We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Identification of User Ownership in Digital Forensic using Data Mining Technique

by Kailash Kumar, Sanjeev Sofat, Naveen Aggarwal, S.k.jain
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 50 - Number 4
Year of Publication: 2012
Authors: Kailash Kumar, Sanjeev Sofat, Naveen Aggarwal, S.k.jain
10.5120/7756-0818

Kailash Kumar, Sanjeev Sofat, Naveen Aggarwal, S.k.jain . Identification of User Ownership in Digital Forensic using Data Mining Technique. International Journal of Computer Applications. 50, 4 ( July 2012), 1-5. DOI=10.5120/7756-0818

@article{ 10.5120/7756-0818,
author = { Kailash Kumar, Sanjeev Sofat, Naveen Aggarwal, S.k.jain },
title = { Identification of User Ownership in Digital Forensic using Data Mining Technique },
journal = { International Journal of Computer Applications },
issue_date = { July 2012 },
volume = { 50 },
number = { 4 },
month = { July },
year = { 2012 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume50/number4/7756-0818/ },
doi = { 10.5120/7756-0818 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:47:24.900405+05:30
%A Kailash Kumar
%A Sanjeev Sofat
%A Naveen Aggarwal
%A S.k.jain
%T Identification of User Ownership in Digital Forensic using Data Mining Technique
%J International Journal of Computer Applications
%@ 0975-8887
%V 50
%N 4
%P 1-5
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

As existing technology used by criminal rapidly changes and growing, digital forensics is also growing and important ?elds of research for current intelligence, law enforcement and military organizations today. As huge information is stored in digital form, the need and ability to analyze and process this information for relevant evidence has grown in complexity. During criminal activities crime committed use digital devices, forensic examiners have to adopt practical frameworks and methods to recover data for analysis which can comprise as evidence. Data Preparation/ Generation, Data warehousing and Data Mining, are the three essential features involved in the investigation process. The purpose of data mining technique is to find the valuable relationships between data items. This paper proposes an approach for preparation, generation, storing and analyzing of data, retrieved from digital devices which pose as evidence in forensic analysis. Attribute classification model has been presented to categorized user files. The data mining tools has been used to identify user ownership and validating the reliability of the pre-processed data. This work proposes a practical framework for digital forensics on hard drives.

References
  1. Agrawal, R. , Imielinski, T. & Swami 1993 A. Mining association rules between sets of items in large databases. Proceedings of the ACM SIGMOD International Conference on Management of Data, 207 – 216.
  2. Ankit Agarwal, Megha Gupta, Saurabh Gupta, S. C. Gupta 2011. Systematic Digital Forensic Investigation Model. IJCSS, Volume 5, Issue 1.
  3. Brian D. Carrier, Eugene H. Spafford 2005. Automated Digital Evidence Target Definition Using Outlier Analysis and Existing Evidence, Digital Forensic Research Workshop (DFRWS).
  4. Brown, Ross A. , Pham, Binh L. , & De Vel, Olivier Y. 2003. A Grammar for the Specification of Forensic Image Mining Searches. In Lovell, Brian, Campbell, Duncan, & Fookes, Clinton (Eds. ) Eighth Australian and New Zealand Intelligent Information Systems Conference, December, Sydney, Australia.
  5. Brown, Ross A. & Pham, Binh L. 2005. Image Mining and Retrieval Using Hierarchical Support Vector Machines. In Chen, Yi-Ping (Ed. ) 11th International Conference on Multi-Media Modeling, Jan, Melbourne, Australia 1550-5502, IEEE.
  6. Carney, M. and Rogers, M. 2004. The Trojan Made Me Do It: A First Step in Statistical Based Computer Forensics Event Reconstruction. International Journal of Digital Evidence, 2(4). 1-11.
  7. Chen, Y. , J. R. Miller, J. A. Francis, G. L. Russell, and F. Aires 2003. Observed and modeled relationships among Arctic climate variables. J. Geophys. Volume. 108.
  8. Corney, M. , de Vel, O. , Anderson, A. , and Mohay, G. 2002. Gender preferential Text Mining of E-mail Discourse, The 18th annual Computer Security Applications Conference (ACSAC2002).
  9. Data Mining Concepts and Techniques, 2ed by Jiawei Han, Kamber M Morgan 2005. Kaufmann Publishers.
  10. De Vel, O. , Corney, M. and Mohay, G. 2001. Mining E-Mail Content for Author Identification Forensics, SIGM OD Record, ACM Press, Volume 30, Issue 4, 55–64.
  11. DFRWS. 2001. A road map for digital forensic research. DTR - T001-01 FINAL - DFRWS Technical Report, 1(1).
  12. Fayyad, U. , G. Piatetsky-Shapiro and P. Smyth, 1996. Advances in Knowledge Discovery and Data Mining, MIT Press, ISBN-10: 0262560976,560.
  13. F. Pernkopf 2004. Detection of Surface Defects on Raw Steel Blocks Using Bayesian Network Classifiers. Pattern Analysis and Applications, Vol. 7, No. 3, 333–342.
  14. Guidance Software Inc. Encase Forensics. http://www. guidancesoftware. com.
  15. Padhraic Smyth, David Hand, Mannila Heikki 2001. Principles of Data Mining. The MIT Press.
  16. Joachims T. 2002. Optimizing search engines using click through data. In Proceedings of the ACM Conference on Knowledge Discovery and Data Mining (KDD).
  17. Veena H Bhat, Member, IAENG, Prasanth G Rao, Abhilash V. R. , P. Deepa Shenoy, Venugopal K. R. and L. M. Patnaik 2010. A Data Mining Approach for Data Generation and Analysis for Digital Forensic Application IACSIT, Vol. 2, No. 3, ISSN: 1793-8236.
Index Terms

Computer Science
Information Sciences

Keywords

Digital Forensic Hard Drive Framework Data Preprocessing