Statistical Sampling Approach to Investigate Child Pornography Cases

One of the pressing issues in cyber crime is to carry out efficient investigation in child pornography cases. The work in this paper presents an in-depth understanding and deployment of statistical analysis methodologies in the field of digital forensic, with the linkage of the MD5 hash value in conducting forensic investigations. More precisely, it highlights the challenges that forensic investigators are facing during an examination, such as the amount or the content of data. Furthermore, the paper presents the margins of forensic software when dealing with large quantities of data, and how the use of statistical analysis assists in reducing the investigation time and improving effectiveness and efficiency.

[1]  Max M. Houck,et al.  Encyclopedia of Forensic Sciences , 2013 .

[2]  N. Fenton,et al.  On limiting the use of Bayes in presenting forensic evidence , 2012 .

[3]  Eric Thompson MD5 collisions and the impact on computer forensics , 2005, Digit. Investig..

[4]  A. Reyes,et al.  Cyber Crime Investigations: Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutors , 2007 .

[5]  R. Jones,et al.  Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet , 2003, Int. J. Law Inf. Technol..

[6]  Stéphane Manuel,et al.  Classification and generation of disturbance vectors for collision attacks against SHA-1 , 2011, Des. Codes Cryptogr..

[7]  A. Smith,et al.  Research Methodology: A Step-by-step Guide for Beginners , 2012 .

[8]  Eoghan Casey,et al.  Digital Evidence and Computer Crime - Forensic Science, Computers and the Internet, 3rd Edition , 2011 .

[9]  Ab Stract,et al.  Id entification and Analysis of hard disk drive in digital forensic , 2011 .

[10]  Michael J. Panik Advanced Statistics from an Elementary Point of View , 2005 .

[11]  Michael Chung Kimberly Spal Bamberger,et al.  Integrating Quantitative and Qualitative Research in Development Projects , 2000 .

[12]  James R. Lewis,et al.  When 100% really isn't 100%: improving the accuracy of small-sample estimates of completion rates , 2006 .

[13]  Ernest Sosa,et al.  The Blackwell Guide to Epistemology , 1999 .

[14]  Issa Traoré,et al.  The Proactive and Reactive Digital Forensics Investigation Process: A Systematic Literature Review , 2011, ISA.

[15]  Sean J. Geoghegan,et al.  The evaluation of MD5 hash tools as a digital forensics class experiment , 2009 .

[16]  Vassil Roussev,et al.  Hashing and Data Fingerprinting in Digital Forensics , 2009, IEEE Security & Privacy.

[17]  Francisco J. Samaniego,et al.  A Comparison of the Bayesian and Frequentist Approaches to Estimation , 2010 .

[18]  R. Murray Thomas,et al.  Blending qualitative & quantitative research methods in theses and dissertations , 2003 .