Visible to the public Data Generation and Analysis for Digital Forensic Application Using Data Mining

TitleData Generation and Analysis for Digital Forensic Application Using Data Mining
Publication TypeConference Paper
Year of Publication2014
AuthorsKhobragade, P.K., Malik, L.G.
Conference NameCommunication Systems and Network Technologies (CSNT), 2014 Fourth International Conference on
Date PublishedApril
Keywordsclustering, Computer crime, Computers, cyber crime huge log data, cyber system, Data analysis, Data collection, data generation, data mining, data storage, Data visualization, Databases, digital forensic application, Digital forensic tool, digital forensics, firewall logs, firewalls, FTK 4.0, intrusion detection system, Log Data collection, memory forensic analysis, network attack detection, network forensic analysis, network traces, network traffic, packet captures, remote system forensic, security, storage management, transactional data, Web browser
Abstract

In the cyber crime huge log data, transactional data occurs which tends to plenty of data for storage and analyze them. It is difficult for forensic investigators to play plenty of time to find out clue and analyze those data. In network forensic analysis involves network traces and detection of attacks. The trace involves an Intrusion Detection System and firewall logs, logs generated by network services and applications, packet captures by sniffers. In network lots of data is generated in every event of action, so it is difficult for forensic investigators to find out clue and analyzing those data. In network forensics is deals with analysis, monitoring, capturing, recording, and analysis of network traffic for detecting intrusions and investigating them. This paper focuses on data collection from the cyber system and web browser. The FTK 4.0 is discussing for memory forensic analysis and remote system forensic which is to be used as evidence for aiding investigation.

DOI10.1109/CSNT.2014.97
Citation Key6821438