Skip to main content
Top

2022 | OriginalPaper | Chapter

A Digital Forensic Readiness Cybercrime Semantic Trigger Process

Authors : Stacey O. Baror, Hein S. Venter, Richard Adeyemi Ikuesan

Published in: e-Infrastructure and e-Services for Developing Countries

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The recent wave of the global Covid-19 pandemic has led to a surge in text-based non-technical cybercrime attacks within the cyber ecosystem. Information about such cyber-attacks is often in unstructured text data and metadata, a rich source of evidence in a digital forensic investigation. However, such information is usually unavailable during a digital forensic investigation when dealing with the public cloud post-incident. Furthermore, digital investigators are challenged with extracting meaningful semantic content from the raw syntactic and unstructured data. It is partly due to the lack of a structured process for forensic data pre-processing when or if such information is identified. Thus, this study seeks to address the lack of a procedure or technique to extract semantic meaning from text data of a cybercrime attack that could be used as a digital forensic readiness semantics trigger in a cybercrime detection process. For the methodology to address the proposed approach, data science modelling and unsupervised machine learning are used to design a strategy. This method process extracts tokens of cybercrime text data, which are further used to develop an intelligent DFR semantic tool extractor based on natural language patterns from cybercrime text data. The proposed DFR cybercrime semantic trigger process when implemented could be used to create a digital forensic cybercrime language API for all digital forensic investigation systems or tools.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Allen, T.T., Sui, Z., Akbari, K.: Exploratory text data analysis for quality hypothesis generation. Qual. Eng. 30(4), 701–712 (2018)CrossRef Allen, T.T., Sui, Z., Akbari, K.: Exploratory text data analysis for quality hypothesis generation. Qual. Eng. 30(4), 701–712 (2018)CrossRef
3.
go back to reference Ami-Narh, J.T., Williams, P.A.: Digital forensics and the legal system: a dilemma of our times (2008) Ami-Narh, J.T., Williams, P.A.: Digital forensics and the legal system: a dilemma of our times (2008)
4.
go back to reference Baror, S.O., Venter, H.S., Adeyemi, R.: A natural human language framework for digital forensic readiness in the public cloud. Aust. J. Forensic Sci. 53(5), 566–591 (2021)CrossRef Baror, S.O., Venter, H.S., Adeyemi, R.: A natural human language framework for digital forensic readiness in the public cloud. Aust. J. Forensic Sci. 53(5), 566–591 (2021)CrossRef
5.
go back to reference Baror, S.O., Ikuesan, R.A., Venter, H.S.: A defined digital forensic criteria for cybercrime reporting. In: International Conference on Cyber Warfare and Security, pp. 617–XVIII. Academic Conferences International Limited (2020) Baror, S.O., Ikuesan, R.A., Venter, H.S.: A defined digital forensic criteria for cybercrime reporting. In: International Conference on Cyber Warfare and Security, pp. 617–XVIII. Academic Conferences International Limited (2020)
6.
go back to reference Baror, S.O., Venter, H.: A taxonomy for cybercrime attack in the public cloud. In: International Conference on Cyber Warfare and Security, pp. 505–X. Academic Conferences International Limited (2019) Baror, S.O., Venter, H.: A taxonomy for cybercrime attack in the public cloud. In: International Conference on Cyber Warfare and Security, pp. 505–X. Academic Conferences International Limited (2019)
8.
go back to reference Casey, E.: Digital evidence and computer crime: forensic science, computers, and the internet. Academic Press (2011) Casey, E.: Digital evidence and computer crime: forensic science, computers, and the internet. Academic Press (2011)
9.
go back to reference Cekik, R., Uysal, A.K.: A novel filter feature selection method using rough set for short text data. Expert Syst. Appl. 160, 113691 (2020)CrossRef Cekik, R., Uysal, A.K.: A novel filter feature selection method using rough set for short text data. Expert Syst. Appl. 160, 113691 (2020)CrossRef
10.
go back to reference Ferreira Cruz, A., Rocha, G., Lopes Cardoso, H.: Coreference resolution: toward end-to-end and cross-lingual systems. Information 11(2), 74 (2020)CrossRef Ferreira Cruz, A., Rocha, G., Lopes Cardoso, H.: Coreference resolution: toward end-to-end and cross-lingual systems. Information 11(2), 74 (2020)CrossRef
11.
go back to reference Hargreaves, C.J., Solomon, S.H.: Assessing the reliability of digital evidence from live investigations involving encryption. Ph.D thesis, Deportment of Informatics and Sensors, Cranfield University, UK (2009) Hargreaves, C.J., Solomon, S.H.: Assessing the reliability of digital evidence from live investigations involving encryption. Ph.D thesis, Deportment of Informatics and Sensors, Cranfield University, UK (2009)
12.
