Investigating Visualisation Techniques for Rapid Triage of Digital Forensic Evidence

被引:3
作者
Hales, Gavin [1 ]
Bayne, Ethan [1 ]
机构
[1] Abertay Univ, Div Cyber Secur, Dundee, Scotland
来源
HCI FOR CYBERSECURITY, PRIVACY AND TRUST | 2019年 / 11594卷
关键词
Digital forensics; Data visualisation; Computer security; File carving; Digital triage;
D O I
10.1007/978-3-030-22351-9_19
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This study investigates the feasibility of a tool that allows digital forensics (DF) investigators to efficiently triage device datasets during the collection phase of an investigation. This tool utilises data visualisation techniques to display images found in near real-time to the end user. Findings indicate that participants were able to accurately identify contraband material whilst using this tool, however, classification accuracy dropped slightly with larger datasets. Combined with participant feedback, the results show that the proposed triage method is indeed feasible, and this tool provides a solid foundation for the continuation of further work.
引用
收藏
页码:277 / 293
页数:17
相关论文
共 16 条
[1]   Vulnus: Visual Vulnerability Analysis for Network Security [J].
Angelini, Marco ;
Blasilli, Graziano ;
Catarci, Tiziana ;
Lenti, Simone ;
Santucci, Giuseppe .
IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, 2019, 25 (01) :183-192
[2]   OpenForensics: A digital forensics GPU pattern matching approach for the 21st century [J].
Bayne, E. ;
Ferguson, R. I. ;
Sampson, A. T. .
DIGITAL INVESTIGATION, 2018, 24 :S29-S37
[3]  
Farrance Rex, 2006, TIMELINE 50 YEARS HA
[4]  
Hales G, 2017, 2017 INTERNATIONAL CONFERENCE ON CYBER SITUATIONAL AWARENESS, DATA ANALYTICS AND ASSESSMENT (CYBER SA), DOI 10.1109/CyberSA.2017.8073402
[5]  
Her Majesty's Inspectorate of Constabulary:, 2015, ONL EDG REAL RISKS V
[6]   A Survey of Network Traffic Visualization in Detecting Network Security Threats [J].
Liu, Xiaomei ;
Sun, Yong ;
Fang, Liang ;
Liu, Junpeng ;
Yu, Lingjing .
TRUSTWORTHY COMPUTING AND SERVICES (ISCTCS 2014), 2015, 520 :91-98
[7]  
Mah Ung G., 2016, SEAGATES 10 TB BARRA
[8]  
Mayer F., 2017, P 12 INT C AV REL SE, P1
[9]   SPAM: Signal Processing to Analyze Malware [J].
Nataraj, Lakshmanan ;
Manjunath, B. S. .
IEEE SIGNAL PROCESSING MAGAZINE, 2016, 33 (02) :105-+
[10]  
OFCOM, 2018, DEC DIG DEP