Please use this identifier to cite or link to this item: http://localhost:8081/xmlui/handle/123456789/11855
Title: CYBER FORENSICS: APPLICATION OF NORMALISED COMPRESSION DISTANCE FOR CROSS DRIVE CORRELATION
Authors: Ramesh, Gubba
Keywords: ELECTRONICS AND COMPUTER ENGINEERING;CYBER FORENSICS;NORMALISED COMPRESSION DISTANCE;CROSS DRIVE CORRELATION
Issue Date: 2008
Abstract: In this work a new approach of automated Cross-Drive correlation, in computer forensics, is presented. This approach uses the concept of Normalized Information Distance(NID) that helps to derive drive similarity correlation between a pair of disk images. The algorithm uses the Normalized Compression Distance (NCD) which is the implementation approximation of NID. The method proposed is a parameter free correlation unlike the previous work which is based on generation of common features as parameters of comparison and correlation. The ever increasing capacities of digital storage devices and their rapid proliferation makes parameter based systems more time consuming as the generation of features or parameters would take a considerable amount of time. However, parameter free algorithm would provide quick and more complete leads and clues to the investigator so that he can focus only on the highlighted subset of input datasets for further detailed investigation. The main advantages of NCD based cross drive correlation are: examination of data for generating forensic features as parameters is not required, savings on time and resources that otherwise would be required for forensic features extraction, deep knowledge of the underlying data is not required, it would detect all similarities simultaneously, it would automatically select dominant shared features in all pairwise comparisons and can be used effectively for heterogeneous data. The algorithm works in three main stages: conversion of the acquired image to a reduced signature, NCD correlation and finally calculation of pairwise correlation score with graphical representation. Experiments on disk images of 200MB were conducted and the programs developed, without many modifications, can be easily scaled to inputs of sizes in Giga Bytes.
URI: http://hdl.handle.net/123456789/11855
Other Identifiers: M.Tech
Research Supervisor/ Guide: Joshi, R. C.
metadata.dc.type: M.Tech Dessertation
Appears in Collections:MASTERS' THESES (E & C)

Files in This Item:
File Description SizeFormat 
ECDG13926.pdf2.65 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.