go back to reference Hofmann, T.: Realms of meaning: an introduction to semantics. Routledge (2015) Hofmann, T.: Realms of meaning: an introduction to semantics. Routledge (2015)
14.
go back to reference Huoranszki, F.: Common sense and the theory of human behaviour. Philos. Q. 52(209), 526–543 (2002)CrossRef Huoranszki, F.: Common sense and the theory of human behaviour. Philos. Q. 52(209), 526–543 (2002)CrossRef
15.
go back to reference Ivan, I., Milodin, D., Sbora, C.: Non security–premise of cybercrime. Theor. Appl. Econ. 19(4), 59–78 (2012) Ivan, I., Milodin, D., Sbora, C.: Non security–premise of cybercrime. Theor. Appl. Econ. 19(4), 59–78 (2012)
16.
go back to reference Jongejan, B., Dalianis, H.: Automatic training of lemmatization rules that handle morphological changes in pre-, in-and suffixes alike. In: Proceedings of the Joint Conference of the 47th Annual Meeting of the ACL and the 4th International Joint Conference on Natural Language Processing of the AFNLP, pp. 145–153 (2009) Jongejan, B., Dalianis, H.: Automatic training of lemmatization rules that handle morphological changes in pre-, in-and suffixes alike. In: Proceedings of the Joint Conference of the 47th Annual Meeting of the ACL and the 4th International Joint Conference on Natural Language Processing of the AFNLP, pp. 145–153 (2009)
17.
go back to reference Jurafsky, D., Martin, J.H.: Speech and language processing (draft). Chapter A: Hidden Markov Models (Draft of 11 Sep. 2018). Retrieved 19 March 2019 (2018) Jurafsky, D., Martin, J.H.: Speech and language processing (draft). Chapter A: Hidden Markov Models (Draft of 11 Sep. 2018). Retrieved 19 March 2019 (2018)
18.
go back to reference Kebande, V.R., Karie, N.M., Ikuesan, R.A., Venter, H.S.: Ontology-driven perspective of CFRaaS. Wiley Interdiscip. Rev. Forensic Sci. 2(5), e1372 (2020)CrossRef Kebande, V.R., Karie, N.M., Ikuesan, R.A., Venter, H.S.: Ontology-driven perspective of CFRaaS. Wiley Interdiscip. Rev. Forensic Sci. 2(5), e1372 (2020)CrossRef
19.
go back to reference Lagrasse, M., Singh, A., Munkhondya, H., Ikuesan, A., Venter, H.: Digital forensic readiness framework for software-defined networks using a trigger-based collection mechanism. In: Proceedings of the 15th International Conference on Cyber Warfare and Security, ICCWS, pp. 296–305 (2020) Lagrasse, M., Singh, A., Munkhondya, H., Ikuesan, A., Venter, H.: Digital forensic readiness framework for software-defined networks using a trigger-based collection mechanism. In: Proceedings of the 15th International Conference on Cyber Warfare and Security, ICCWS, pp. 296–305 (2020)
20.
go back to reference Ma, L., Zhang, Y.: Using word2vec to process big text data. In: 2015 IEEE International Conference on Big Data (Big Data), pp. 2895–2897. IEEE (2015) Ma, L., Zhang, Y.: Using word2vec to process big text data. In: 2015 IEEE International Conference on Big Data (Big Data), pp. 2895–2897. IEEE (2015)
21.
go back to reference McClelland, D., Marturana, F.: A digital forensics triage methodology based on feature manipulation techniques. In: 2014 IEEE International Conference on Communications Workshops (ICC), pp. 676–681. IEEE (2014) McClelland, D., Marturana, F.: A digital forensics triage methodology based on feature manipulation techniques. In: 2014 IEEE International Conference on Communications Workshops (ICC), pp. 676–681. IEEE (2014)
22.
go back to reference Omeleze, S., Venter, H.S.: Testing the harmonised digital forensic investigation process model-using an android mobile phone. In: 2013 Information Security for South Africa, pp. 1–8. IEEE (2013) Omeleze, S., Venter, H.S.: Testing the harmonised digital forensic investigation process model-using an android mobile phone. In: 2013 Information Security for South Africa, pp. 1–8. IEEE (2013)
23.
go back to reference Plisson, J., Lavrac, N., Mladenic, D., et al.: A rule based approach to word lemmatization. In: Proceedings of IS. vol. 3, pp. 83–86 (2004) Plisson, J., Lavrac, N., Mladenic, D., et al.: A rule based approach to word lemmatization. In: Proceedings of IS. vol. 3, pp. 83–86 (2004)
25.
go back to reference Riemer, N.: Introducing Semantics. Cambridge University Press, Cambridge (2010)CrossRef Riemer, N.: Introducing Semantics. Cambridge University Press, Cambridge (2010)CrossRef
26.
go back to reference Sinatra, R., Dowd, C.A.: Using syntactic and semantic clues to learn vocabulary. J. Read. 35(3), 224–229 (1991) Sinatra, R., Dowd, C.A.: Using syntactic and semantic clues to learn vocabulary. J. Read. 35(3), 224–229 (1991)
28.
go back to reference Valjarević, A., Venter, H., Petrović, R.: ISO/IEC 27043:2015–role and application. In: 2016 24th Telecommunications Forum (TELFOR), pp. 1–4. IEEE (2016) Valjarević, A., Venter, H., Petrović, R.: ISO/IEC 27043:2015–role and application. In: 2016 24th Telecommunications Forum (TELFOR), pp. 1–4. IEEE (2016)
Metadata
Title
A Digital Forensic Readiness Cybercrime Semantic Trigger Process
Authors
Stacey O. Baror
Hein S. Venter
Richard Adeyemi Ikuesan
Copyright Year
2022
DOI
https://doi.org/10.1007/978-3-031-06374-9_21

Premium Partner