Skip to main content

Approximate Search in Digital Forensics

  • Chapter
  • First Online:
Computer and Network Security Essentials

Abstract

In digital forensics in general and in network forensics in particular, search through very large amounts of data plays a crucial role. It is used for finding evidence in digital media as well as for finding traces of attacks in computer memory and network traffic. The amount of data to be processed is not the only challenge faced by a search algorithm. Variations in data make the search task even more difficult, and the reasons for these variations are heterogeneous (transmission errors, differences in implementation of various protocols, different data formatting on various sources of information, attempts to hide the traces of criminal activities, and so on). In some cases, especially in network forensics, velocity of data is an additional factor that further complicates the task of a search algorithm. Therefore, the use of sophisticated search algorithms implemented in an efficient way and the reduction of data quantities to process are the key success factors of digital forensics investigation. In this chapter, constrained approximate bit-parallel search algorithms capable of both reducing the size of the data sets to process and efficiently processing the remaining data are explained. We analyze capabilities of these algorithms to correctly detect evidence/traces of attacks and to keep the false-positive rate at an acceptable level.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    DAWG—Directed Acyclic Word Graph.

References

  1. Aho, A., & Corasick, M. (1975). Efficient string matching: An aid to bibliographic search. Communications of the ACM, 18, 333–340.

    Article  MathSciNet  MATH  Google Scholar 

  2. Baeza-Yates, R., & Gonnet, G. (1992). A new approach to text searching. Communications of the ACM, 35, 74–82.

    Article  Google Scholar 

  3. Barton, C., Iliopoulos, C., & Pissis, S. (2015). Average-case optimal approximate circular string matching. In A. Dediu, E. Formenti, C. Marín-Vide, & B. Truthe (Eds.), Language and automata theory and applications (pp. 85–96).

    Google Scholar 

  4. Bro. https://www.bro.org/. Cited April 25, 2017

  5. Elasticsearch. https://www.elastic.co/products/elasticsearch. Cited May 9, 2017

  6. Faro, S., & Lecroq, T. (2012). Twenty years of bit-parallelism in string matching. In J. Holub, B. Watson, J. Ždárek (Eds.), Festschrift for Bořivoj Melichar (pp. 72–101).

    Google Scholar 

  7. Forensic Toolkit (FTK). http://accessdata.com/solutions/digital-forensics/forensic-toolkit-ftk. Cited May 9, 2017

  8. Kuri, J., & Navarro, G. (2000). Fast multipattern search algorithms for intrusion detection. In String processing and information retrieval (SPIRE 2000) (pp. 169–180).

    Google Scholar 

  9. Le-Dang, N., Le, D., & Le, V. (2016). A new multiple-pattern matching algorithm for the network intrusion detection system. IACSIT International Journal of Engineering and Technology, 8, 94–100.

    Article  Google Scholar 

  10. Levenshtein, V. (1966). Binary codes capable of correcting deletions, insertions and reversals. Soviet Physics-Doklady, 10, 707–710.

    MathSciNet  MATH  Google Scholar 

  11. Lucene, A. http://lucene.apache.org/. Cited April 25, 2017

  12. Mihov, S., & Schulz, K. (2004). Fast approximate search in large dictionaries. Journal of Computational Linguistics, 30, 451–477.

    Article  MathSciNet  MATH  Google Scholar 

  13. Navarro, G., & Raffinot, M. (2000). Fast and flexible string matching by combining bit-parallelism and suffix automata. ACM Journal of Experimental Algorithms, 5(4), 1–36.

    MathSciNet  MATH  Google Scholar 

  14. Navarro, G., & Raffinot, M. (2002). Flexible pattern matching in strings: Practical on-line search algorithms for texts and biological sequences. New York: Cambridge University Press.

    Book  MATH  Google Scholar 

  15. Petrović, S. (2016). A SPAM filtering scenario using bit-parallel approximate search. In P. Gomila, & M. Hinarejos (Eds.), Proceedings of the XIV Spanish Conference on Cryptology and Information Security (RECSI2016) (pp. 186–190).

    Google Scholar 

  16. Shulz, K., & Mihov, S. (2002). Fast string correction with Levenshtein automata. International Journal on Document Analysis and Recognition (IJDAR), 5, 67–85.

    Article  MATH  Google Scholar 

  17. Shrestha, A., & Petrović, S. (2015). Approximate search with constraints on indels with application in SPAM filtering. In V. Oleshchuk (Ed.) Proceedings of Norwegian Information Security Conference (NISK-2015) (pp. 22–33).

    Google Scholar 

  18. Shrestha, A., & Petrović, S. (2016). Constrained row-based bit-parallel search in intrusion detection. In A. Kolosha (Ed.) Proceedings of Norwegian Information Security Conference (NISK-2016) (pp. 68–79).

    Google Scholar 

  19. Snort. https://www.snort.org/. Cited April 25, 2017

  20. Sung-il, O., Min, S., & Inbok, L. (2013). An efficient bit-parallel algorithm for IDS. In: A. Aghdam, & M. Guo (Eds.) Proceedings of RACS 2013 (pp. 43–44).

    Google Scholar 

  21. Suricata. https://suricata-ids.org/. Cited April 25, 2017

  22. Tan, L., & Sherwood, T. (2006). Architectures for bit-split string scanning in intrusion detection. IEEE Micro, 26, 110–117.

    Article  Google Scholar 

  23. Wu, S., & Manber, U. (1992). Fast text searching allowing errors. Communications of the ACM, 35, 83–91.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Slobodan Petrović .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this chapter

Cite this chapter

Petrović, S. (2018). Approximate Search in Digital Forensics. In: Daimi, K. (eds) Computer and Network Security Essentials. Springer, Cham. https://doi.org/10.1007/978-3-319-58424-9_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-58424-9_20

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-58423-2

  • Online ISBN: 978-3-319-58424-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics