Advertisement

Regex: an experimental approach for searching in cyber forensic

  • Pratima SharmaEmail author
  • Bharti Nagpal
Original Research
  • 3 Downloads

Abstract

The expeditious improvement and advancement in technology have shaped computers as ammunition, which may lead to a huge loss if used for wrong motives. The objective of computer forensics involves correctly examine and collect the digital evidence in such a manner so that they are justifiable in court. Due to the growing importance of cyber world security and the sincerity of cybercrime, it is essential for security professionals to know the technology used in forensics and keyword searching is the most handful technique for identifying potential evidence from the pool of files. This paper aims to provide a proper understanding of regular expressions keyword search technique used in computer forensics investigation. In this paper, we perform the experiments using Prodiscover tool to reduce the search space by identifying and filtering the known files to speed up the searching process of evidence identification.

Keywords

Computer forensics Keyword search technique Prodiscover tool Regular expression 

References

  1. 1.
    Digital Evidence Law and Legal Definition, Flowood, U.S. Legal, Inc. (2001–2013) [Online] http://definitions.uslegal.com/d/digital-evidence/. Accessed Dec 2018
  2. 2.
    Albano P, Castiglione A, Cattaneo G, De Maio G, De Santis A (2011) On the construction of a false digital alibi on the Android OS, USA. In: IEEE Computer Society, pp 685–690Google Scholar
  3. 3.
    NIST Information Testing Laboratory (2012) Computer forensics tool testing program. www.cftt.nist.gov. Accessed Dec 2018
  4. 4.
    Anstee D (2012) Worldwide infrastructure security report, arbor networks. www.arbornetworks.com/report. Accessed Dec 2018
  5. 5.
    Roussev V, Ahmed I, Barreto A, McCulley S, Shanmughan V (2016) Cloud forensics tool development studies and future outlook. Digit Investig 18:79–95CrossRefGoogle Scholar
  6. 6.
    Amato F, Cozzolino G, Moscato V, Moscato F (2019) Analyse digital forensic evidences through a semantic-based methodology and NLP techniques. Future Gener Comput Syst 98:297–307CrossRefGoogle Scholar
  7. 7.
    Neera J (2017) Android digital forensics—simplifying android forensics using regular expressions. In: International conference on advances in ICT for emerging regionsGoogle Scholar
  8. 8.
    Ulupinar S, Dogan S, Akbal E, Tuncer T (2017) The importance of standardization in biometric data for digital forensics. In: IEEE accessGoogle Scholar
  9. 9.
    Rocha A, Scheirer WJ (2016) Authorship attribution for social media forensics. In: IEEE transactions on information forensics and securityGoogle Scholar
  10. 10.
    Hibshi H, Vidas T, Cranor L (2011) Usability of forensics tools: a user study. In: IEEE 6th international conference on it security incident management and it forensics. Carnegie Mellon UniversityGoogle Scholar
  11. 11.
    Mehrotra T, Mehtre BM (2014) An automated forensic tool for image metadata and Windows 7 Recycle Bin. In: International conference on control, instrumentation, communication and computational technologiesGoogle Scholar
  12. 12.
    Geiger M (2014) Counter-forensic tools: analysis and data recovery. [Online]: http://www.first.org/conference/2006/papers/geiger-matthew-papers.pdf. Accessed Dec 2018
  13. 13.
    Hunt R, Zeadally S (2012) Network forensics: an analysis of techniques, tools, and trends. In: IEEE computer journal issue, p 99Google Scholar
  14. 14.
    Garfinkel L (2010) Digital forensics research: the next 10 years. Digit Investig 7:S64–S73CrossRefGoogle Scholar
  15. 15.
    Data in Gapminder World [dataset] (2016) https://www.gapminder.org/data/. Accessed Dec 2018

Copyright information

© Bharati Vidyapeeth's Institute of Computer Applications and Management 2019

Authors and Affiliations

  1. 1.CSE DepartmentAIACT&RDelhiIndia

Personalised recommendations