In a forensic investigation, computer profiling is used to capture evidence and to examine events surrounding a crime. A rapid increase in the last few years in the volume of data needing examination has led to an urgent need for automation of profiling. In this paper, we present an efficient, automated event profiling approach to a forensic investigation for a computer system and its activity over a fixed time period. While research in this area has adopted a number of methods, we extend and adapt work of Marrington et al. based on a simple relational model. Our work differs from theirs in a number of ways: our object set (files, applications etc.) can be enlarged or diminished repeatedly during the analysis; the transitive relation between objects is used sparingly in our work as it tends to increase the set of objects requiring investigative attention; our objective is to reduce the volume of data to be analyzed rather than extending it. We present a substantial case study to illuminate the theory presented here. The case study also illustrates how a simple visual representation of the analysis could be used to assist a forensic team.
History
Event
International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia (3rd : 2010 : Shanghai, China)
Publisher
Springer
Location
Shangai, China
Place of publication
[Shangai, China]
Start date
2010-11-11
End date
2010-11-12
ISBN-13
9789639995109
Language
eng
Publication classification
E1 Full written paper - refereed
Copyright notice
2010, Springer
Title of proceedings
e-Forensics 2010 : Proceedings of the 3rd International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia