computer forensics csi csci pattern matching andrew burns brian norton
TRANSCRIPT
Computer Forensics
CSI CSCI
Pattern Matching
Andrew Burns
Brian Norton
Forensics:Broad areas of study
• Prevention
• Detection
• Analysis
• Steganography
1. Steganography/Cryptology
2. Use in everyday End-User computers
3. Use in sophisticated projects such as human genome sequencing, law enforcement, journalism
4. Pattern Matching - our area of study in this project
Examples of Pattern Matching:
Iranian News photo(s) released to Agence France-Presse July 2008
Major US news outlets issue retractions days later.
Project Description
• Where we hope to go:• To develop a Pattern Matching program
For now: Use of PX Binary Viewer Preview of C Program
Later Steps: MD5 Algorithms
System Baselining similar to a photograph - used as comparison tool.
References
1. Computer Forensics Laboratory and Tools, G. A. Francia III and K. Clinton: Jacksonville State University - JCSC 20, 6 (June 2005)
2. Network Forensics, “Surviving Network Attacks” Ben Laurie, AL Digital, Queue, June 2004, pp 50-56
3. Criminal Computer Forensics Management Ray Yeager, Kennesaw State University pp 168-174
4. Wikipedia
5. “The role of key loggers in computer-based assessment forensics”
6. “System Baseling - A Forensic Perspective” K. Monroe, D Bailey
7. Invitation to Computer Science 3rd Ed. Schneider and Gersting