Data Generation and Analysis for Digital Forensic Application Using Data Mining
Title | Data Generation and Analysis for Digital Forensic Application Using Data Mining |
Publication Type | Conference Paper |
Year of Publication | 2014 |
Authors | Khobragade, P.K., Malik, L.G. |
Conference Name | Communication Systems and Network Technologies (CSNT), 2014 Fourth International Conference on |
Date Published | April |
Keywords | clustering, Computer crime, Computers, cyber crime huge log data, cyber system, Data analysis, Data collection, data generation, data mining, data storage, Data visualization, Databases, digital forensic application, Digital forensic tool, digital forensics, firewall logs, firewalls, FTK 4.0, intrusion detection system, Log Data collection, memory forensic analysis, network attack detection, network forensic analysis, network traces, network traffic, packet captures, remote system forensic, security, storage management, transactional data, Web browser |
Abstract | In the cyber crime huge log data, transactional data occurs which tends to plenty of data for storage and analyze them. It is difficult for forensic investigators to play plenty of time to find out clue and analyze those data. In network forensic analysis involves network traces and detection of attacks. The trace involves an Intrusion Detection System and firewall logs, logs generated by network services and applications, packet captures by sniffers. In network lots of data is generated in every event of action, so it is difficult for forensic investigators to find out clue and analyzing those data. In network forensics is deals with analysis, monitoring, capturing, recording, and analysis of network traffic for detecting intrusions and investigating them. This paper focuses on data collection from the cyber system and web browser. The FTK 4.0 is discussing for memory forensic analysis and remote system forensic which is to be used as evidence for aiding investigation. |
DOI | 10.1109/CSNT.2014.97 |
Citation Key | 6821438 |
- firewall logs
- Web browser
- transactional data
- storage management
- security
- remote system forensic
- packet captures
- network traffic
- network traces
- network forensic analysis
- network attack detection
- memory forensic analysis
- Log Data collection
- intrusion detection system
- FTK 4.0
- firewalls
- clustering
- Digital Forensics
- Digital forensic tool
- digital forensic application
- Databases
- Data visualization
- data storage
- Data mining
- data generation
- Data collection
- data analysis
- cyber system
- cyber crime huge log data
- Computers
- Computer crime