A Digital Investigation Tool Based On Data Fusion
A Digital Investigation Tool Based On Data Fusion
net/publication/228851221
CITATIONS READS
6 327
3 authors, including:
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Sateesh Kumar Pradhan on 14 January 2015.
With overwhelming use of Internet, security in Cyberspace has become a prime concern. The forensic digital analysis as a
whole, in its relative infancy, is the unwilling victim of the rapid advancement of computer technology, so it is at the mercy
of ever more new and complex computing approaches. Forensic digital analysis is unique among the forensic sciences in
that it is inherently mathematical and generally comprises more data from an investigation than is present in other types of
forensics. The digital investigation process can be driven using numerous forensic investigation models. Among these is the
need to analyze forensic materials over complex chains of evidence in a wide variety of heterogeneous computing platforms,
environments and transports. This paper compares and contrasts different forensic investigation models and highlights the
main components of forensic investigation model. It also proposes a fusion based investigation tool by grouping and merging
the same activities or processes that provide the same output into an appropriate phase and mapping them into the domain of
data fusion. This grouping process of the activities will balance the investigation process and mapping them into data fusion
domain will produce more quality data for analysis and can produce potential legal digital evidence as an expert testimony
in the court of law.
Keywords: Information Technology, Digital Investigation, Digital Evidence, Data Fusion.
• Digital investigators are finding it increasingly Preparation, Approach, Strategy, Preservation, Collection,
difficult to use current tools to locate vital evidence Examination, Analysis, Presentation, Returning evidence.
within the massive volumes of data. Ciardhuain model [13]- Ciardhuain model consists of the
following: Awareness, Authorization, Planning, Notification,
• Log files are often large in size and multi-
Search and identify evidence, Collection, Transportation,
dimensional, which makes the digital investigation
Storage, Examination, Hypothesis, Presentation, Proof/
and search for supporting evidence more complex.
Defense, Dissemenation.
• Digital evidence [6] [9] by definition is information
After examination of the above mentioned investigation
of probative value stored or transmitted in digital
models, it was noted that: [13] [1]
form. It is fragile in nature and can easily be altered
or destroyed. It is unique when compared to other • Each preceding model modifies the previous.
forms of documentary evidence.
• Some of the models have very similar approaches.
• Forensic investigation tools available are unable to
• Some of the models concentrate on different areas
analyze all the data found on computer system to
of the investigation
reveal the overall pattern of the data set, which can
help digital investigators decide what steps to take • In all the above models no specific theory has been
next in their search. Also the data offered by defined which can be applied for processing the
computer forensic tools can often be misleading digital data, reducing the data while retaining the
due to the dimensionality, complexity and amount useful data, analysis of the data, keeping a record
of the data presented. of criminal profiles and digital evidence for its
future reference, presenting the evidence
3. EXISTING DIGITAL INVESTIGATION MODELS documentation as an expert testimony in the court
of law.
Over the years, several forensic investigation models have
been proposed, they include: Since the goals of the evidence preservation principles
are [3] [6]:
• Kruse and Heiser;
1. To maximize evidence availability and quality;
• Lee’s model;
2. Maintain the integrity of the evidence during the
• Casey’s model;
digital investigation process.
• DFRWS frame work meta-model;
While designing a forensic investigation model, the
• The Reith, Carr and Gunsch model; model should not concentrate on one particular type of case
investigation or on a certain stage. But it should provide the
• The Ciardhuain model.
general guidelines, approach and keep a balance in the
Kruse and Heiser model [4]- Kruser and Heiser stated processes identified by these models. It should incorporate
that forensic investigation consists of 3 basic components: the basic components of forensic investigation which are:
Acquire evidence, Authenticate evidence, Analyzing data. [10]
Lee model [13]- Lee proposed a model that consists of 4
• Preparation;
steps, they are: Recognition, Identification,
Individualization, Reconstruction. The steps proposed by • Investigation;
Lee refer to only a part of the forensic investigation process
• Presentation.
i.e the investigation stage (no preparation or presentation).
