to automatically cluster notable artefacts. In this work, four cases are presented to demonstrate the use of SOM in examining the digital data saved in a CSV format. Multiple SOMs are created including Extension Mismatch SOM that represents the intentional changes done on the default extension of the file in order to hide it from the forensic examiner. Other types of SOM are created for the EXIF Metadata (i.e. MAC attributes). USB Device Attached (Device Make, Device Model, Device ID, Date/Time, Source File, Tags).\",\"PeriodicalId\":148941,\"journal\":{\"name\":\"2019 IEEE Bombay Section Signature Conference (IBSSC)\",\"volume\":\"162 4\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 IEEE Bombay Section Signature Conference (IBSSC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IBSSC47189.2019.8973099\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE Bombay Section Signature Conference (IBSSC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IBSSC47189.2019.8973099","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

在这个数字时代,网络犯罪的数量正在增加,这导致了越来越多的未决网络犯罪案件,如恶意软件、黑客攻击和网络欺诈或电子骚扰。为了处理这些案件,数字取证必须包括法庭上的具体执法。在数字取证中,由于数字通信技术的全球使用和进步,检测可靠证据是一项具有挑战性的任务。常见的方法,如文件签名分析和数据雕刻可以使用取证工具来完成,然而,数字证据审查员热衷于找到有助于找到案件背后真相的相关数据。为了减少数据检查或分析过程中的检查时间,本文探讨了无监督模式识别在识别显著伪影中的作用。自组织映射(SOM)用于自动聚类值得注意的工件。在这项工作中,提出了四个案例来演示SOM在检查以CSV格式保存的数字数据中的使用。创建多个SOM,包括扩展不匹配SOM,它表示对文件的默认扩展名所做的故意更改,以便将其隐藏在法医审查员之外。其他类型的SOM是为EXIF元数据创建的(即MAC属性)。USB设备连接(设备制造商,设备型号,设备ID,日期/时间,源文件,标签)。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Efficient Computer Forensic Analysis Using Machine Learning Approaches
In this digital era, the number of Cybercrimes is increasing that has resulted in increased number of pending cybercrimes cases such as artifacts as a malware, hacking and cyber fraud or e-harassment. In order to deal with these cases, digital forensics must include the concrete law enforcement in the court of law. In digital forensics, it is challenging task to detect reliable evidence because of worldwide use and advancements in digital communication technologies.Common approaches such as file signature analysis and the data carving can be done using the forensics tools, however, digital evidence examiners are keen to find the relevant data which helps in finding the truth behind the case. To reduce the examination time in the data examination or analysis process, this paper explores the role of unsupervised pattern recognition to identify the notable artefact. The Self-Organising Map (SOM) is used to automatically cluster notable artefacts. In this work, four cases are presented to demonstrate the use of SOM in examining the digital data saved in a CSV format. Multiple SOMs are created including Extension Mismatch SOM that represents the intentional changes done on the default extension of the file in order to hide it from the forensic examiner. Other types of SOM are created for the EXIF Metadata (i.e. MAC attributes). USB Device Attached (Device Make, Device Model, Device ID, Date/Time, Source File, Tags).
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信