2011
DOI: 10.1007/978-3-642-23300-5_26
|View full text |Cite
|
Sign up to set email alerts
|

Digital Profiling: A Computer Forensics Approach

Abstract: Abstract. Nowadays investigations have become more difficult than in the past. It is already clear that, in modern crime scene, a vast amount of evidence are in the electronic or digital form and that the computer system or network have a paramount role in researching of indicators and evidence. The correct analysis of log file and the data saved in the system memory, in this new scenario, are crucial for understanding the criminal actions. Moreover, in order to transform these new elements in evidence, it is … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2012
2012
2017
2017

Publication Types

Select...
4
1

Relationship

3
2

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 1 publication
0
5
0
Order By: Relevance
“…This research proposes to apply the method of Digital Profiling [1] with both bottom-up and top-down approach. The cycle of analysis takes place in 6 phases.…”
Section: The Methods Of Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…This research proposes to apply the method of Digital Profiling [1] with both bottom-up and top-down approach. The cycle of analysis takes place in 6 phases.…”
Section: The Methods Of Analysismentioning
confidence: 99%
“…In this scenario, we believe that additional method of analysis of the data stream is necessary and that this new method should be able to improve the results of investigation, reducing the times at the same time. What we propose here is to apply the technique of analysis of digital profiling [1] to a communication channel in order to extrapolate the patterns useful to find the profiling of user's digital behavior. From these patterns we can obtain a raw "sample profile" that can be used for the automatic comparison during the monitoring operations of the channel.…”
Section: Introductionmentioning
confidence: 99%
“…It is therefore essential to gain this view, which allows to acquire those information, more detailed and updated, useful to reach the solution. This is achieved by the method of analysis developed by Colombini and Colella in [10], where authors give a new point of view to common ICT protections, in order to recognize and prevent a DDoS attack.…”
Section: Profiling a Ddos Attackmentioning
confidence: 99%
“…Due to the widespread use of computers and networks, digital evidence plays an important role in criminal investigations. The large amount of digital evidence that resides on computer systems can help investigate and prosecute criminal actions [3]. The evidentiary artifacts are varied and include chat logs, agendas, email, application information, Internet history and cache files.…”
Section: Introductionmentioning
confidence: 99%