Proceedings of the 2009 ACM Symposium on Applied Computing 2009
DOI: 10.1145/1529282.1529471
|View full text |Cite
|
Sign up to set email alerts
|

Artificial intelligence applied to computer forensics

Abstract: To be able to examine large amounts of data in a timely manner in search of important evidence during crime investigations is essential to the success of computer forensic examinations. The limitations in time and resources, both computational and human, have a negative impact in the results obtained. Thus, better use of the resources available are necessary, beyond the capabilities of the currently used forensic tools. Herein, we describe the use of Artificial Intelligence in computer forensics through the de… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2011
2011
2024
2024

Publication Types

Select...
4
3
3

Relationship

0
10

Authors

Journals

citations
Cited by 38 publications
(11 citation statements)
references
References 12 publications
0
11
0
Order By: Relevance
“…Currently, network forensics is not apart of the average intrusion detection toolkit and is considered to be a separate component to signature and anomaly detection. However, the process itself is efficient [4] in the way evidence is searched for in only those locations that the analyst would expect evidence to be found in, given what is already known, and so would be valuable to the efficiency of an IoT security system by reducing the overall amount of work done by only search in the network locations that are more likely to contain digital evidence.…”
Section: Network Forensicsmentioning
confidence: 99%
“…Currently, network forensics is not apart of the average intrusion detection toolkit and is considered to be a separate component to signature and anomaly detection. However, the process itself is efficient [4] in the way evidence is searched for in only those locations that the analyst would expect evidence to be found in, given what is already known, and so would be valuable to the efficiency of an IoT security system by reducing the overall amount of work done by only search in the network locations that are more likely to contain digital evidence.…”
Section: Network Forensicsmentioning
confidence: 99%
“…Therefore, it also still requires knowledge of the file system and understanding of file and inode structures. Hoelz et al (2009) developed a program called MultiAgent Digital Investigation toolKit (MADIK), a multiagent system to © 2014 ADFSL assist the computer forensics expert on its examinations. They applied AI approach to the problem of digital forensics by developing multiagent system where each agent specializes on a different task such as hashing, keyword search, windows registry agent and so on.…”
Section: The Digital Forensics Framework (Dff)mentioning
confidence: 99%
“…Other related work by Hoelz, et al [6] uses distributed agents to reduce the scope of a KFF search. However, our approach, which uses data mining, represents an improvement over the multi-agent system approach.…”
Section: Related Workmentioning
confidence: 99%