• Title/Summary/Keyword: Forensics

Search Result 408, Processing Time 0.029 seconds

Digital Forensics Ontology for Intelligent Crime Investigation System (지능형 범죄수사 시스템을 위한 범용 디지털포렌식 온톨로지)

  • Yun, Han-Kuk;Lee, Sang-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.12
    • /
    • pp.161-169
    • /
    • 2014
  • Digital forensics is the process of proving criminal charges by collecting and analyzing digital evidence which is related to the crime in question. Most digital forensic research is focused on digital forensic techniques themselves or cyber crime. In this paper, we designed a digital forensics-criminal investigation linked model in order to effectively apply digital forensics to various types of criminal investigations. Digital forensic ontology was developed based on this model. For more effective application of digital forensics to criminal investigation we derived specific application fields. The ontology has legality rules and adequacy rules, so it can support investigative decision-making. The ontology can be developed into an intelligent criminal investigation system.

Detecting Methods of the Database Block Size for Digital Forensics (디지털 포렌식을 위한 데이터베이스 블록 크기의 탐지 기법)

  • Kim, Sunkyung;Park, Ji Su;Shon, Jin Gon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.9 no.4
    • /
    • pp.123-128
    • /
    • 2020
  • As the use of digital devices is becoming more commonplace, digital forensics techniques recover data to collect physical evidence during the investigation. Among them, the file forensics technique recovers deleted files, therefore, it can recover the database by recovering all files which compose the database itself. However, if the record is deleted from the database, the modified record contents will not be restored even if the file is recovered. For this reason, the database forensics technique is required to recover deleted records. Database forensics obtains metadata from database configuration files and recovers deleted records from data files. However, record recovery is difficult if database metadata such as block size cannot be obtained from the database. In this paper, we propose three methods for obtaining block size, which is database metadata. The first method uses the maximum size of free space in the block, and the second method uses the location where the block appears. The third method improves the second method to find the block size faster. The experimental results show that three methods can correctly find the block size of three DBMSes.

Research on Development of Digital Forensics based Digital Records Migration Procedure and Tool (디지털 포렌식 기반의 전자기록물 이관 절차 및 도구 개발에 관한 연구)

  • Lee, Seokcheol;Yoo, Hyunguk;Shon, Taeshik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.3
    • /
    • pp.571-580
    • /
    • 2014
  • Digital Records, which are created, stored, and managed in digital form, contains security vulnerability such as data modification, due to the characteristic of digital data. Therefore it is necessary to guarantee the reliability by verification of integrity and authenticity when managing digital records. This paper propose digital forensics based migration process for electronic records by analyzing legacy digital forensics process, and derives the requirements to develop digital forensics based electronic records migration tool through analyzing trends of abroad digital records migration technique and tool. Based on these develop digital forensic based digital records migration tool to guarantee integrity and authenticity of digital records.

Microbial Forensics: Human Identification

  • Eom, Yong-Bin
    • Biomedical Science Letters
    • /
    • v.24 no.4
    • /
    • pp.292-304
    • /
    • 2018
  • Microbes is becoming increasingly forensic possibility as a consequence of advances in massive parallel sequencing (MPS) and bioinformatics. Human DNA typing is the best identifier, but it is not always possible to extract a full DNA profile namely its degradation and low copy number, and it may have limitations for identical twins. To overcome these unsatisfactory limitations, forensic potential for bacteria found in evidence could be used to differentiate individuals. Prokaryotic cells have a cell wall that better protects the bacterial nucleoid compared to the cell membrane of eukaryotic cells. Humans have an extremely diverse microbiome that may prove useful in determining human identity and may even be possible to link the microbes to the person responsible for them. Microbial composition within the human microbiome varies across individuals. Therefore, MPS of human microbiome could be used to identify biological samples from the different individuals, specifically for twins and other cases where standard DNA typing doses not provide satisfactory results due to degradation of human DNA. Microbial forensics is a new discipline combining forensic science and microbiology, which can not to replace current STR analysis methods used for human identification but to be complementary. Among the fields of microbial forensics, this paper will briefly describe information on the current status of microbiome research such as metagenomic code, salivary microbiome, pubic hair microbiome, microbes as indicators of body fluids, soils microbes as forensic indicator, and review microbial forensics as the feasibility of microbiome-based human identification.

Cyberbullying Detection in Twitter Using Sentiment Analysis

  • Theng, Chong Poh;Othman, Nur Fadzilah;Abdullah, Raihana Syahirah;Anawar, Syarulnaziah;Ayop, Zakiah;Ramli, Sofia Najwa
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.1-10
    • /
    • 2021
  • Cyberbullying has become a severe issue and brought a powerful impact on the cyber world. Due to the low cost and fast spreading of news, social media has become a tool that helps spread insult, offensive, and hate messages or opinions in a community. Detecting cyberbullying from social media is an intriguing research topic because it is vital for law enforcement agencies to witness how social media broadcast hate messages. Twitter is one of the famous social media and a platform for users to tell stories, give views, express feelings, and even spread news, whether true or false. Hence, it becomes an excellent resource for sentiment analysis. This paper aims to detect cyberbully threats based on Naïve Bayes, support vector machine (SVM), and k-nearest neighbour (k-NN) classifier model. Sentiment analysis will be applied based on people's opinions on social media and distribute polarity to them as positive, neutral, or negative. The accuracy for each classifier will be evaluated.

