Title
Challenge Paper: Validation of Forensic Techniques for Criminal Prosecution
Abstract
As in many domains, there is increasing agreement in the user and research community that digital forensics analysts would benefit from the extension, development and application of advanced techniques in performing large scale and heterogeneous data analysis. Modern digital forensics analysis of cyber-crimes and cyber-enabled crimes often requires scrutiny of massive amounts of data. For example, a case involving network compromise across multiple enterprises might require forensic analysis of numerous sets of network logs and computer hard drives, potentially involving 100's of gigabytes of heterogeneous data, or even terabytes or petabytes of data. Also, the goal for forensic analysis is to not only determine whether the illicit activity being considered is taking place, but also to identify the source of the activity and the full extent of the compromise or impact on the local network. Even after this analysis, there remains the challenge of using the results in subsequent criminal and civil processes.
Year
DOI
Venue
2007
10.1109/SADFE.2007.5
Bell Harbor, WA
Keywords
Field
DocType
heterogeneous data analysis,modern digital forensics analysis,local network,network compromise,forensic analysis,illicit activity,heterogeneous data,criminal prosecution,network log,digital forensics analyst,advanced technique,challenge paper,forensic techniques,digital forensics,law,process design,computer science,data analysis
Data science,Forensic science,Digital forensics,Computer security,Legislation,Process design,Engineering
Conference
ISBN
Citations 
PageRank 
0-7695-2808-2
1
0.42
References 
Authors
1
3
Name
Order
Citations
PageRank
Robert F. Erbacher120227.65
Barbara Endicott-Popovsky210618.23
Deborah A. Frincke3571100.34