Open Access   Article Go Back

Imminent accession of Artificial Intelligence based Forensic Exploratory with Data Mining Analysis

S. Umar1 , A. Praveen2 , S. Gouse3 , N. Deepthi4

Section:Review Paper, Product Type: Journal Paper
Volume-5 , Issue-3 , Page no. 92-95, Mar-2017

Online published on Mar 31, 2017

Copyright © S. Umar, A. Praveen, S. Gouse, N. Deepthi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: S. Umar, A. Praveen, S. Gouse, N. Deepthi, “Imminent accession of Artificial Intelligence based Forensic Exploratory with Data Mining Analysis,” International Journal of Computer Sciences and Engineering, Vol.5, Issue.3, pp.92-95, 2017.

MLA Style Citation: S. Umar, A. Praveen, S. Gouse, N. Deepthi "Imminent accession of Artificial Intelligence based Forensic Exploratory with Data Mining Analysis." International Journal of Computer Sciences and Engineering 5.3 (2017): 92-95.

APA Style Citation: S. Umar, A. Praveen, S. Gouse, N. Deepthi, (2017). Imminent accession of Artificial Intelligence based Forensic Exploratory with Data Mining Analysis. International Journal of Computer Sciences and Engineering, 5(3), 92-95.

BibTex Style Citation:
@article{Umar_2017,
author = {S. Umar, A. Praveen, S. Gouse, N. Deepthi},
title = {Imminent accession of Artificial Intelligence based Forensic Exploratory with Data Mining Analysis},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2017},
volume = {5},
Issue = {3},
month = {3},
year = {2017},
issn = {2347-2693},
pages = {92-95},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1215},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1215
TI - Imminent accession of Artificial Intelligence based Forensic Exploratory with Data Mining Analysis
T2 - International Journal of Computer Sciences and Engineering
AU - S. Umar, A. Praveen, S. Gouse, N. Deepthi
PY - 2017
DA - 2017/03/31
PB - IJCSE, Indore, INDIA
SP - 92-95
IS - 3
VL - 5
SN - 2347-2693
ER -

VIEWS PDF XML
621 573 downloads 460 downloads
  
  
           

Abstract

Data mining is part of the interdisciplinary field of knowledge discovery in databases. Data Mining research began in 1980 and has grown rapidly in 1990s.Specific methods developed in disciplines such as artificial intelligence, machine learning and pattern recognition used in data mining. Data mining has been introduced in various sectors. key functional area of mining technology of the World Wide Web Recently mining techniques applied to the data in the field of criminal law, but that digital forensics. Examples can be found misleading to establish criminal identity criminal groups involved in illegal activities and much more. the politics of data mining technology typically generate a summary of large amounts of data. Digital Forensics is the area of research discoveries and advanced tip. Canvass search field, and digital forensic applications are developing rapidly with the economic giant digital information. law enforcement and military agencies have confidence in digital forensics today. Since the age of information is the speed of thought and data stored in digital form, the need for an accurate intellectual interception, and timely decision errors close to zero digital data processing cores issue. This article will research focusing on the role of data mining techniques for digital forensics. also identifies how data-mining techniques can be applied in the field, a digital forensic forensic examiner to take the next step in the process, which is cost-effective digital program is a crime.

Key-Words / Index Term

Data Recovery, Forensic exploratory, Digital Forensic

References

[1] A.J. Marcella, R.S. Greenfield, “Cyber forensics: a field manual for collecting, examining and preserving evidence of computer crimes”, Auerbach, 2002.
[2] J. Guynes, C. Nicole, L. Beebe, “Digital forensics text string searching: Improving Information retrieval effectiveness by thematically clustering search results”, In 6th Annual Digital Forensic Research Workshop, vol. 4, pages 49–54, 2007.
[3] J.G. Heiser, “Computer forensics: incident response essentials”, Addison- Wesley, 2002.
[4] DFRWS, “A road map for digital forensic research”, DTR - T001-01 FINAL - DFRWS Technical Report, 1(1), August 2001. PDF.
[5] M. Usama, “Summary from the kdd-03 panel: data mining: the next 10 years”, SIGKDD Explor. Newsl., 5(2): 191–196,. ISSN 1931- 0145, 2003.
[6] H. Jan, Kroeze, C. Machdel, Matthee, J.D. Theo, “Differentiating data- and Text- mining terminology", In SAICSIT ’03: Proceedings of the annual research conference of the South African institute of computer scientists and information technologists on Enablement through technology, South African Institute for Computer Scientists and Information Technologists, Republic of South Africa, pp.93–101, 2003., 2003.ISBN 1-58113-774-5.
[7] L. Simson, Garfinkel, “The advanced forensic format”, 2008
[8] A. Clark, B. Schatz, G. Mohay, “A correlation method for establishing Provenance of timestamps in digital evidence”, 6th Annual Digital Forensic Research Workshop, In Digital Investigation, volume 3, supplement 1, pages 98–107, 2006.
[9] C. Apt´e, S. Weiss (1997), “Data mining with decision trees and decision rules”, Future Generation Computer System., 13(2-3):197–210, 1997.
[10] H. Atabakhsh, “Crime data mining: an overview and case studies”, Proceedings of the 2003 annual national conference on Digital government research, pages 1–5, 2003
[11] P. Smyth, D. Hand, H. Mannila, “Principles of Data Mining”, The MIT Press, 2001.
[12] O. de Vel, A. Anderson, M. Corney, G. Mohay,”Mining e-mail content for author identification forensics”, SIGMOD Rec., 30(4):55–64, ISSN 0163-5808, 2001.
[13] T. Abraham, “Event sequence mining to develop profiles for computer forensic investigation purposes”, In ACSW Frontiers ’06: Proceedings of the 2006 Australasian workshops on Grid computing and e-research, Australian Computer Society, Inc., Darlinghurst, Australia, Australia, pp.145–53, 2006.
[14] G. Forman, K. Eshghi, S. Chiocchetti, “Finding similar files in large document repositories.”, In KDD ’05: Proceeding of the eleventh ACM SIGKDD international Conference on Knowledge discovery in data mining, ACM, New York, NY, USA, pp.394–400, 2005., ISBN 1-59593-135-X.
[15] J. Galloway, J. Simeon, Simoff ,”Network data mining: methods and techniques for discovering deep linkage between attributes”, In APCCM ’06: Proceedings of the 3rd Asia- Pacific conference on Conceptual modelling, pages 21–32. Australian Computer Society, Inc., Darlinghurst, Australia, Australia, 2006. ISBN 1-920-68235-X.
[16] L. Simson, Garfinkel, “Forensic feature extraction and cross-drive analysis”, Digital Investigation, 3(Supplement-1):71–81, 2006.