Skip to main content

2022 | OriginalPaper | Buchkapitel

A Digital Forensic Readiness Cybercrime Semantic Trigger Process

verfasst von : Stacey O. Baror, Hein S. Venter, Richard Adeyemi Ikuesan

Erschienen in: e-Infrastructure and e-Services for Developing Countries

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The recent wave of the global Covid-19 pandemic has led to a surge in text-based non-technical cybercrime attacks within the cyber ecosystem. Information about such cyber-attacks is often in unstructured text data and metadata, a rich source of evidence in a digital forensic investigation. However, such information is usually unavailable during a digital forensic investigation when dealing with the public cloud post-incident. Furthermore, digital investigators are challenged with extracting meaningful semantic content from the raw syntactic and unstructured data. It is partly due to the lack of a structured process for forensic data pre-processing when or if such information is identified. Thus, this study seeks to address the lack of a procedure or technique to extract semantic meaning from text data of a cybercrime attack that could be used as a digital forensic readiness semantics trigger in a cybercrime detection process. For the methodology to address the proposed approach, data science modelling and unsupervised machine learning are used to design a strategy. This method process extracts tokens of cybercrime text data, which are further used to develop an intelligent DFR semantic tool extractor based on natural language patterns from cybercrime text data. The proposed DFR cybercrime semantic trigger process when implemented could be used to create a digital forensic cybercrime language API for all digital forensic investigation systems or tools.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Allen, T.T., Sui, Z., Akbari, K.: Exploratory text data analysis for quality hypothesis generation. Qual. Eng. 30(4), 701–712 (2018)CrossRef Allen, T.T., Sui, Z., Akbari, K.: Exploratory text data analysis for quality hypothesis generation. Qual. Eng. 30(4), 701–712 (2018)CrossRef
3.
Zurück zum Zitat Ami-Narh, J.T., Williams, P.A.: Digital forensics and the legal system: a dilemma of our times (2008) Ami-Narh, J.T., Williams, P.A.: Digital forensics and the legal system: a dilemma of our times (2008)
4.
Zurück zum Zitat Baror, S.O., Venter, H.S., Adeyemi, R.: A natural human language framework for digital forensic readiness in the public cloud. Aust. J. Forensic Sci. 53(5), 566–591 (2021)CrossRef Baror, S.O., Venter, H.S., Adeyemi, R.: A natural human language framework for digital forensic readiness in the public cloud. Aust. J. Forensic Sci. 53(5), 566–591 (2021)CrossRef
5.
Zurück zum Zitat Baror, S.O., Ikuesan, R.A., Venter, H.S.: A defined digital forensic criteria for cybercrime reporting. In: International Conference on Cyber Warfare and Security, pp. 617–XVIII. Academic Conferences International Limited (2020) Baror, S.O., Ikuesan, R.A., Venter, H.S.: A defined digital forensic criteria for cybercrime reporting. In: International Conference on Cyber Warfare and Security, pp. 617–XVIII. Academic Conferences International Limited (2020)
6.
Zurück zum Zitat Baror, S.O., Venter, H.: A taxonomy for cybercrime attack in the public cloud. In: International Conference on Cyber Warfare and Security, pp. 505–X. Academic Conferences International Limited (2019) Baror, S.O., Venter, H.: A taxonomy for cybercrime attack in the public cloud. In: International Conference on Cyber Warfare and Security, pp. 505–X. Academic Conferences International Limited (2019)
8.
Zurück zum Zitat Casey, E.: Digital evidence and computer crime: forensic science, computers, and the internet. Academic Press (2011) Casey, E.: Digital evidence and computer crime: forensic science, computers, and the internet. Academic Press (2011)
9.
Zurück zum Zitat Cekik, R., Uysal, A.K.: A novel filter feature selection method using rough set for short text data. Expert Syst. Appl. 160, 113691 (2020)CrossRef Cekik, R., Uysal, A.K.: A novel filter feature selection method using rough set for short text data. Expert Syst. Appl. 160, 113691 (2020)CrossRef
10.
Zurück zum Zitat Ferreira Cruz, A., Rocha, G., Lopes Cardoso, H.: Coreference resolution: toward end-to-end and cross-lingual systems. Information 11(2), 74 (2020)CrossRef Ferreira Cruz, A., Rocha, G., Lopes Cardoso, H.: Coreference resolution: toward end-to-end and cross-lingual systems. Information 11(2), 74 (2020)CrossRef
11.
Zurück zum Zitat Hargreaves, C.J., Solomon, S.H.: Assessing the reliability of digital evidence from live investigations involving encryption. Ph.D thesis, Deportment of Informatics and Sensors, Cranfield University, UK (2009) Hargreaves, C.J., Solomon, S.H.: Assessing the reliability of digital evidence from live investigations involving encryption. Ph.D thesis, Deportment of Informatics and Sensors, Cranfield University, UK (2009)
12.
