Data Generation and Analysis for Digital Forensic Application Using Data Mining

In the cyber crime huge log data, transactional data occurs which tends to plenty of data for storage and analyze them. It is difficult for forensic investigators to play plenty of time to find out clue and analyze those data. In network forensic analysis involves network traces and detection of attacks. The trace involves an Intrusion Detection System and firewall logs, logs generated by network services and applications, packet captures by sniffers. In network lots of data is generated in every event of action, so it is difficult for forensic investigators to find out clue and analyzing those data. In network forensics is deals with analysis, monitoring, capturing, recording, and analysis of network traffic for detecting intrusions and investigating them. This paper focuses on data collection from the cyber system and web browser. The FTK 4.0 is discussing for memory forensic analysis and remote system forensic which is to be used as evidence for aiding investigation.

[1]  Hartmut König,et al.  Explorative Visualization of Log Data to Support Forensic Analysis and Signature Development , 2010, 2010 Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering.

[2]  Matt Bishop,et al.  Proceedings of the 42nd Hawaii International Conference on System Sciences- 2009 Digital Forensics: Defining a Research Agenda , 2022 .

[3]  Abdul Azim Abd Ghani,et al.  Advances in computer forensics , 2008 .

[4]  Lianfu Yin Research on Windows Physical Memory Forensic Analysis , 2012, 2012 Fourth International Symposium on Information Science and Engineering.

[5]  Angelos Stavrou,et al.  DoubleGuard: Detecting Intrusions in Multitier Web Applications , 2012, IEEE Transactions on Dependable and Secure Computing.

[6]  J. A. Hamilton,et al.  An Examination of the Techniques and Implications of the Crowd-Sourced Collection of Forensic Data , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.

[7]  L.M. Patnaik,et al.  A Novel Data Generation Approach for Digital Forensic Application in Data Mining , 2010, 2010 Second International Conference on Machine Learning and Computing.

[8]  Juho Kim,et al.  Network Forensic Analysis Using Visualization Effect , 2008, 2008 International Conference on Convergence and Hybrid Information Technology.

[9]  Yifan Li,et al.  VisFlowConnect: netflow visualizations of link relationships for security situational awareness , 2004, VizSEC/DMSEC '04.

[10]  Dowon Hong,et al.  Improving Performance in Digital Forensics: A Case Using Pattern Matching Board , 2009, 2009 International Conference on Availability, Reliability and Security.

[11]  Felix C. Freiling,et al.  A Common Process Model for Incident Response and Computer Forensics , 2007, IMF.

[12]  Funminiyi Olajide,et al.  Forensic memory evidence of windows application , 2012, 2012 International Conference for Internet Technology and Secured Transactions.