Filters








8,845 Hits in 4.0 sec

Digital Forensics Challenges to Big Data in the Cloud

Xiaohua Feng, Yuping Zhao
2017 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)  
In particular, for Big Data attack cases, Digital Forensics has been facing even more challenge than original digital breach investigations.  ...  As a new research area, Digital Forensics is a subject in a rapid development society. Cyber security for Big Data in the Cloud is getting attention more than ever.  ...  INTRODUCTION Digital Forensics is important in cyber security. Evidence data is crucial for Digital Forensics. Big data evidence collecting is challenging in the cloud.  ... 
doi:10.1109/ithings-greencom-cpscom-smartdata.2017.132 dblp:conf/ithings/FengZ17 fatcat:vxriqjrpn5gmlm22n2lbolyz4a

Review

Gopinath Muruti, Siti Hawa Mokhtar, Fiza Abdul Rahim, Zul-Azri Ibrahim, Abbas M. Al-Ghaili
2018 International Journal of Engineering & Technology  
In this paper, a number of challenges faced by the digital forensics investigator in a big data environment are discussed.  ...  The identified challenges could significantly contribute to a more efficient digital forensics process in the big data environment.  ...  Yes/No Table 2 : 2 List of Digital Forensics Challenges in Big Data Digital Forensics Challenges In Big Data  ... 
doi:10.14419/ijet.v7i4.35.26271 fatcat:qomx5qrcejaqnnzznsga5rjzqa

A New Framework for Securing, Extracting and Analyzing Big Forensic Data

Hitesh Sachdev, Hayden Wimmer, Lei Chen, Carl Rebman
2018 Journal of Digital Forensics, Security and Law  
Results indicate the Big Forensic Data Framework model is capable of processing Big Forensic Data.  ...  are combined in an effort to promote more effective and efficient processing of the massive Big Forensic Data.  ...  CONCEPTUAL FRAMEWORK DIGITAL FORENSICS AND BIG DATA Big Forensic Data and its analysis are an emerging topic and not much work is done in this field.  ... 
doi:10.15394/jdfsl.2018.1419 fatcat:pqr4yq673bgwxesacwnhfkwz5y

Digital Forensics as a Big Data Challenge [chapter]

Alessandro Guarino
2013 ISSE 2013 Securing Electronic Business Processes  
All of the above highlights the convergence between so-called data science and digital forensics, to tack the fundamental challenge of analyse vast amount of data ("big data") in actionable time while  ...  context of digital forensics, ranging from the managing of evidence via Map-Reduce to machine learning techniques for triage and analysis of big forensic disk images and network traffic dumps.  ...  Any data that is difficult to manage and work with, or in other words datasets so big that for them conventional tools -e.g. relational databases-are not practical or useful.  ... 
doi:10.1007/978-3-658-03371-2_17 dblp:conf/isse/Guarino13 fatcat:dgwaqdp7ord65mxud6hc7oonk4

Digital transformations and the viability of forensic science laboratories: Crisis-opportunity through decentralisation

Eoghan Casey, Olivier Ribaux, Claude Roux
2018 Forensic Science International  
Simultaneously, these advances create new opportunities for laboratories to harness the power of big data and play a more central role in problem solving collaboratively with the police and other stakeholders  ...  In particular, new portable and miniaturized technologies put powerful capabilities in everyone's pocket, and capture a large quantities of detailed information in a digital format.  ...  Laboratory managers and policymakers are still mainly focused on quality management of existing processes. The debate around digital transformations in forensic science remains weak.  ... 
doi:10.1016/j.forsciint.2018.04.055 pmid:29885922 fatcat:qexyfth2lvh3zokt5mb3n7iowa

Agile Approach for IT Forensics Management [article]

Matthias Schopp, Peter Hillmann
2020 arXiv   pre-print
In the forensic investigation of such attacks, big data problems have to be solved due to the amount of data that needs to be analyzed.  ...  For this purpose, this paper presents the novel flower model, which uses agile methods and forms a new forensic management approach. In this way, the growing challenges of ATs are met.  ...  Conclusion and Next Steps In this proposal, the need for a digital forensic management approach for advanced attacks was pointed out.  ... 
arXiv:2007.04125v1 fatcat:esd7qhq6a5hbfjh2edgy6gerzq

Agile Approach for IT Forensics Management

Matthias Schopp, Peter Hillmann
2019 Journal of Internet Technology and Secured Transaction  
In the forensic investigation of such attacks, big data problems have to be solved due to the amount of data that needs to be analyzed.  ...  For this purpose, this paper presents the novel flower model, which uses agile methods and forms a new forensic management approach. In this way, the growing challenges of ATs are met.  ...  Conclusion and Next Steps In this proposal, the need for a digital forensic management approach for advanced attacks was pointed out.  ... 
doi:10.20533/jitst.2046.3723.2019.0078 fatcat:fkrwwcai5fhe3dvumszdvxhgua