Implementation technique and tendency of Computer Forensics in Network and Computer Environment (컴퓨터 및 네트워크 환경 하에서 Forensics 적용 동향 및 구현 기술)

  • 박연규;이필중
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.537-543
    • /
    • 2002
  • 컴퓨터와 인터넷의 발전과 함께 컴퓨터 범죄가 급속히 증가하고 있는 추세이다. 이에 대응하기 위해 시작된 분야가 컴퓨터 포렌식스(Computer and Network Forensics)이다. 본 논문에서는 컴퓨터 포렌식스의 몇 가지 예를 통해 일반적인 단계와 각 단계에서 이루어지는 절차에 대해 알아본다. 그리고 컴퓨터 포렌식스의 중요한 구성요소로써 사용되는 IDS와 IDS를 적용한 컴퓨터 포렌식스 절차에 대해 살펴보며 마지막으로 보다 효율적이고 체계적인 컴퓨터 포렌식스 준비를 위한 로컬 정책 수립에 기본적인 기준을 제시한다.

  • PDF

On Enhanced e-Government Security - Network Forensics

  • Wei, Ren
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2004.11a
    • /
    • pp.173-184
    • /
    • 2004
  • E-Government security is crucial to the development of e-government. Due to the complexity and characteristics of e-government security, the viable current approaches for security focus on preventing the network intrusion or misusing in advanced and seldom concern of the forensics data attaining for the investigation after the network attack or fraud. We discuss the method for resolving the problem of the e-government security from the different side of view - network forensics approaches? from the thinking of the active protection or defense for the e-government security, which can also improve the ability of emergence response and incident investigation for e-government security.

  • PDF

An Effective Information Visualization Technique for Intrusion Detection: Hyperbolic View Intrusion Visualizer

  • Jeong, Yun-Seok;Myung, Ro-Hae
    • Journal of the Ergonomics Society of Korea
    • /
    • v.30 no.2
    • /
    • pp.319-330
    • /
    • 2011
  • In computer forensics investigation, the investigators collect, protect, analyze and interpret massive amount of data which were used in cyber crime. However, due to its huge amount of information, it takes a great deal of time and errors often result even when they use forensics investigation tool in the process. The information visualization techniques will greatly help to improve the information processing ability of human when they deal with the overwhelming amount of data and have to find out significant information in it. The importance of Intrusion Detection System(IDS) among network forensics is being emphasized in computer forensics. In this study, we apply the information visualization techniques which are proposed to be a great help to IDS and carry out the usability test to find out the most effective information visualization techniques for IDS.

A Visualization Jump Lists tool for Digital Forensics of Windows

  • Weng, Shiuh-Ku;Tu, Jung-Yi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.221-239
    • /
    • 2020
  • In this paper, a visualization digital forensics tool, called JumpList Analyzer, is implemented. The tool can analyze the complicated Jump Lists files, and then the results are demonstrated by visualization. To compare the proposed tool with the other Jump Lists tools, the proposed tool is the only one can display the analyzed results by visualization. The visualization will help the investigators more easily to find the evidence than the other tools showing the analyzed results by texts only. In the experiment, the proposed JumpList Analyzer is demonstrated its convenience at identifying artifacts for doing digital forensics in a financial fraud case. In addition, the proposed tool can also be used to reveal the computer user's behavior or background.

A Study on Designing an Undergraduate Curriculum in Digital Forensics per Stages for Developing Human Resource (디지털 포렌식 인력 양성을 위한 단계별 대학 교과과정 설계에 관한 연구)

  • Rha, HyeonDae;Kim, ChangJae;Lee, NamYong
    • The Journal of Korean Association of Computer Education
    • /
    • v.17 no.3
    • /
    • pp.75-84
    • /
    • 2014
  • It is a current situation that a large number of physical and financial damages are increasing due to the growth of intellectual cyber crime and unexpected Internet incidents year by year. In the large scale security incidents, digital forensics techniques for computer crime investigations are essential to secure a place in the field. However, qualified digital forensics investigators who complete with digital security technology are practically insufficient in domestic. In this paper, as one of developing human resources plans regarding to scientific investigation of Internet security incidents, an undergraduate curriculum per stage in digital forensics was proposed. For the effective curriculum per stage, the interviews, group discussion on focused group of existing digital forensics investigators and related research were performed to select curriculum, and then the level of difficulty and practical suitability on each subject designed were analyzed through survey and interview to current investigators and security professionals. After collating the survey, the digital forensic curriculum per level was designed to highly adaptable workforce for the future for working and positive suggestions and proposals are addressed.

  • PDF