Browse > Article
http://dx.doi.org/10.6109/jkiice.2013.17.9.2055

Priority Scheduling of Digital Evidence in Forensic  

Lee, Jong-Chan (Department of Computer Information Engineering, Kunsan National University)
Park, Sang-Joon (Department of Computer Information Engineering, Kunsan National University)
Abstract
Digital evidence which is the new form of evidence to crime makes little difference in value and function with existing evidences. As time goes on, digital evidence will be the important part of the collection and the admissibility of evidence. Usually a digital forensic investigator has to spend a lot of time in order to find clues related to the investigation among the huge amount of data extracted from one or more potential containers of evidence such as computer systems, storage media and devices. Therefore, these evidences need to be ranked and prioritized based on the importance of potential relevant evidence to decrease the investigate time. In this paper we propose a methodology which prioritizes order in which evidences are to be examined in order to help in selecting the right evidence for investigation. The proposed scheme is based on Fuzzy Multi-Criteria Decision Making, in which uncertain parameters such as evidence investigation duration, value of evidence and relation between evidence, and relation between the case and time are used in the decision process using the aggregation function in fuzzy set theory.
Keywords
Digital Evidence; Investigation; Forensic; FMCDM; etc;
Citations & Related Records
연도 인용수 순위
  • Reference
1 H. Yang, M. Xu and N. Zheng, "Improved Method for Ranking of Search Results Based on User Interest" in Proceeding of IFIP International Conference on Network and Parallel Computing, Shanghai, pp. 132-138, 2008.
2 K. Krishna, A. Kalpana, and T. Velayutham, "Customizable Ranking Method for Digital Evidence Search through Interestingness Injection," in Proceeding of Third International Conference on Multimedia Information Networking and Security, Shanghai, pp. 288-291, 2011.
3 S. Saleem, O. Popov, and R. Dahman, "Evaluation of security methods for ensuring the integrity of digital evidence," in Proceeding of International Conference on Innovations in Information Technology, Abu Dhabi, pp. 220-225, 2011.
4 A. Grillo, A. Lentini, G. Me, and M. Ottoni, "Fast user classifying to establish forensic analysis priorities," in Proceeding of Fifth International Conference on IT Security Incident Management and IT Forensics, Stuttgart, pp. 69-77, 2009.
5 E. Mabuto and H. Venter, "User-generated digital forensic evidence in graphic design applications," in Proceeding of International Conference on Cyber Security, Cyber Warfare and Digital Forensic, Kuala Lumpur, 195-200, 2012.
6 C. Naso and B. Turchiano, "A Fuzzy Multi-Criteria Algorithm for Dynamic Routing in FMS," in Proceeding of International Conference on Systems, Man, and Cybernetics, pp. 457-462, 1998.
7 C. H. Yeh and H. Deng, "An Algorithm for Fuzzy Multi-Criteria Decisionmaking," in Proceeding of International Conference on Intelligent Processing Systems, Beijing, pp. 1564-1568, 1997.
8 S. Y. Jung and S. K. Cho, "Determination of Risk Level Using Fuzzy Multi - Criteria Decision Method," Journal of the Korean Institute of Industrial Engineers, Vol.24, No.4, pp. 627-638, Dec. 1998.
9 Digital Forensic. Available: http://blog.naver.com/gadzetlee/ 90016576709.