Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Computational intelligence in digital forensics : forensic investigation and applications
Muda A., Choo Y., Abraham A., Srihari S., Springer Publishing Company, Incorporated, New York, NY, 2014. 453 pp. Type: Book (978-3-319058-84-9)
Date Reviewed: Jul 23 2014

This edited book introduces the reader to various aspects of digital forensics and digital investigation techniques.

The introduction chapter, the only chapter in Section 1, sets the scene for the book. This chapter concludes with references to the relevant digital forensics societies and journals (mostly published by Springer). However, three key digital forensics publications are missing from this list: IEEE Transactions on Information Forensics and Security, Digital Investigation, and Journal of Forensic Sciences. The conclusion of this chapter also reminds me of the typical responses I receive when I mention digital forensics: “Digital forensics is something I saw on CSI or NCIS” (popular American police procedural dramas).

Section 2 comprises five chapters. These chapters, contributed by researchers from Iran (chapter 2), Egypt (chapter 3), Malaysia (chapter 4), India and China (chapter 5), and Australia (chapter 6), discuss different techniques. Chapter 2 briefly surveys social network forensics, and chapter 3 highlights the importance of developing a forensically sound biometric application. In the next two chapters, the authors introduce a language identification technique and a way of conducting random sampling, and demonstrate their utility in digital forensic investigation. In the last chapter of this section, the authors propose a conceptual framework that integrates data mining and data fusion and validates the framework with January to May 2007 crime data obtained from Los Angeles County, CA, USA.

The 12 chapters in the last section cover a broad range of digital forensic applications, from facial analysis (chapters 7, 14) to biometrics analysis (chapters 8, 13). Age identification and the identification of drugs are covered in chapters 9 and 10, respectively. Chapter 11 explores the detection of counterfeit radio frequency identification (RFID) tags.

Learning remote computer (or perhaps any digital device?) fingerprinting is explained in chapter 12. The authors cover footwear analysis in chapter 15. Identifying handwritten authorship is the topic of chapter 16. Chapter 17 examines the use of data mining techniques, and chapter 18 looks at voice analysis. However, I am surprised that newer digital forensic domains, such as cloud and mobile, are not covered in this section or elsewhere in the book.

Overall, the book is a useful companion for those interested in learning more about computation forensics, although it may fail to excite digital forensic practitioners. Digital forensics books such as [1,2,3,4] are likely to be of more interest to digital forensic practitioners due to the depth of the research on a particular topic (for example, iOS forensics, Android forensics, and cloud storage forensics).

Reviewer:  Kim-Kwang Raymond Choo Review #: CR142541 (1410-0849)
1) Hoog, A.; Strzempka, K. iPhone and iOS forensics: investigation, analysis, and mobile security for Apple iPhone, iPad and iOS devices. Syngress/Elsevier, Waltham, MA, 2011.
2) Quick, D.; Martini, B.; Choo, K. K. R. Cloud storage forensics. Elsevier, Amsterdam, the Netherlands, 2014.
3) Hoog, A. Android forensics: investigation, analysis, and mobile security for Google Android. Syngress, Waltham, MA, 2011.
4) Carvey, H. Windows Registry forensics: advanced digital forensic analysis of the Windows Registry. Syngress, Burlington, MA, 2011.
Bookmark and Share
 
Abuse And Crime Involving Computers (K.4.1 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Abuse And Crime Involving Computers": Date
The dark side of employee email
Sipior J., Ward B. Communications of the ACM 42(7): 88-95, 1999. Type: Article
Aug 1 1999
The very brief history of digital evidence standards
Pollitt M. In Integrity and internal control in information systems V. Norwell, MA: Kluwer Academic Publishers, 2003. Type: Book Chapter
Nov 20 2003
Teaching computer security at a small college
LeBlanc C., Stiller E.  Computer science education (Proceedings of the 35th SIGCSE technical symposium, Norfolk, Virginia, USA, Mar 3-7, 2004)407-411, 2004. Type: Proceedings
May 19 2004
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy