Framework for Live Digital Forensics using Data Mining

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2015 by IJCTT Journal
Volume-22 Number-3
Year of Publication : 2015
Authors : Prof Sonal Honale, Jayshree Borkar
  10.14445/22312803/IJCTT-V22P124

MLA

Prof Sonal Honale, Jayshree Borkar "Framework for Live Digital Forensics using Data Mining". International Journal of Computer Trends and Technology (IJCTT) V22(3):117-121, April 2015. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
With the rapid advancements in information and communication technology in the world, crimes committed are becoming technically intensive. When crimes committed use digital devices, forensic examiners have to adopt practical frameworks and methods to recover data for analysis which can pose as evidence. This concept explains emerging cyber crimes, forensic analysis steps in the storage media, hidden data analysis in the file system, network forensic methods, Memory Forensic Modules and cyber crime data mining. This paper introduces the K-Means and apriori algorithm for finding the cyber attack and the counting of the attacks during the system working time. For this purpose, system uses the tools of Win cap, jpcap and wmic. This tool combines the technique of digital forensic investigation and crime data mining. Thus this tool provides the defence and reduces the vulnerability.

References
[1] Brian Carrier . File system Forensic Analysis. Publisher addison Wesley Professional .publication Date. March 17, 2005
[2] Karen Kent, Suzanne Chevaller, Tim Grance, Hung Dang, “Guide to Integrating Forensic Techniques into incident response” NIST SP800-86 Notes, 2006.
[3] Natarajan Meghanathan, Sumanth Reddy Allam and Loretta A.Tools And Techniques For Network Forensics, USA International Journal of Network Security & Its Applications (IJNSA), Vol .1, No.1,April 2009.
[4] Brian Carrier . File system Forensic Analysis. Publisher addison Wesley Professional .publication Date. March 17, 2005
[5] Eoghan Casey, ”Network traffic as a source of evidence: Tool strengths, weaknesses, and future needs” Digital investigation Journal December 2004,Vol 1, No 1.
[6] H. Achi, A. Hellany& M. Nagrial. Network Security Approach for Digital Forensics Analysis 2008 IEEE
[7] Stephen K. Brannon, and Thomas Song Computer Forensics: Digital Forensic Analysis Methodology. Compter Forensics Journal January 2008 Volume 56
[8] Ali Reza Arasteh, MouradDebbabi, AssaadSakha, Mohamed Saleh,”Analyzing multiple logs for forensic evidence Digital investigations Journal Science Direct.”

Keywords
Digital forensic, cyber crime, K-means.