Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao https://doi.org/10.1...arrow_drop_down
image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
https://doi.org/10.1109/ibssc4...
Article . 2019 . Peer-reviewed
License: STM Policy #29
Data sources: Crossref
versions View all 1 versions
addClaim

This Research product is the result of merged Research products in OpenAIRE.

You have already added 0 works in your ORCID record related to the merged Research product.

Efficient Computer Forensic Analysis Using Machine Learning Approaches

Authors: Tanmay Toraskar; Ujwala Bhangale; Suchitra Patil; Neelkamal More;

Efficient Computer Forensic Analysis Using Machine Learning Approaches

Abstract

In this digital era, the number of Cybercrimes is increasing that has resulted in increased number of pending cybercrimes cases such as artifacts as a malware, hacking and cyber fraud or e-harassment. In order to deal with these cases, digital forensics must include the concrete law enforcement in the court of law. In digital forensics, it is challenging task to detect reliable evidence because of worldwide use and advancements in digital communication technologies.Common approaches such as file signature analysis and the data carving can be done using the forensics tools, however, digital evidence examiners are keen to find the relevant data which helps in finding the truth behind the case. To reduce the examination time in the data examination or analysis process, this paper explores the role of unsupervised pattern recognition to identify the notable artefact. The Self-Organising Map (SOM) is used to automatically cluster notable artefacts. In this work, four cases are presented to demonstrate the use of SOM in examining the digital data saved in a CSV format. Multiple SOMs are created including Extension Mismatch SOM that represents the intentional changes done on the default extension of the file in order to hide it from the forensic examiner. Other types of SOM are created for the EXIF Metadata (i.e. MAC attributes). USB Device Attached (Device Make, Device Model, Device ID, Date/Time, Source File, Tags).

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average
Related to Research communities
Upload OA version
Are you the author of this publication? Upload your Open Access version to Zenodo!
It’s fast and easy, just two clicks!