Skip to main content

A Decision-Driven Computer Forensic Classification Using ID3 Algorithm

  • Conference paper
  • First Online:
Intelligent Computing, Communication and Devices

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 309))

Abstract

Rapid evolution of information technology has caused devices to be used in criminal activities. Criminals have been using the Internet to distribute a wide range of illegal materials globally, making tracing difficult for the purpose of initiating digital investigation process. Forensic digital analysis is unique and inherently mathematical and generally comprises more data from an investigation than is present in other types of forensic investigations. To provide appropriate and sufficient security measures has become a difficult job due to large volume of data and complexity of the devices making the investigation of digital crimes even harder. Data mining and data fusion techniques have been used as useful tools for detecting digital crimes. In this study, we have introduced a forensic classification problem and applied ID3 decision tree learning algorithm for supervised exploration of the forensic data which will also enable visualization and will reduce the complexity involved in digital investigation process.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Lipson, H.: Tracking and tracing cyber attacks: technical challenges and global policy issues. CERT Coordination Center, Nov (2002)

    Google Scholar 

  2. Casey, E. (ed.): Handbook of Computer Crime Investigation. Academic Press, Waltham (2001)

    Google Scholar 

  3. Casey, E.: Digital Evidence and Computer Crime, 2nd ed. Elsevier Academic Press (2004)

    Google Scholar 

  4. Brezinski, D., Killalea, T.: Guidelines for evidence collection and archiving. RFC3227 (2002)

    Google Scholar 

  5. Satpathy, S., Pradhan, S. K., Ray, B.N.B.: A digital investigation tool based on data fusion in management of cyber security systems. Int. J. Inf. Technol. ad Knowledge management, vol 2(2) (2010)

    Google Scholar 

  6. David L. Hall, Sonya A.H.: Mathematical Techniques in Multisensor Data Fusion, 2nd ed., Artech House (2004)

    Google Scholar 

  7. Hall, D.L., Linas, J.: An introduction to multisensor data fusion. In Proceedings of The IEEE, vol 85, Jan (1997)

    Google Scholar 

  8. Waltz, E.J.: Linas Multisensor Data Fusion, Artech House. Boston (1990)

    Google Scholar 

  9. Han, J., Kamber, M.: Data mining: concepts and techniques, 2nd ed. (2005)

    Google Scholar 

  10. Introduction to data fusion, or information fusion, http://www.data-fusion.org

  11. Satpathy, S., Pradhan, S.K., Ray, B.N.B.: Rule based decision mining with JDL data fusion model for computer forensics: a hypothetical case study. Int. J. Comput. Sci. Inf. Sec., 9(12) (2011)

    Google Scholar 

  12. Satpathy, S., Pradhan, S. K., Ray, B.N.B.: Application of data fusion methodology for computer forensics dataset analysis to resolve data quality issues in predictive digital evidence, Int. J. Forensic Comput. Sci., 7(1) (2012)

    Google Scholar 

  13. Meyers, M., Rogers, M.: Computer forensics: the need for standardization and certification, Int. J. Digital Evi. 3 (2004)

    Google Scholar 

  14. Beebe, N, Clark, J.: Dealing with terabyte data sets in digital investigations. Advances in Digital Forensics, pp. 3–16, Springer, (2005)

    Google Scholar 

  15. Danielsson, J.: Project Description A system for collection and analysis of forensic evidence. Appl. NFR, Apr (2002)

    Google Scholar 

  16. Access Data Corporation, http://www.accessdata.com

  17. Qin, I.U.: Data mining method based on computer forensics-based ID3 algorithm. In: Proceedings of IEEE Conference on Information Management and Engineering, pp. 340–343 (2010)

    Google Scholar 

  18. Davis, J.V., Rossbach, C.J., Ramadan, H.E., Witchel, E.: Cost-sensitive decision tree learning for forensic classification. In Proceedings of the 17th European Conference on Machine Learning, pp. 622–629, Berlin, Germany (2006)

    Google Scholar 

  19. Mendoza1, M., Zamora, J.: Building decision trees to identify the intent of a user query. In Proceedings of the 13th International Conference on Knowledge-Based and Intelligent Information and Engineering Systems, Santiago, pp. 285–292 (2009)

    Google Scholar 

  20. Adriaans, P., Zantige, D.: Data Mining. Addison Wesley, Harlow England (1997)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Suneeta Satpathy .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer India

About this paper

Cite this paper

Satpathy, S., Pradhan, S.K., Ray, B.N.B. (2015). A Decision-Driven Computer Forensic Classification Using ID3 Algorithm. In: Jain, L., Patnaik, S., Ichalkaranje, N. (eds) Intelligent Computing, Communication and Devices. Advances in Intelligent Systems and Computing, vol 309. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2009-1_42

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2009-1_42

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2008-4

  • Online ISBN: 978-81-322-2009-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics