The Adoption of Automation in Cyber Forensics

Cybercrime has increased considerably over the past years, emphasizing the need for efficient investigations. Currently, some tools and processes are manual and lead to long and inaccurate investigations. This report provides a descriptive review of the of published research in the field of cyber forensics, in order to identify current practices, challenges and the adoption of automation. A pragmatist approach was taken to accommodate the multitude of theories and views presented in the literature. The research illustrates how the use of technology could simplify an investigators task and solving difficulties that currently exist in cyber forensics. The paper concludes in motivating for the use of automated practices in the cyber forensic process.

[1]  Peter Norvig,et al.  Artificial Intelligence: A Modern Approach , 1995 .

[2]  Jonathan Grier,et al.  Detecting data theft using stochastic forensics , 2011, Digit. Investig..

[3]  Terrill L. Frantz,et al.  Communication Networks from the Enron Email Corpus “It's Always About the People. Enron is no Different” , 2005, Comput. Math. Organ. Theory.

[4]  Jan W. Rivkin,et al.  Federal Bureau of Investigation (A) , 2007 .

[5]  Ramlan Mahmoud,et al.  Digital forensics trends and future , 2013 .

[6]  George M. Mohay,et al.  A Model for Computer Profiling , 2010, 2010 International Conference on Availability, Reliability and Security.

[7]  Jason Sachowski Implementing Digital Forensic Readiness: From Reactive to Proactive Process , 2016 .

[8]  Raymond A. Hansen,et al.  Forensics as a Service: Three-Tier Architecture for Cloud Based Forensic Analysis , 2016, 2016 15th International Symposium on Parallel and Distributed Computing (ISPDC).

[9]  Joshua James,et al.  Challenges with Automation in Digital Forensic Investigations , 2013, ArXiv.

[10]  Sriram Raghavan,et al.  Digital forensic research: current state of the art , 2012, CSI Transactions on ICT.

[11]  Tim Storer,et al.  Calm Before the Storm: The Challenges of Cloud Computing in Digital Forensics , 2014, Int. J. Digit. Crime Forensics.

[12]  Marco Lovato A race against the machine: has the threat of technologicalunemployment finally become true , 2017 .

[13]  Vassil Roussev,et al.  Automated evaluation of approximate matching algorithms on real data , 2014, Digit. Investig..

[14]  Daniel B. Garrie,et al.  Digital Forensic Evidence in the Courtroom: Understanding Content and Quality , 2014 .

[15]  Weidong Shi,et al.  Forensics-as-a-Service (FaaS): Computer Forensic Workflow Management and Processing Using Cloud , 2013, CLOUD 2013.

[16]  Célia Ghedini Ralha,et al.  Artificial intelligence applied to computer forensics , 2009, SAC '09.

[17]  Christopher J. Singleton,et al.  Auto Industry Jobs in the 1980's: A Decade of Transition , 1992 .

[18]  Chris Buzelli,et al.  Next-Generation DIGITAL FORENSICS , 2006 .

[19]  Steven Furnell,et al.  A suspect-oriented intelligent and automated computer forensic analysis , 2016, Digit. Investig..

[20]  Joshua James,et al.  Analysis of Evidence Using Formal Event Reconstruction , 2009, ICDF2C.

[21]  Inikpi Onechojo Ademu A Comprehensive Digital Forensic Investigation Model and Guidelines for Establishing Admissible Digital Evidence , 2013 .

[22]  Qiru Zhou,et al.  Robust endpoint detection and energy normalization for real-time speech and speaker recognition , 2002, IEEE Trans. Speech Audio Process..

[23]  Ken Goldberg,et al.  Cloud Robotics and Automation: A Survey of Related Work , 2013 .

[24]  Johan Stahre,et al.  Levels of automation in manufacturing , 2008 .

[25]  Alastair Irons,et al.  Digital Forensics to Intelligent Forensics , 2014, Future Internet.

[26]  Ibrahim M. Baggili,et al.  Data Sources for Advancing Cyber Forensics: What the Social World Has to Offer , 2015, AAAI Spring Symposia.

[27]  Mohammed J. Zaki,et al.  Finding Hidden Group Structure in a Stream of Communications , 2006, ISI.

[28]  Kim-Kwang Raymond Choo,et al.  Impacts of increasing volume of digital forensic data: A survey and future research challenges , 2014, Digit. Investig..

[29]  Simson L. Garfinkel,et al.  Forensic feature extraction and cross-drive analysis , 2006, Digit. Investig..

[30]  Timo Steffens,et al.  Understanding Agent Systems , 2004, Künstliche Intell..

[31]  Simson L. Garfinkel,et al.  Digital forensics research: The next 10 years , 2010, Digit. Investig..

[32]  Katharina Wagner,et al.  Digital Evidence And Computer Crime Forensic Science Computers And The Internet , 2016 .

[33]  O. Ribaux,et al.  Intelligence-led crime scene processing. Part II: Intelligence and crime scene examination. , 2010, Forensic Science International.

[34]  Jiebo Luo,et al.  Beyond pixels: Exploiting camera metadata for photo classification , 2005, Pattern Recognit..

[35]  Nicole Beebe,et al.  Digital Forensic Research: The Good, the Bad and the Unaddressed , 2009, IFIP Int. Conf. Digital Forensics.

[36]  Julie A. Adams,et al.  Multiagent Systems: A Modern Approach to Distributed Artificial Intelligence , 2001, AI Mag..

[37]  Ankit Agarwal,et al.  Systematic Digital Forensic Investigation Model , 2011 .

[38]  Guigang Zhang,et al.  Deep Learning , 2016, Int. J. Semantic Comput..

[39]  Alessandro Guarino,et al.  Digital Forensics as a Big Data Challenge , 2013, ISSE.

[40]  Munindar P. Singh,et al.  Readings in agents , 1997 .

[41]  Simson L. Garfinkel,et al.  An Automated Solution to the Multiuser Carved Data Ascription Problem , 2010, IEEE Transactions on Information Forensics and Security.

[42]  Barbara Messing,et al.  An Introduction to MultiAgent Systems , 2002, Künstliche Intell..