Casey’s model [6]- It is similar to that proposed by Lee,
the 1st and last stages are the same. It focuses on processing 4. NEED FOR APPLICATION OF DATA FUSION IN
and examining digital evidence (focuses on investigation). DIGITAL INVESTIGATION
The steps also include: Recognition, Preservation, The Law enforcement agencies are facing a novel challenge
Classification, Reconstruction. Digital forensic Research in terms of jurisdiction and identification of crimes
working group (DFRW) model [13] [12]-The DFRW perpetrated on the Internet, which do not know geographical
model includes crucial stages of the investigation and also boundaries, need a multi-lateral approach of investigation
includes the Presentation stage. It consists of the following and prosecution. They have to analyze enormous amount
stages: Identification, Preservation, Collection, Examination, of data and collection and analysis of such large amounts
Analysis, Presentation, Decision. The Reith, Carr and of data may degrade performance to unacceptable levels.
Gunsch model [11] - The Reith, Carr and Gunsch model Data fusion gains power and relevance for the counter cyber
included other components not found in the above terrorist mission because computer technology enables large
mentioned frameworks. It consists of: Identification, volumes of information to be processed in short times. Multi-
A DIGITAL INVESTIGATION TOOL BASED ON DATA FUSION IN MANAGEMENT OF CYBER SECURITY SYSTEMS 563
sensor data fusion is an evolving technology, concerning • Data reduction (reduces the representation of the
the problem of how to fuse data from multiple sensors in dataset into a smaller volume to make analysis
order to make a more accurate estimation of the environment more practical and feasible).
and to generate information of a superior quality [2][4][8].
It is a formal framework in which the means and tools for
the alliance of data originating from different sources are
expressed. The first data fusion methods were primarily
applied in the military domain, in recent years these methods
have also been applied to problems in the civilian domain
and various non-military applications (e.g., air traffic
controls, robotics, image processing, remote sensing,
hazardous wastes tracking, environmental data fusion, etc.).
It also provides an important functional framework for
building next generation security systems. A more recent
idea is the application of data fusion techniques to the area
of information security [14, 15]. Tim Bass presented a Data
Fusion model, based on the Joint Directors of Laboratories
(JDL) Functional Data Fusion Process Model [14].
Fig. 1: Fusion based Forensic Investigation Tool
The main goal of data fusion system is [2]
• Reliability - to obtain better results than the best Table. 1
individual data source is capable of providing. Activities at Different Levels in
Fusion based Investigation Tool
• Completeness - no direct way of measuring
required property. Data Fusion Levels Activities
Source Events of the crime scene. Sources are
• Improvement - the need to take more factors, or
identified only when crime has been
influencing quantities, into account.
reported and authorization is given to
• Comprehension - the need to reduce information the Investigating agencies.
overload. Data Collection and The first step where data collected from
Pre-Processing [2,4] various sources are fused and processed
to produce data specifying semantically
5. PROPOSED FUSION BASED INVESTIGATION TOOL
understandable and interpretable
This paper proposes a fusion based investigation tool (fig- attributes of objects. The collected data
1) by grouping and merging the digital investigation are aligned in time, space or
activities or processes that provide the same output into an measurement units and the extracted
appropriate phase and mapping them into the domain of information during processing phase is
data fusion (Table-2). This grouping process of the activities saved to the knowledge database or
will balance the investigation process and mapping them knowledgebase.
into data fusion domain will produce more quality data for Low level fusion [2,4] Concerned with data cleaning (removes
analysis and can produce potential legal digital evidence to irrelevant information), data
be presented as an expert testimony in the court of law. It is transformation (converts the raw data
into structured information), data
motivated by Data fusion model proposed by the JDL [2]
reduction (reduces the representation of
that fuses data from various heterogeneous sources in order
the dataset into a smaller volume to
to attain low false alarm rates and high threat detection rates. make analysis more practical and
The data fusion process at different progressions is feasible). It reduces a search space into
further explained in (Table-1). smaller, more easily managed parts
which can save valuable time during
• Preprocessing; digital investigation.
