Automated Analysis for Digital Forensic Science: Semantic Integrity Checking

نویسندگان

  • Tye Stallard
  • Karl N. Levitt
چکیده

When computer security violations are detected, computer forensic analysts attempting to determine the relevant causes and effects are forced to perform the tedious tasks of finding and preserving useful clues in large networks of operational machines. To augment a computer crime investigator’s efforts, the approach presented in this paper is an expert system with a decision tree that uses predetermined invariant relationships between redundant digital objects to detect semantic incongruities. By analyzing data from a host or network and searching for violations of known data relationships, particularly when an attacker is attempting to hide his presence, an attacker’s unauthorized changes may be automatically identified. Examples of such invariant data relationships are provided, as are techniques to identify new, useful ones. By automatically identifying relevant evidence, experts can focus on the relevant files, users, times and other facts first.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Automated Approach for Digital Forensic Analysis of Heterogeneous Big Data

The major challenges with big data examination and analysis are volume, complex interdependence across content, and heterogeneity. The examination and analysis phases are considered essential to a digital forensics process. However, traditional techniques for the forensic investigation use one or more forensic tools to examine and analyse each resource. In addition, when multiple resources are ...

متن کامل

Semantic Integrity Constraint Violations Check for Spatial Database Updating

An efficient spatial data structure in a GIS system for database updating is required in order to minimising of spatial constraint violations and timesaving. An automated constraint checking procedure has been introduced to perform constraint violations check at compiling time before updating the database. Formal definitions of spatial data types were used in attempt to formulate novel equation...

متن کامل

Semantic relation computing theory and its application

Semantic relations among objects are primary semantic factors, which play the most important role for human and smart systems /machines to understand and control the situation in the context of connected systems. However, few existing works focus on the study of semantic relations from the mathematical view, though it would be the basis for further research on semantics. Existing research works...

متن کامل

Forensic Image Analysis of Familiar-based iPAQ

One of the PDA forensic issues is the difficulty in maintaining image integrity as two consecutive acquisitions on most PDA platforms could produce different images. JFFS2 used in certain Linux PDA further complicate the forensic process as compression is implemented in this file system. Currently there is not specific tool that can analyse this file system. This paper analyse the integrity of ...

متن کامل

Optimal Database Locks for Efficient Integrity Checking

In concurrent database systems, correctness of update transactions refers to the equivalent effects of the execution schedule and some serial schedule over the same set of transactions. Integrity constraints add further semantic requirements to the correctness of the database states reached upon the execution of update transactions. Several methods for efficient integrity checking and enforcing...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003