Diverging deep learning cognitive computing techniques into cyber forensics

More than ever before, the world is nowadays experiencing increased cyber-attacks in all areas of our daily lives. This situation has made combating cybercrimes a daily struggle for both individuals and organisations. Furthermore, this struggle has been aggravated by the fact that today's cybercriminals have gone a step ahead and are able to employ complicated cyber-attack techniques. Some of those techniques are minuscule and inconspicuous in nature and often camouflage in the facade of authentic requests and commands. In order to combat this menace, especially after a security incident has happened, cyber security professionals as well as digital forensic investigators are always forced to sift through large and complex pools of data also known as Big Data in an effort to unveil Potential Digital Evidence (PDE) that can be used to support litigations. Gathered PDE can then be used to help investigators arrive at particular conclusions and/or decisions. In the case of cyber forensics, what makes the process even tough for investigators is the fact that Big Data often comes from multiple sources and has different file formats. Forensic investigators often have less time and budget to handle the increased demands when it comes to the analysis of these large amounts of complex data for forensic purposes. It is for this reason that the authors in this paper have realised that Deep Learning (DL), which is a subset of Artificial Intelligence (AI), has very distinct use-cases in the domain of cyber forensics, and even if many people might argue that it’s not an unrivalled solution, it can help enhance the fight against cybercrime. This paper therefore proposes a generic framework for diverging DL cognitive computing techniques into Cyber Forensics (CF) hereafter referred to as the DLCF Framework. DL uses some machine learning techniques to solve problems through the use of neural networks that simulate human decision-making. Based on these grounds, DL holds the potential to dramatically change the domain of CF in a variety of ways as well as provide solutions to forensic investigators. Such solutions can range from, reducing bias in forensic investigations to challenging what evidence is considered admissible in a court of law or any civil hearing and many more.

[1]  Erik Cambria,et al.  Recent Trends in Deep Learning Based Natural Language Processing , 2017, IEEE Comput. Intell. Mag..

[2]  Jiajun Wu,et al.  Deep multiple instance learning for image classification and auto-annotation , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[3]  Hein S. Venter,et al.  Harmonised digital forensic investigation process model , 2012, 2012 Information Security for South Africa.

[4]  Fabio Roli,et al.  Machine learning in computer forensics (and the lessons learned from machine learning in computer security) , 2011, AISec '11.

[5]  Nickson M. Karie,et al.  Towards a framework for enhancing potential digital evidence presentation , 2013, 2013 Information Security for South Africa.

[6]  Dianne Easterling,et al.  March , 1890, The Hospital.

[7]  Tang Ling The Study of Computer Forensics on Linux , 2013, 2013 International Conference on Computational and Information Sciences.

[8]  Sateesh Kumar Pradhan,et al.  Applying Data Mining techniques in Cyber Crimes , 2017, 2017 2nd International Conference on Anti-Cyber Crimes (ICACC).

[9]  Chung-Huang Yang,et al.  Fast Deployment of Computer Forensics with USBs , 2010, 2010 International Conference on Broadband, Wireless Computing, Communication and Applications.

[10]  Jianfeng Wang,et al.  Kernel-based deep learning for intelligent data analysis , 2017, 2017 First International Conference on Electronics Instrumentation & Information Systems (EIIS).

[11]  Todd-Malmlov April , 1872, The Hospital.

[12]  Hüseyin Çakir,et al.  Applications of Artificial Intelligence Techniques to Combating Cyber Crimes: A Review , 2015, ArXiv.

[13]  Parag H Rughani,et al.  MACHINE LEARNING FORENSICS:A NEW BRANCH OF DIGITAL FORENSICS , 2017 .

[14]  Angshul Majumdar,et al.  Noisy deep dictionary learning: Application to Alzheimer's Disease classification , 2017, 2017 International Joint Conference on Neural Networks (IJCNN).

[15]  Yan Zhang,et al.  Research on the Key Technology of Secure Computer Forensics , 2010, 2010 Third International Symposium on Intelligent Information Technology and Security Informatics.

[16]  Frank Stewart,et al.  June , 1890, The Hospital.

[17]  Danna Zhou,et al.  d. , 1934, Microbial pathogenesis.

[18]  Mohamed AbdElhamid Abbas,et al.  Improving deep learning performance using random forest HTM cortical learning algorithm , 2018, 2018 First International Workshop on Deep and Representation Learning (IWDRL).

[19]  Nickson M. Karie,et al.  A generic Digital Forensic Readiness model for BYOD using honeypot technology , 2016, 2016 IST-Africa Week Conference.

[20]  Lyal B. Harris November , 1890, The Hospital.

[22]  Hein S. Venter,et al.  Introduction of concurrent processes into the digital forensic investigation process , 2016 .

[23]  N. Sahu,et al.  Identify Uncertainty of Cyber Crime and Cyber Laws , 2013, 2013 International Conference on Communication Systems and Network Technologies.

[24]  Mohsen Guizani,et al.  Deep Learning for IoT Big Data and Streaming Analytics: A Survey , 2017, IEEE Communications Surveys & Tutorials.

[25]  F. Mitchell,et al.  The use of Artificial Intelligence in digital forensics: An introduction , 2014 .