Skip to main content

2018 | OriginalPaper | Buchkapitel

4. Digital Forensic Data Reduction by Selective Imaging

verfasst von : Darren Quick, Kim-Kwang Raymond Choo

Erschienen in: Big Digital Forensic Data

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In the previous chapters, the focus of the research was outlined, current literature was discussed, and the proposed Digital Forensic Data Reduction Framework was explained. This chapter focuses on Step 5 of the framework and explores the process of data reduction using the proposed framework to guide the research.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Alhussein, M. (2016). Automatic facial emotion recognition using weber local descriptor for e-Healthcare system. Cluster Computing, 1–10. Alhussein, M. (2016). Automatic facial emotion recognition using weber local descriptor for e-Healthcare system. Cluster Computing, 1–10.
Zurück zum Zitat Alqahtany, S., Clarke, N., Furnell, S., & Reich, C. (2015). A forensic acquisition and analysis system for IaaS. Cluster Computing, 1–15. Alqahtany, S., Clarke, N., Furnell, S., & Reich, C. (2015). A forensic acquisition and analysis system for IaaS. Cluster Computing, 1–15.
Zurück zum Zitat Beebe, N. (2009) Digital forensic research: The good, the bad and the unaddressed. Advances in Digital Forensics, pp. 17–36. (Springer, no.).CrossRef Beebe, N. (2009) Digital forensic research: The good, the bad and the unaddressed. Advances in Digital Forensics, pp. 17–36. (Springer, no.).CrossRef
Zurück zum Zitat Beebe, N., & Clark, J. (2005). Dealing with terabyte data sets in digital investigations. Advances in Digital Forensics, 3–16. Beebe, N., & Clark, J. (2005). Dealing with terabyte data sets in digital investigations. Advances in Digital Forensics, 3–16.
Zurück zum Zitat Garfinkel, S., Farrell, P., Roussev, V., & Dinolt, G. (2009). Bringing science to digital forensics with standardized forensic corpora. Digital Investigation, 6, S2–S11.CrossRef Garfinkel, S., Farrell, P., Roussev, V., & Dinolt, G. (2009). Bringing science to digital forensics with standardized forensic corpora. Digital Investigation, 6, S2–S11.CrossRef
Zurück zum Zitat Ghaleb, T. A. (2015). Techniques and countermeasures of website/wireless traffic analysis and fingerprinting. Cluster Computing, 1–12. Ghaleb, T. A. (2015). Techniques and countermeasures of website/wireless traffic analysis and fingerprinting. Cluster Computing, 1–12.
Zurück zum Zitat Hu, C., Xu, Z., Liu, Y., Mei, L., Chen, L., & Luo, X. (2014). Semantic link network-based model for organizing multimedia big data. IEEE Transactions on Emerging Topics in Computing, 2(3), 376–387.CrossRef Hu, C., Xu, Z., Liu, Y., Mei, L., Chen, L., & Luo, X. (2014). Semantic link network-based model for organizing multimedia big data. IEEE Transactions on Emerging Topics in Computing, 2(3), 376–387.CrossRef
Zurück zum Zitat Hu, C., Xu, Z., Liu, Y., & Mei, L. (2015). Video structural description technology for the new generation video surveillance systems. Frontiers of Computer Science, 9(6), 980–989.CrossRef Hu, C., Xu, Z., Liu, Y., & Mei, L. (2015). Video structural description technology for the new generation video surveillance systems. Frontiers of Computer Science, 9(6), 980–989.CrossRef
Zurück zum Zitat ISO/IEC 2012, 27037:2012 Guidelines for identification, collection, acquisition and preservation of digital evidence. ISO/IEC 2012, 27037:2012 Guidelines for identification, collection, acquisition and preservation of digital evidence.
Zurück zum Zitat Jones, B., Pleno, S., & Wilkinson, M. (2012). The use of random sampling in investigations involving child abuse material, Digital Investigation, 9: S99–S107. Supplement no. 0.CrossRef Jones, B., Pleno, S., & Wilkinson, M. (2012). The use of random sampling in investigations involving child abuse material, Digital Investigation, 9: S99–S107. Supplement no. 0.CrossRef
Zurück zum Zitat Luo, X., Xu, Z., Yu, J., & Chen, X. (2011). Building association link network for semantic link on web resources. IEEE Transactions on Automation Science and Engineering, 8(3), 482–494.CrossRef Luo, X., Xu, Z., Yu, J., & Chen, X. (2011). Building association link network for semantic link on web resources. IEEE Transactions on Automation Science and Engineering, 8(3), 482–494.CrossRef