Digital Forensics to Intelligent Forensics

Alastair Irons, Harjinder Lallie
2014 Future Internet  
strain on the ability of digital investigators to apply the processes of digital forensics and digital investigations to obtain timely results.  ...  forensics intelligence and to intelligent forensics and suggests that by applying new techniques to digital investigations there is the opportunity to address the challenges of the larger and more complex  ...  There are a number of potential intelligent forensic solutions in addressing the complexities of big data sources of digital evidence.  ... 
doi:10.3390/fi6030584 fatcat:3l2ykao3snburlfm5kowilcyra

Forensic Investigation Through Data Remnants on Hadoop Big Data Storage System

Myat Nandar Oo, Sazia Parvin, Thandar Thein
2018 Computer systems science and engineering  
Big Data Storage System is identified as an emerging challenge to digital forensics. Thus, it requires the development of a sound methodology to investigate Big Data Storage System.  ...  Forensic examiners are in an uninterrupted battle with criminals in the use of Big Data technology. The underlying storage system is the main scene to trace the criminal activities.  ...  Acknowledgement The authors would like to acknowledge the anonymous referees for their valuable comments in improving the quality of the paper.  ... 
doi:10.32604/csse.2018.33.203 fatcat:t6ki3mtrdfdznbmzp3k3fox2ie

The Kodak Syndrome: Risks and Opportunities Created by Decentralization of Forensic Capabilities

Eoghan Casey, Olivier Ribaux, Claude Roux
2018 Journal of Forensic Sciences  
combined forensic knowledge and intelligence for developing broader strategies to deal with crime in digitalized society.  ...  To accomplish digital transformations, laboratories require personnel with different expertise, including investigative reasoning, knowledge codification, data analytics, and forensic intelligence.  ...  a digitalized world.  ... 
doi:10.1111/1556-4029.13849 pmid:29975983 fatcat:eszxnhnr2zekbh3khsrlicxi6m

A New Digital Forensics Model of Smart City Automated Vehicles

Xiaohua Feng, Edward Swarlat Dawam, Saad Amin
2017 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)  
The proposed development is reported to Big Data 2017. Here, we report the update for discussions.  ...  a novel Digital Forensics Model served for Smart City Automated Vehicles has been developed working on investigating AAV (Autonomous Automated Vehicle) cases.  ...  Since these digital data may potentially end up being used as evidence in court, it should be forensically sound.  ... 
doi:10.1109/ithings-greencom-cpscom-smartdata.2017.47 dblp:conf/ithings/FengDA17 fatcat:gbs3ds32gjcfninnix75svod4q

Information security and digital forensics in the world of cyber physical systems

Andrew Jones, Stilianos Vidalis, Nasser Abouzakhar
2016 2016 Eleventh International Conference on Digital Information Management (ICDIM)  
The security of Cyber Physical Systems and any digital forensic investigations into them will be highly dependent on data that is stored and processed in the Cloud.  ...  Finally, any digital forensic investigation is likely to be time consuming and complex and will continue to be hampered by the current lack of effective tools to deal with these complex and distributed  ...  We are suggesting we should adopt best practice developed in other application domains into the CPS domain.  ... 
doi:10.1109/icdim.2016.7829795 dblp:conf/icdim/JonesVA16 fatcat:ifl34olapbd4tgjjub4qfkizou

A Study Towards Post Hoc Forensic Analysis Using Big Data Analytics

Bipin Bihari Jayasingh
2018 CVR Journal of Science & Technology  
In this paper, the network forensics literature is studied along with how to use big data analytics for accurate analysis of fraud.  ...  This rigorous study leads to making use of available tools and techniques of big data analytics in the development of any network forensic system.  ...  problems in big data management [2] .  ... 
doi:10.32377/cvrjst1413 fatcat:tw6zhqpwozhb7pdha3dcezgigy

A Study on the Improvement of Domestic Internal Audit Technique Using Digital Forensics

Eui-San Ahn, Gyu-an Lee
2018 International Journal of Advanced Science and Technology  
While the digital forensics method is in the spotlight, the KCS(Korea Customs Service) has introduced the digital forensic investigation technique to track drug trafficking and tax evasion in the direct  ...  digital forensics.  ...  Especially, it is required to analyze the digital evidence and introduce a big data processing system to predict and statistically make the information required for audit in the mass information.  ... 
doi:10.14257/ijast.2018.110.05 fatcat:7erjvjidzfhdfehwkqibeglpz4

Emphasizing on Various Security Issues in Cloud Forensic Framework

Pranay Chauhan, Pratosh Bansal
2017 Indian Journal of Science and Technology  
Objectives: To provide a competent secure framework for the cloud forensics system with enhancement of security in various phases of forensics investigation method.  ...  Also at time of reporting main challenge occur for choosing the right court of law; Cross boarder verification is a big issue during investigation, and then exchanging data between two countries needs  ...  Furthermore, digital evidence may use in authentication process or security management for proof of originality in physical or digital context 2,3 .  ... 
doi:10.17485/ijst/2017/v10i18/112116 fatcat:7444tstw4jhejolai7ls6f6yya
« Previous Showing results 1 — 15 out of 8,845 results