A Decision-Driven Computer Forensic Classification Using ID3 Algorithm

  • Suneeta Satpathy
  • Sateesh K. Pradhan
  • B. N. B. Ray
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 309)

Abstract

Rapid evolution of information technology has caused devices to be used in criminal activities. Criminals have been using the Internet to distribute a wide range of illegal materials globally, making tracing difficult for the purpose of initiating digital investigation process. Forensic digital analysis is unique and inherently mathematical and generally comprises more data from an investigation than is present in other types of forensic investigations. To provide appropriate and sufficient security measures has become a difficult job due to large volume of data and complexity of the devices making the investigation of digital crimes even harder. Data mining and data fusion techniques have been used as useful tools for detecting digital crimes. In this study, we have introduced a forensic classification problem and applied ID3 decision tree learning algorithm for supervised exploration of the forensic data which will also enable visualization and will reduce the complexity involved in digital investigation process.

Keywords

Digital crime Digital investigation Computer forensics Data fusion Data mining ID3 Visualization 

References

  1. 1.
    Lipson, H.: Tracking and tracing cyber attacks: technical challenges and global policy issues. CERT Coordination Center, Nov (2002)Google Scholar
  2. 2.
    Casey, E. (ed.): Handbook of Computer Crime Investigation. Academic Press, Waltham (2001)Google Scholar
  3. 3.
    Casey, E.: Digital Evidence and Computer Crime, 2nd ed. Elsevier Academic Press (2004)Google Scholar
  4. 4.
    Brezinski, D., Killalea, T.: Guidelines for evidence collection and archiving. RFC3227 (2002)Google Scholar
  5. 5.
    Satpathy, S., Pradhan, S. K., Ray, B.N.B.: A digital investigation tool based on data fusion in management of cyber security systems. Int. J. Inf. Technol. ad Knowledge management, vol 2(2) (2010)Google Scholar
  6. 6.
    David L. Hall, Sonya A.H.: Mathematical Techniques in Multisensor Data Fusion, 2nd ed., Artech House (2004)Google Scholar
  7. 7.
    Hall, D.L., Linas, J.: An introduction to multisensor data fusion. In Proceedings of The IEEE, vol 85, Jan (1997)Google Scholar
  8. 8.
    Waltz, E.J.: Linas Multisensor Data Fusion, Artech House. Boston (1990)Google Scholar
  9. 9.
    Han, J., Kamber, M.: Data mining: concepts and techniques, 2nd ed. (2005)Google Scholar
  10. 10.
    Introduction to data fusion, or information fusion, http://www.data-fusion.org
  11. 11.
    Satpathy, S., Pradhan, S.K., Ray, B.N.B.: Rule based decision mining with JDL data fusion model for computer forensics: a hypothetical case study. Int. J. Comput. Sci. Inf. Sec., 9(12) (2011)Google Scholar
  12. 12.
    Satpathy, S., Pradhan, S. K., Ray, B.N.B.: Application of data fusion methodology for computer forensics dataset analysis to resolve data quality issues in predictive digital evidence, Int. J. Forensic Comput. Sci., 7(1) (2012)Google Scholar
  13. 13.
    Meyers, M., Rogers, M.: Computer forensics: the need for standardization and certification, Int. J. Digital Evi. 3 (2004)Google Scholar
  14. 14.
    Beebe, N, Clark, J.: Dealing with terabyte data sets in digital investigations. Advances in Digital Forensics, pp. 3–16, Springer, (2005)Google Scholar
  15. 15.
    Danielsson, J.: Project Description A system for collection and analysis of forensic evidence. Appl. NFR, Apr (2002)Google Scholar
  16. 16.
    Access Data Corporation, http://www.accessdata.com
  17. 17.
    Qin, I.U.: Data mining method based on computer forensics-based ID3 algorithm. In: Proceedings of IEEE Conference on Information Management and Engineering, pp. 340–343 (2010)Google Scholar
  18. 18.
    Davis, J.V., Rossbach, C.J., Ramadan, H.E., Witchel, E.: Cost-sensitive decision tree learning for forensic classification. In Proceedings of the 17th European Conference on Machine Learning, pp. 622–629, Berlin, Germany (2006)Google Scholar
  19. 19.
    Mendoza1, M., Zamora, J.: Building decision trees to identify the intent of a user query. In Proceedings of the 13th International Conference on Knowledge-Based and Intelligent Information and Engineering Systems, Santiago, pp. 285–292 (2009)Google Scholar
  20. 20.
    Adriaans, P., Zantige, D.: Data Mining. Addison Wesley, Harlow England (1997)Google Scholar

Copyright information

© Springer India 2015

Authors and Affiliations

  • Suneeta Satpathy
    • 1
  • Sateesh K. Pradhan
    • 2
  • B. N. B. Ray
    • 2
  1. 1.Department of Computer ApplicationCEB, BPUTBhubaneswarIndia
  2. 2.Department of Computer ApplicationUtkal UniversityBhubaneswarIndia

Personalised recommendations