Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Automated inference of past action instances in digital investigations
James J., Gladyshev P. International Journal of Information Security14 (3):249-261,2015.Type:Article
Date Reviewed: Apr 12 2016

The role of computers in forensics is expanding, since so much crime uses electronic devices. Developing support mechanisms for digital investigation is the need of the hour. However, a great number of lacunae exist in devising suitable digital investigating mechanisms. Over the last couple of years, most digital crime has happened through smartphones, triggering a new discipline called mobile device forensics. Still, computer forensics is the major issue and most actively researched topic.

This paper nicely presents a digital investigating mechanism using the past behavior of a user. The authors aptly mention the importance of this paper in the introduction. A comprehensive literature review is provided on two related topics: state machine analysis and file system activity analysis. The authors clearly present the proposed signature-based method and beautifully defend how it can be used for the detection of action instances automatically.

The authors employ finite state machine analysis to form signatures from past actions. The signatures are generated based on the previous and current behaviors of action instances. They have devised a mechanism to update the consistency in an object’s behavior. Three different types of signatures are generated: core, support, and shared signatures. These three generated signatures are passed on to the proposed signature analysis model, which is layer based to perform forensic analysis. The proposed methods include explanations from all possible points of view, such as theoretical, mathematical, and algorithmic.

The authors present two practical case studies on how to deploy their algorithm for digital investigation. Overall, this excellent paper will be useful for researchers working in information security and digital forensics.

Reviewer:  S. Ramakrishnan Review #: CR144313 (1606-0438)
Bookmark and Share
  Featured Reviewer  
 
Abuse And Crime Involving Computers (K.4.1 ... )
 
 
Automata (F.1.1 ... )
 
 
Coding And Information Theory (E.4 )
 
 
Computer-Communication Networks (C.2 )
 
 
Data Encryption (E.3 )
 
Would you recommend this review?
yes
no
Other reviews under "Abuse And Crime Involving Computers": Date
The dark side of employee email
Sipior J., Ward B. Communications of the ACM 42(7): 88-95, 1999. Type: Article
Aug 1 1999
The very brief history of digital evidence standards
Pollitt M. In Integrity and internal control in information systems V. Norwell, MA: Kluwer Academic Publishers, 2003. Type: Book Chapter
Nov 20 2003
Teaching computer security at a small college
LeBlanc C., Stiller E.  Computer science education (Proceedings of the 35th SIGCSE technical symposium, Norfolk, Virginia, USA, Mar 3-7, 2004)407-411, 2004. Type: Proceedings
May 19 2004
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy