Automated Analysis for Digital Forensic Science: Semantic Integrity Checking
نویسندگان
چکیده
When computer security violations are detected, computer forensic analysts attempting to determine the relevant causes and effects are forced to perform the tedious tasks of finding and preserving useful clues in large networks of operational machines. To augment a computer crime investigator’s efforts, the approach presented in this paper is an expert system with a decision tree that uses predetermined invariant relationships between redundant digital objects to detect semantic incongruities. By analyzing data from a host or network and searching for violations of known data relationships, particularly when an attacker is attempting to hide his presence, an attacker’s unauthorized changes may be automatically identified. Examples of such invariant data relationships are provided, as are techniques to identify new, useful ones. By automatically identifying relevant evidence, experts can focus on the relevant files, users, times and other facts first.
منابع مشابه
An Automated Approach for Digital Forensic Analysis of Heterogeneous Big Data
The major challenges with big data examination and analysis are volume, complex interdependence across content, and heterogeneity. The examination and analysis phases are considered essential to a digital forensics process. However, traditional techniques for the forensic investigation use one or more forensic tools to examine and analyse each resource. In addition, when multiple resources are ...
متن کاملSemantic Integrity Constraint Violations Check for Spatial Database Updating
An efficient spatial data structure in a GIS system for database updating is required in order to minimising of spatial constraint violations and timesaving. An automated constraint checking procedure has been introduced to perform constraint violations check at compiling time before updating the database. Formal definitions of spatial data types were used in attempt to formulate novel equation...
متن کاملSemantic relation computing theory and its application
Semantic relations among objects are primary semantic factors, which play the most important role for human and smart systems /machines to understand and control the situation in the context of connected systems. However, few existing works focus on the study of semantic relations from the mathematical view, though it would be the basis for further research on semantics. Existing research works...
متن کاملForensic Image Analysis of Familiar-based iPAQ
One of the PDA forensic issues is the difficulty in maintaining image integrity as two consecutive acquisitions on most PDA platforms could produce different images. JFFS2 used in certain Linux PDA further complicate the forensic process as compression is implemented in this file system. Currently there is not specific tool that can analyse this file system. This paper analyse the integrity of ...
متن کاملOptimal Database Locks for Efficient Integrity Checking
In concurrent database systems, correctness of update transactions refers to the equivalent effects of the execution schedule and some serial schedule over the same set of transactions. Integrity constraints add further semantic requirements to the correctness of the database states reached upon the execution of update transactions. Several methods for efficient integrity checking and enforcing...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003