Zurück zum Zitat Punithavathani, D. S., Sujatha, K., & Jain, J. M. (2015). Surveillance of anomaly and misuse in critical networks to counter insider threats using computational intelligence. Cluster Computing, 18(1), 435–451.CrossRef Punithavathani, D. S., Sujatha, K., & Jain, J. M. (2015). Surveillance of anomaly and misuse in critical networks to counter insider threats using computational intelligence. Cluster Computing, 18(1), 435–451.CrossRef
Zurück zum Zitat Ribaux, O., Baylon, A., Roux, C., Delémont, O., Lock, E., Zingg, C., et al. (2010). Intelligence-led crime scene processing. Part I: Forensic intelligence. Forensic Science International, 195(1–3), 10–16.CrossRef Ribaux, O., Baylon, A., Roux, C., Delémont, O., Lock, E., Zingg, C., et al. (2010). Intelligence-led crime scene processing. Part I: Forensic intelligence. Forensic Science International, 195(1–3), 10–16.CrossRef
Zurück zum Zitat Shannon, M. (2004). Forensic relative strength scoring: ASCII and entropy scoring. International Journal of Digital Evidence, 2(4), 151–169. Shannon, M. (2004). Forensic relative strength scoring: ASCII and entropy scoring. International Journal of Digital Evidence, 2(4), 151–169.
Zurück zum Zitat Wei, X., Luo, X., Li, Q., Zhang, J., & Xu, Z. (2015). Online comment-based hotel quality automatic assessment using improved fuzzy comprehensive evaluation and fuzzy cognitive map. IEEE Transactions on Fuzzy Systems, 23(1), 72–84.CrossRef Wei, X., Luo, X., Li, Q., Zhang, J., & Xu, Z. (2015). Online comment-based hotel quality automatic assessment using improved fuzzy comprehensive evaluation and fuzzy cognitive map. IEEE Transactions on Fuzzy Systems, 23(1), 72–84.CrossRef
Zurück zum Zitat Xu, Z., Liu, Y., Mei, L., Hu, C., & Chen, L. (2014a). Generating temporal semantic context of concepts using web search engines. Journal of Network and Computer Applications, 43, 42–55.CrossRef Xu, Z., Liu, Y., Mei, L., Hu, C., & Chen, L. (2014a). Generating temporal semantic context of concepts using web search engines. Journal of Network and Computer Applications, 43, 42–55.CrossRef
Zurück zum Zitat Xu, Z., Luo, X., Mei, L., & Hu, C. (2014b). Measuring the semantic discrimination capability of association relations. Concurrency and Computation: Practice and Experience, 26(2), 380–395.CrossRef Xu, Z., Luo, X., Mei, L., & Hu, C. (2014b). Measuring the semantic discrimination capability of association relations. Concurrency and Computation: Practice and Experience, 26(2), 380–395.CrossRef
Zurück zum Zitat Xu, Z., Luo, X., Zhang, S., Wei, X., Mei, L., & Hu, C. (2014c). Mining temporal explicit and implicit semantic relations between entities using web search engines. Future Generation Computer Systems, 37, 468–477.CrossRef Xu, Z., Luo, X., Zhang, S., Wei, X., Mei, L., & Hu, C. (2014c). Mining temporal explicit and implicit semantic relations between entities using web search engines. Future Generation Computer Systems, 37, 468–477.CrossRef
Zurück zum Zitat Xu, Z., Mei, L., Liu, Y., Hu, C., & Chen, L. (2014d), Semantic enhanced cloud environment for surveillance data management using video structural description. Computing, 1–20. Xu, Z., Mei, L., Liu, Y., Hu, C., & Chen, L. (2014d), Semantic enhanced cloud environment for surveillance data management using video structural description. Computing, 1–20.
Zurück zum Zitat Xu, Z., Liu, Y., Mei, L., Hu, C., & Chen, L. (2015). Semantic based representing and organizing surveillance big data using video structural description technology. Journal of Systems and Software, 102, 217–225.CrossRef Xu, Z., Liu, Y., Mei, L., Hu, C., & Chen, L. (2015). Semantic based representing and organizing surveillance big data using video structural description technology. Journal of Systems and Software, 102, 217–225.CrossRef
Zurück zum Zitat Xuan, J., Luo, X., Zhang, G., Lu, J., & Xu, Z. (2015). Uncertainty analysis for the keyword system of web events. Xuan, J., Luo, X., Zhang, G., Lu, J., & Xu, Z. (2015). Uncertainty analysis for the keyword system of web events.
Zurück zum Zitat Zhao, L., Chen, L., Ranjan, R., Choo, K. –K. R., & He, J. (2015). Geographical information system parallelization for spatial big data processing: A review. Cluster Computing, 1–14. Zhao, L., Chen, L., Ranjan, R., Choo, K. –K. R., & He, J. (2015). Geographical information system parallelization for spatial big data processing: A review. Cluster Computing, 1–14.
Metadaten
Titel
Digital Forensic Data Reduction by Selective Imaging
verfasst von
Darren Quick
Kim-Kwang Raymond Choo
Copyright-Jahr
2018
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-7763-0_4