Data mining Techniques for Digital Forensic Analysis

Data mining Techniques for Digital Forensic Analysis -...

This preview shows page 1 - 2 out of 6 pages.

International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 4 Issue: 3 17 - 22 _______________________________________________________________________________________ 17 IJRITCC | March 2016, Available @ _______________________________________________________________________________________ Data mining Techniques for Digital Forensic Analysis Ashwinkumar Malwadkar Prof. Sonali Patil Department of Information Technology Department of Information Technology K. J. Somaiya College of Engineering K. J. Somaiya College of Engineering Mumbai, Maharashtra Mumbai, Maharashtra [email protected] [email protected] Abstract: The computer forensic involve the protection, classification, taking out information and documents the evidence stored as data or magnetically encoded information. But the organizations have an increasing amount of data from many sources like computing peripherals, personal digital assistants (PDA), consumer electronic devices, computer systems, networking equipment and various types of media, among other sources. To find similar kinds of evidences, crimes happened previously, the law enforcement officers, police forces and detective agencies is time consuming and headache. The main motive of this work is by combining a data mining techniques with computer forensic tools to get the data ready for analysis, find crime patterns, understand the mind of the criminal, assist investigation agencies have to be one step ahead of the bad guys, to speed up the process of solving crimes and carry out computer forensics analyses for criminal affairs. Keywords- Digital Forensics, NTFS, MFT, PDA, MBR, Data mining, IDS __________________________________________________*****_________________________________________________ I. INTRODUCTION Digital Forensics is the application of science to identify, collect, examine, and analysis the data, while preserving the integrity of the information and maintaining a strict chain of custody for the data. Data contains the distinct pieces of digital information that have been formatted in a specific way. Organizations have an escalating amount of data from many sources. For example, data can be transferred or stored by standard networking equipment, computer systems, computing peripherals, personal digital assistant (PDA), consumer electronic device and different types of media, enclosed by other sources. Data is an important tool and weapon for companies, to capture larger marketplace. Due to the importance of Data, its’ security has become a major issue in the I.T. industry. So the organization will have difficulty determining what events have occurred within its systems and networks, such as exposures of secured, sensitive data. The law enforcement officer, detective agencies, police departments having problem to solve this cases because of the large volumes of crime-related data are existed. Due to the crime-related complexity relationships, the widely used methods of crime analysis are out-of-date that consume many time and human resources. Moreover, these methods are not able to obtain all influential parameters because of their high amount of human interference, therefore, using an intelligent and systematic approach for crime analysis more than ever. Whereas, the data mining techniques can be the
Image of page 1

Subscribe to view the full document.

Image of page 2

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern