Paper 1: Title: Summary:: Data Mining Techniques For Digital Forensics Analysis
Paper 1: Title: Summary:: Data Mining Techniques For Digital Forensics Analysis
Research Gap:
Applying digital forensics can be very hard and rowdy sometimes. Investigations can
take a lot of time like including law enforcement agencies and detective officers. By
using data mining techniques like clustering technique, association rule mining, deviation
detection and classification with digital forensics tools, we can make data ready for
analysis. Moreover, data patterns and structures can help us identify crime patterns and
give us advantage to be one step ahead of bad guys.
Novel Contribution:
Data mining techniques and algorithms are used along with digital forensics tools and
techniques. The specific algorithm used is Apriori Algorithm to get large item sets of
data. A new system is proposed whose working is as follows:
1: Collect Evidence
3: Perform Data mining algorithms on output received by digital forensics analysis along
with investigator queries
4: GUI of report
Paper 2:
Title: Improving Digital Forensics Through Data Mining
Summary:
This research addresses the challenges faced by digital forensics analyst. It can be really
hard for an analyst to do forensics while dealing with complex investigation and at the
same time handling large amount of data where forensics tools also fail to provide
enough information and identify relationships among data sets. Here, data mining
techniques can be used to analyze textual data. A special data mining tool WEKA is used
for data analysis and predictive patterns. Main focus is on using data mining tool to work
with textual/unstructured data to get conclusions.
Research Gap:
The challenge faced by forensics analyst while investigation and at the same time,
dealing with large amount of data. This can consume a lot of time and also makes it more
complex for an analyst. While we can make it easy by using data mining techniques and
algorithms where we can analyze data, take the results which includes patterns and
structures of data and then make it available for analysis. All the work done is on Enron
Scandal, a biggest audit failure in US Corporate history.
Novel Contribution:
Data mining techniques along with mining algorithm are used. Data mining technique
WEKA is used which analyze large amount of textual data and provides predictive
modeling. Unstructured data i-e emails are used to gain useful information. More of a
traditional way is used, data is collected in unstructured form and stored in database.
Then data mining techniques are performed on textual data to get the meaningful
conclusions.
--------------------------------------------------------------------------
Paper 3:
Title: Digital Forensics And Cyber Crime Data Mining
Summary:
The purpose of this reseach was to work with digital forensics with the combination of
cyber crime data mining techniques.The researchers discussed digital forensics along
with specific forensics techniques which they later combined with their proposed
system.Digital forensics techniques used are file system forensics, network forensics
analysis and network traffic analysis while cyber crime data mining techniques used are
entity extraction, clustering techniques, deviation detection and association rules.The
crime data mining algorithm CDMA was used to work with the data collected from
digital forensics techniques and cyber crime data mining techniques to produce detailed
reports and identify crime patterns.
Research Gap:
It is difficult to do forensics while dealing with large and complex data especially when
data is coming from various domains.To make it plain and contended, digital forensics
techniques are combined with cyber crime data mining techniques along with CDMA
algortithm to achieve results and crime patterns.
Novel Contribution:
A new tool is proposed which works on data gathered from digital forensics techniques
and crime data mining techniques.It uses crime data mining algoritm CDMA which gives
results in form of detailed reports and bar charts. It also identifies crime patterns in order
to allow system administrators to minimize and overcome system vulnerability. This tool
is comprised of 3-tier architecture. Three layers are File system analyses, Network
analyses and Database.
---------------------------------------------------------------------------
Paper 4:
Research Gap:
Gathering evidence from storage devices such as hard disks, PC's and other storage
media becomes very complex while doing digital forensics investigations.This can take
alot of time and effort to achieve results. Data mining crime dependent triage can be used
along with digital forensics techniques to save time and make it simple and easy for
investigations.
Novel Contribution:
A new system is proposed which is the combination of digital forensics techniques and
data mining along with Knowledge management theory KMT and algorithm. Both data
mining and KMT forms theoretical foundation for "POST MORTEM" triage. The triage
model is comprised of four phases which includes forensics acquisition, feature
extraction, priority definition and triaging matrix. The class variable was then extracted
from triaging matrix.
--------------------------------------------------------------------------
Paper 5:
Summary:
This study dicusses the digital forensics process and its areas in detail with data mining
and cyber crime mining methods.It highlights the inflation of cyber crimes with the
emergence of imformation and communication technology. A framework composed of
digital forensics techniques and crime data mining is proposed which works under the
hood of two algorithms which are K-MEANS and Apriori Algorithm.The system also
works in real time and for this purpose various tools are used which are Win cap, jpcap
and wmic.
Research Gap:
There are certain challenges for digital forensics when there is huge amount of data to be
processed.Also consumer grade computers having large amount of data,this leads to
potential increase in size of forensics investigations.From this perspective,there will be a
need for increase in machines and human resources and digital forensics professionals
must do this to tackle the complex investigations.
Novel Contribution:
A new framework is proposed which is combination of digital forensics techniques and
crime data mining along with K-MEANS ans Apriori Algorithm. Specific forensics
techniques used are memory forensics analysis, file system analysis, and network
forensics analysis. The framework includes two sets i-e training set and test set. The
clustering technique was used to get the conclusions and predictions at the end.
---------------------------------------------------------------------------