Back to Search
Start Over
Method for investigating computer incidents based on attribute clustering
- Source :
- Bezopasnostʹ Informacionnyh Tehnologij, Vol 25, Iss 3, Pp 38-44 (2018)
- Publication Year :
- 2018
- Publisher :
- National Research Nuclear University MEPhI (Moscow Engineering Physics Institute), 2018.
-
Abstract
- A reduction of the amount of stored and processed information is an important task for internal audit. It is required to select groups of informational objects with similar parameters and to analyze them separately. Optimal clustering of the data is a suitable method to solve this problem. This paper presents a method of files grouping on the hard disk, based on the Lance Williams algorithm of hierarchical clustering. Files with the same computer incident will belong to the same cluster. This statement is based on the assumption that the user has performed series of actions interrelated in time or in another external attribute or a group of attributes (for example, scanning a row of images in succession, compiling and then sending an email) on the device under investigation. As a result of clustering, these data are grouped together into one cluster and further on they can be presented to a computer forensic scientist as a potential computer incident. Thus, there is no need to analyze the files itself, since the external file attributes such as creation time, access time, time of change, etc. are used as the meaningful parameters. This method also helps to specify the number of clusters manually for a rather flexible investigation of the tested file system. Experiment was carried on in order to test the presented method. The results of the experiment show that the files created and scanned within the same time interval ended up in the same cluster for both large and small number of the output data in the cluster.
- Subjects :
- File system
Statement (computer science)
lcsh:T58.5-58.64
lcsh:Information technology
Computer science
General Medicine
Interval (mathematics)
computer.software_genre
lcsh:Q350-390
Hierarchical clustering
Reduction (complexity)
Task (computing)
сlustering, internal audit, computer forensics, computer incident, information security
lcsh:Information theory
Data mining
Cluster analysis
computer
Access time
Subjects
Details
- ISSN :
- 20747136 and 20747128
- Volume :
- 25
- Database :
- OpenAIRE
- Journal :
- Bezopasnost informacionnyh tehnology
- Accession number :
- edsair.doi.dedup.....879a7664636559299660a224ada75011
- Full Text :
- https://doi.org/10.26583/bit.2018.3.04