Zurück zum Zitat Hofmann, T.: Realms of meaning: an introduction to semantics. Routledge (2015) Hofmann, T.: Realms of meaning: an introduction to semantics. Routledge (2015)
14.
Zurück zum Zitat Huoranszki, F.: Common sense and the theory of human behaviour. Philos. Q. 52(209), 526–543 (2002)CrossRef Huoranszki, F.: Common sense and the theory of human behaviour. Philos. Q. 52(209), 526–543 (2002)CrossRef
15.
Zurück zum Zitat Ivan, I., Milodin, D., Sbora, C.: Non security–premise of cybercrime. Theor. Appl. Econ. 19(4), 59–78 (2012) Ivan, I., Milodin, D., Sbora, C.: Non security–premise of cybercrime. Theor. Appl. Econ. 19(4), 59–78 (2012)
16.
Zurück zum Zitat Jongejan, B., Dalianis, H.: Automatic training of lemmatization rules that handle morphological changes in pre-, in-and suffixes alike. In: Proceedings of the Joint Conference of the 47th Annual Meeting of the ACL and the 4th International Joint Conference on Natural Language Processing of the AFNLP, pp. 145–153 (2009) Jongejan, B., Dalianis, H.: Automatic training of lemmatization rules that handle morphological changes in pre-, in-and suffixes alike. In: Proceedings of the Joint Conference of the 47th Annual Meeting of the ACL and the 4th International Joint Conference on Natural Language Processing of the AFNLP, pp. 145–153 (2009)
17.
Zurück zum Zitat Jurafsky, D., Martin, J.H.: Speech and language processing (draft). Chapter A: Hidden Markov Models (Draft of 11 Sep. 2018). Retrieved 19 March 2019 (2018) Jurafsky, D., Martin, J.H.: Speech and language processing (draft). Chapter A: Hidden Markov Models (Draft of 11 Sep. 2018). Retrieved 19 March 2019 (2018)
18.
Zurück zum Zitat Kebande, V.R., Karie, N.M., Ikuesan, R.A., Venter, H.S.: Ontology-driven perspective of CFRaaS. Wiley Interdiscip. Rev. Forensic Sci. 2(5), e1372 (2020)CrossRef Kebande, V.R., Karie, N.M., Ikuesan, R.A., Venter, H.S.: Ontology-driven perspective of CFRaaS. Wiley Interdiscip. Rev. Forensic Sci. 2(5), e1372 (2020)CrossRef
19.
Zurück zum Zitat Lagrasse, M., Singh, A., Munkhondya, H., Ikuesan, A., Venter, H.: Digital forensic readiness framework for software-defined networks using a trigger-based collection mechanism. In: Proceedings of the 15th International Conference on Cyber Warfare and Security, ICCWS, pp. 296–305 (2020) Lagrasse, M., Singh, A., Munkhondya, H., Ikuesan, A., Venter, H.: Digital forensic readiness framework for software-defined networks using a trigger-based collection mechanism. In: Proceedings of the 15th International Conference on Cyber Warfare and Security, ICCWS, pp. 296–305 (2020)
20.
Zurück zum Zitat Ma, L., Zhang, Y.: Using word2vec to process big text data. In: 2015 IEEE International Conference on Big Data (Big Data), pp. 2895–2897. IEEE (2015) Ma, L., Zhang, Y.: Using word2vec to process big text data. In: 2015 IEEE International Conference on Big Data (Big Data), pp. 2895–2897. IEEE (2015)
21.
Zurück zum Zitat McClelland, D., Marturana, F.: A digital forensics triage methodology based on feature manipulation techniques. In: 2014 IEEE International Conference on Communications Workshops (ICC), pp. 676–681. IEEE (2014) McClelland, D., Marturana, F.: A digital forensics triage methodology based on feature manipulation techniques. In: 2014 IEEE International Conference on Communications Workshops (ICC), pp. 676–681. IEEE (2014)
22.
Zurück zum Zitat Omeleze, S., Venter, H.S.: Testing the harmonised digital forensic investigation process model-using an android mobile phone. In: 2013 Information Security for South Africa, pp. 1–8. IEEE (2013) Omeleze, S., Venter, H.S.: Testing the harmonised digital forensic investigation process model-using an android mobile phone. In: 2013 Information Security for South Africa, pp. 1–8. IEEE (2013)
23.
Zurück zum Zitat Plisson, J., Lavrac, N., Mladenic, D., et al.: A rule based approach to word lemmatization. In: Proceedings of IS. vol. 3, pp. 83–86 (2004) Plisson, J., Lavrac, N., Mladenic, D., et al.: A rule based approach to word lemmatization. In: Proceedings of IS. vol. 3, pp. 83–86 (2004)
25.
Zurück zum Zitat Riemer, N.: Introducing Semantics. Cambridge University Press, Cambridge (2010)CrossRef Riemer, N.: Introducing Semantics. Cambridge University Press, Cambridge (2010)CrossRef
26.
Zurück zum Zitat Sinatra, R., Dowd, C.A.: Using syntactic and semantic clues to learn vocabulary. J. Read. 35(3), 224–229 (1991) Sinatra, R., Dowd, C.A.: Using syntactic and semantic clues to learn vocabulary. J. Read. 35(3), 224–229 (1991)
28.
Zurück zum Zitat Valjarević, A., Venter, H., Petrović, R.: ISO/IEC 27043:2015–role and application. In: 2016 24th Telecommunications Forum (TELFOR), pp. 1–4. IEEE (2016) Valjarević, A., Venter, H., Petrović, R.: ISO/IEC 27043:2015–role and application. In: 2016 24th Telecommunications Forum (TELFOR), pp. 1–4. IEEE (2016)
Metadaten
Titel
A Digital Forensic Readiness Cybercrime Semantic Trigger Process
verfasst von
Stacey O. Baror
Hein S. Venter
Richard Adeyemi Ikuesan
Copyright-Jahr
2022
DOI
https://doi.org/10.1007/978-3-031-06374-9_21

Premium Partner