Advertisement

Reduction of Digital Forensic Evidence Using Data Science

  • Devesh Kumar SrivastavaEmail author
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 797)

Abstract

The hasty headway in the field of information technology has lead ways for an escalating crime rate being technically exhaustive. The crimes involving digital tools and devices assist to be the forensic evidences. An upsurge in digital evidences is coalesced with the growing size of storage devices. Pertaining to the ineffectualness of the traditional analysis methods to handle the colossal amount of digital data, the forensic investigators have to adopt big data analytics to store, recover, and analyze the digital evidence. The storage of digital evidence calls for surveillance and security, thereby preserving its evidential significance. The digital analysis and fraud detection make the recovery and storage of digital data achievable by effective data reduction and exploiting the features of data mining for storage and data archive. Advancement with the forensic analysis assures automated management of digital data thus safeguarding the sensitivity of data. The paper aims to take the facets of data reduction for efficient storage and retrieval of digital data, and an overall digital forensic research framework has been outlined. The proposed work supports the existing framework for data reduction and storage. It also outlines the challenges and the unaddressed aspects of digital forensics. In this paper, I also discussed the unaddressed aspects of forensic investigations and peaks into the loopholes and the opportunity realms that can lay groundwork for future.

Keywords

Forensic analytics Fraud detection Digital data reduction Data archive Data mining Data preservation Digital forensic research 

References

  1. 1.
    Bhat VH et al (2010) A data mining approach for data generation and analysis for digital forensic application. Int J Eng Technol 2(3):313Google Scholar
  2. 2.
    Alanazi F, Jones A (2017) A method to enhance the accuracy of digital forensic in the absence of Sufficient Evidence in Saudi Arabia. Int J Soc Behav Educ Econ Bus Ind Eng 11(3):490–494Google Scholar
  3. 3.
    Paper C, Chauhan T (2016) Using big data analytics for developing crime predictive model, pp 0–6Google Scholar
  4. 4.
    Beebe N (2009) Digital forensic research: the good, the bad and the unaddressed. In: Advances in digital forensics, pp 17–36. http://doi.org/10.1007/978-3-642-04155-6_2CrossRefGoogle Scholar
  5. 5.
    Riadi I, Istiyanto J, Ashari A (2014) Log analysis techniques using clustering in network forensics. Int J Comput Sci 10(7). Retrieved from http://scholar.google.com/scholar?hl=en&btnG=Search&q=intitle:Log+Analysis+Techniques+using+Clustering+in+Network+Forensics#0
  6. 6.
    Garfinkel SL (2010) Digital forensics research: the next 10 years. Digit Invest 7: S64–S73. http://doi.org/10.1016/j.diin.2010.05.009CrossRefGoogle Scholar
  7. 7.
    Bhat VH, Rao PG, Abhilash RV, Shenoy PD, Venugopal KR (2010) A data mining approach for data generation and analysis for digital forensic application. Int J Eng 2(3):313–319.  https://doi.org/10.7763/IJET.2010.V2.140CrossRefGoogle Scholar
  8. 8.
    Reith M, Carr C, Gunsh G (2002) An examination of digital forensics models. Int J Digit Evid 1(3)Google Scholar
  9. 9.
    Garfinkel S (2010) Digital forensics research: the next 10 years. DFRWS, http://hdl.handle.net/10945/44251
  10. 10.
    Kohn M, Eloff J, Oliver M (2006) Framework for a digital forensic investigation. In: Proceedings of information security South Africa from insight to foresight conference, South AfricaGoogle Scholar
  11. 11.
    Abdullah MT, Mahmod R, Ghani AA, Zain MA, Abu Bakar Md S (2008) Advances in computer forensics. Int J Comput Sci Netw Secur 8(2)Google Scholar
  12. 12.
    Pollitt M, Nance K, Hay B, Dodge RC, Craiger P, Burke P, Marberry C, Brubaker B (2008) Virtualization and digital forensics: a research and education agenda. J Digit Forensic Pract 2(2):62–73CrossRefGoogle Scholar
  13. 13.
    Ayers D (2005) A second generation computer forensic analysis system. In: Proceedings of the 2009 digital forensics research workshop. DFRWS, http://www.digitalforensicssolutions.com/Scalpel/
  14. 14.
    Nance K, Hay B, Bishop M (2009) Digital forensics: defining a research agenda. In: Proceedings of the 42nd Hawaii international conference on system sciencesGoogle Scholar
  15. 15.
    John JL (2012) Digital forensics and preservation. DPC Technology Watch Report, 12(3). http://dx.doi.org/10.7207/twr12-03
  16. 16.
    Quick D, Choo KKR (2014) Data reduction and data mining framework for digital forensic evidence: storage, intelligence, review and archive. Retrieved from http://www.aic.gov.au/media_library/publications/tandi_pdf/tandi480.pdf
  17. 17.
    Baggili I, Breitinger F (2015) Data sources for advancing cyber forensics: what the social World has to offer. In: AAAI Spring Symposium, Mar 2009–2012Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.SCIT Manipal UniversityJaipurIndia

Personalised recommendations