Back to Search Start Over

Method for investigating computer incidents based on attribute clustering

Authors :
Lev S. Titov
Igor Pantiukhin
Nikita Druzhinin
Alexandr A. Kapitonov
Alisa A. Vorobeva
Source :
Bezopasnostʹ Informacionnyh Tehnologij, Vol 25, Iss 3, Pp 38-44 (2018)
Publication Year :
2018
Publisher :
National Research Nuclear University MEPhI (Moscow Engineering Physics Institute), 2018.

Abstract

A reduction of the amount of stored and processed information is an important task for internal audit. It is required to select groups of informational objects with similar parameters and to analyze them separately. Optimal clustering of the data is a suitable method to solve this problem. This paper presents a method of files grouping on the hard disk, based on the Lance Williams algorithm of hierarchical clustering. Files with the same computer incident will belong to the same cluster. This statement is based on the assumption that the user has performed series of actions interrelated in time or in another external attribute or a group of attributes (for example, scanning a row of images in succession, compiling and then sending an email) on the device under investigation. As a result of clustering, these data are grouped together into one cluster and further on they can be presented to a computer forensic scientist as a potential computer incident. Thus, there is no need to analyze the files itself, since the external file attributes such as creation time, access time, time of change, etc. are used as the meaningful parameters. This method also helps to specify the number of clusters manually for a rather flexible investigation of the tested file system. Experiment was carried on in order to test the presented method. The results of the experiment show that the files created and scanned within the same time interval ended up in the same cluster for both large and small number of the output data in the cluster.

Details

ISSN :
20747136 and 20747128
Volume :
25
Database :
OpenAIRE
Journal :
Bezopasnost informacionnyh tehnology
Accession number :
edsair.doi.dedup.....879a7664636559299660a224ada75011
Full Text :
https://doi.org/10.26583/bit.2018.3.04