Skip to main content

3LSPG: Forensic Tool Evaluation by Three Layer Stochastic Process-Based Generation of Data

  • Conference paper
Computational Forensics (IWCF 2010)

Part of the book series: Lecture Notes in Computer Science ((LNIP,volume 6540))

Included in the following conference series:

Abstract

Since organizations cannot prevent all criminal activities of employees by security technology in practice, the application of IT forensic methods for finding traces in data is extremely important. However, new attack variants for occupational crime require new forensic tools and specific environments may require adoptions of methods and tools. Obviously, the development of tools or their adaption require testing using data containing corresponding traces of attacks. Since real-world data are often not available synthetic data are necessary to perform testing. With 3LSPG we propose a systematic method to generate synthetic test data which contain traces of selected attacks. These data can then be used to evaluate the performance of different forensic tools.

This work was supported by CASED ( www.cased.de ).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Behrends, E.: Introduction to Markov Chains. Vieweg Verlag (2000)

    Google Scholar 

  2. Bolton, R., Hand, D.: Statistical Fraud Detection: A Review. Statistical Science 17(3) (2002)

    Google Scholar 

  3. Dacier, M., Deswarte, Y., Kaaniche, M.: Models and tools for quantitative assessment of operational security. In: IFIP SEC 1996 (1996)

    Google Scholar 

  4. Dacier, M., Deswarte, Y., Kaaniche, M.: Quantitative Assessment of Operational Security: Models and Tools. LAAS Research Report 96493 (May 1996)

    Google Scholar 

  5. Deloitte: Ten things about financial statement fraud — A review of SEC enforcement releases, 2000-2006 (June 2007), www.deloitte.com/us/forensiccenter

  6. Germany’s Federal Criminal Police Office (BKA): Wirtschaftskriminalität — Bundeslagebild (2008), http://www.bka.de/lageberichte/wi.html

  7. Jans, M., Lybaert, N., Vanhoff, K.: Data Mining for Fraud Detection: Toward an Improvement on Internal Control Systems? In: 30rd European Accounting Association, Ann. Congr., Lisbon (2007)

    Google Scholar 

  8. Jeske, D., Samadi, B., Lin, P., Ye, L., Cox, S., Xiao, R., Younglove, T., Ly, M., Holt, D., Rich, R.: Generation of synthetic data sets for evaluating the accuracy of knowledge discovery systems. In: ACM KDD 2005 (2005)

    Google Scholar 

  9. Kou, Y., Lu, C., Sirwongwattana, S., Huang, Y.: Survey of fraud detection techniques. In: IEEE Int. Conf. on Networking, Sensing & Control (2004)

    Google Scholar 

  10. KPMG: Anti Fraud Management — Best Practice der Prävention gegen Wirtschaftskriminalität. White Paper (2006)

    Google Scholar 

  11. KPMG: Profile of a Fraudster. White Paper (2007)

    Google Scholar 

  12. Lin, P., Samadi, B., Cipolone, A., Jeske, D., Cox, S., Rendon, C., Holt, D., Xiao, R.: Development of a synthetic data set generator for building and testing information discovery systems. In: 3rd Int. Conf. on Inf. Techn.: New Generations (2006)

    Google Scholar 

  13. Lundin, E., Kvarnström, H., Jonsson, E.: A synthetic fraud data generation methodology. In: Deng, R.H., Qing, S., Bao, F., Zhou, J. (eds.) ICICS 2002. LNCS, vol. 2513, pp. 265–277. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  14. Lundin Barse, E., Kvarnström, H., Jonsson, E.: Synthesizing test data for fraud detection systems. In: Omondi, A.R., Sedukhin, S.G. (eds.) ACSAC 2003. LNCS, vol. 2823, Springer, Heidelberg (2003)

    Google Scholar 

  15. Nestler, C., Salvenmoser, S., Bussmann, K., Werle, M., Krieg, O.: Wirtschaftskriminalität 2007 — Sicherheitslage der deutschen Wirtschaft (2007), http://www.pwc.de/de/crimesurvey

  16. Phua, C., Lee, V., Smith, K., Gayler, R.: A comprehensive survey of data mining-based fraud detection research. Working Paper (2005) (unpublished)

    Google Scholar 

  17. PriceWaterhouseCoopers: Key elements of antifraud programs and controls. White Paper (2003)

    Google Scholar 

  18. Richard, G., Roussev, V.: Next-Generation Digital Forensics. Communications of the ACM 49(2) (2006)

    Google Scholar 

  19. Shamshad, A., Wan Hussin, W., Bawadi, M., Sanusi, S.: First and second order markov chain models for synthetic generation of wind speed time series. Energy 30(5) (2005)

    Google Scholar 

  20. Wells, J.: Corporate Fraud Handbook, 2nd edn. Wiley, Chichester (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yannikos, Y., Franke, F., Winter, C., Schneider, M. (2011). 3LSPG: Forensic Tool Evaluation by Three Layer Stochastic Process-Based Generation of Data. In: Sako, H., Franke, K.Y., Saitoh, S. (eds) Computational Forensics. IWCF 2010. Lecture Notes in Computer Science, vol 6540. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-19376-7_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-19376-7_18

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-19375-0

  • Online ISBN: 978-3-642-19376-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics