کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
6884460 1444267 2018 8 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
Using computed similarity of distinctive digital traces to evaluate non-obvious links and repetitions in cyber-investigations
ترجمه فارسی عنوان
با استفاده از شباهت محاسبه پدیده های دیجیتالی متمایز برای ارزیابی پیوندهای غیر تکراری و تکرار در تحقیقات سایبر
کلمات کلیدی
جرم پزشکی دیجیتال، علامت های دیجیتال، شواهد دیجیتال، اقدامات مشابهی، شباهت ایمیل، ردیابی شباهت، مقایسه موارد پیوند مورد، تحقیق سایبر، محاسبات تقریبی نزدیکی، تجزیه و تحلیل جرم اطلاعات قانونی،
موضوعات مرتبط
مهندسی و علوم پایه مهندسی کامپیوتر شبکه های کامپیوتری و ارتباطات
چکیده انگلیسی
This work addresses the challenge of discerning non-exact or non-obvious similarities between cybercrimes, proposing a new approach to finding linkages and repetitions across cases in a cyber-investigation context using near similarity calculation of distinctive digital traces. A prototype system was developed to test the proposed approach, and the system was evaluated using digital traces collected during actual cyber-investigations. The prototype system also links cases on the basis of exact similarity between technical characteristics. This work found that the introduction of near similarity helps to confirm already existing links, and exposes additional linkages between cases. Automatic detection of near similarities across cybercrimes gives digital investigators a better understanding of the criminal context and the actual phenomenon, and can reveal a series of related offenses. Using case data from 207 cyber-investigations, this study evaluated the effectiveness of computing similarity between cases by applying string similarity algorithms to email addresses. The Levenshtein algorithm was selected as the best algorithm to segregate similar email addresses from non-similar ones. This work can be extended to other digital traces common in cybercrimes such as URLs and domain names. In addition to finding linkages between related cybercrime at a technical level, similarities in patterns across cases provided insights at a behavioral level such as modus operandi (MO). This work also addresses the step that comes after the similarity computation, which is the linkage verification and the hypothesis formation. For forensic purposes, it is necessary to confirm that a near match with the similarity algorithm actually corresponds to a real relation between observed characteristics, and it is important to evaluate the likelihood that the disclosed similarity supports the hypothesis of the link between cases. This work recommends additional information, including certain technical, contextual and behavioral characteristics that could be collected routinely in cyber-investigations to support similarity computation and link evaluation.
ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Digital Investigation - Volume 24, Supplement, March 2018, Pages S2-S9
نویسندگان
, ,