2014 IEEE Joint Intelligence and Security Informatics Conference 2014
DOI: 10.1109/jisic.2014.54
|View full text |Cite
|
Sign up to set email alerts
|

Automatic Timeline Construction and Analysis for Computer Forensics Purposes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
3
0
4

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 4 publications
(6 reference statements)
0
3
0
4
Order By: Relevance
“…The use of predefined rules does not provide flexibility because previously unseen messages may be recorded in log files. For an automatic process, there are several methods for generating a forensic timeline [8], [9] but not for finding events of interest in a timeline.…”
Section: Instance the Investigator Can Analyzementioning
confidence: 99%
See 1 more Smart Citation
“…The use of predefined rules does not provide flexibility because previously unseen messages may be recorded in log files. For an automatic process, there are several methods for generating a forensic timeline [8], [9] but not for finding events of interest in a timeline.…”
Section: Instance the Investigator Can Analyzementioning
confidence: 99%
“…Then, there are several queries for examining important events, namely, application activity, browsing history, access to recent documents, and executed programs [19]. A forensic timeline is also needed after events are modeled with semantic-based correlation [3] or ontology-based techniques [9] to investigate the association between events and their timeline.…”
Section: A Forensic Timeline Analysismentioning
confidence: 99%
“…Timeline reconstruction is of interest to both cyber and traditional crime investigations. This interest is reflected in the wide variety of work done for creating timelines [28], [35], [36], [41], making better tools for editing and visualization [24], [47], and correlating sources together to infer semantics in a timeline [29], [39], [54]. However, all these methods are dependent on various logs and database files that are formatted independently by applications making their timeline recovery highly application-specific.…”
Section: Related Workmentioning
confidence: 99%
“…Yoan, Bertaux, e Tahar apresentam uma proposta baseada em semântica, implementada por meio de ontologias, para lidar com o problema da análise de logs de um sistema. A proposta consiste em fornecer ao analista uma visão de conhecimento dos eventos do sistema com um nível de agrupamento e abstração maior do que os dados brutos [9]. O presente trabalho lida com o problema da grande quantidade de logs com uma abordagem diferente da usada nos dois últimos trabalhos citados.…”
Section: Trabalhos Relacionadosunclassified