• Processing of events in various levels of fusion; Data estimation It is based on a model of the system
behavior stored in the feature database
• Decision making; and the knowledge acquired by the
knowledgebase. It estimates the state of
• Evidence accumulation; the event. After extracting features from
• Data transformation (converts the raw data into the structured datasets, fusion based
structured information); Contd...
564 SUNEETA SATPATHY, SATEESH K. PRADHAN & B.B. RAY
exceptions are when confession, business or other [2] David L. Hall, Sonya A.H. McMullen, “Mathematical
official records are involved). Techniques in Multisensor Data Fusion”, 2nd edition, Artech
House, 2004.
From an evidence perspective, the law enforcement [3] D. Brezinski and T. Killalea, “Guidelines for Evidence
agencies will seek something that they can proof and Collection and Archiving”, RFC3227, February 2002.
demonstrate to others long after the event is over. [4] E. Waltz and J. Linas, “Multisensor Data Fusion”. Artech
House, Boston, MA, 1990.
7. CONCLUSION [5] E. Casey (ed.), “Handbook of Computer Crime
Investigation”, Academic Press, 2001.
Profiling, identifying, tracing, and apprehending cyber
[6] E. Casey, “Digital Evidence and Computer Crime”, 2nd
suspects are the important issues of research today. Different
Edition, Elsevier Academic Press, 2004.
tools have been developed to detect the misuse and
[7] H Lipson, “Tracking and Tracing Cyber Attacks: Technical
suspicious activities, but very few of them have the provision Challenges and Global Policy Issues (CMU/SEI-2002-SR-
to help law enforcement agencies. They require adequate 009)”, CERT Coordination Center, November 2002.
evidence in order to penalize the criminal, thus, heavily [8] http://www.data-fusion.org.
depending on reports of forensic scientists. To collect the [9] J. Danielsson, “Project Description a System for Collection
digital evidence is not an easy task. Within a computer and Analysis of Forensic Evidence”, Application to NFR,
system the anonymity afforded by the criminal encourages April 2002.
destructive behavior while making it extremely difficult to [10] Michael Kohn, Jhp Eloff, Ms Olivier. “Framework for
prove the identity of the criminal. In this paper we have Digital Forensic Investigation: Information and Computer
given the idea of constructing a proprietary fusion based Security Architectures Research Group (ICSA)”, University
investigation tool for investigative agencies which can work of Pretoria.
at a stretch, process different types data both syntactically [11] Reith, M., Carr, c. and Gunsch, G.: “An Examination of
Digital Forensic Model”, International of Digital Evidence.
and semantically, filter out the files required for forensic
Fall 2002, 1, Issue 3, 2002.
analysis to retrieve the legal digital evidence. The output of
[12] Siti Rahayu Selamat, Robiah Yusof, Shahrin Sahib.:
fusion-based investigation systems will be the estimates of “Mapping Process of Digital Forensic Investigation
the identity of a threat source, the malicious activity, Framework”. IJCSNS International Journal of Computer
taxonomy of the threats, the attack rates, and an assessment Science and Network Security, 8, No.10, October 2008.
of the potential severity of the projected targets. Our future [13] Seamus O Ciardhuain. “An Extended Model of Cybercrime
work includes extending the investigation tool to analyze Investigation”, Journal of Digital Evidence Summer 2004;
different cyber crime cases. 3, Issue 1.
[14] T. Bass, “Multi-sensor Data Fusion for Next Generation
Distributed Intrusion Detection System”, In Proceedings
REFERENCES
of the IRIS National Symposium on Sensor and Data
[1] Baryamureeba, V., Tushabe, F.: “The Enhanced Digital Fusion, 1999.
Investigation Process Model”, Makere University Institute [15] Varshney, “Distributed Detection and Data Fusion”,
of Computer Science, Uganda 2004. Springer-Verlag, New York, NY., 1995.