25.12.2013 Views

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

7.1 Introduction ........................................................................................... 157<br />

7.2 Traditional Data Carving ....................................................................... 158<br />

7.2.1 Brute Force Approach .................................................................... 159<br />

7.2.2 Structural and Syntactical Analysis ................................................ 160<br />

7.3 Data Carving Research ......................................................................... 161<br />

7.3.1 Statistical Methods ......................................................................... 162<br />

7.3.2 Neural Networks ............................................................................. 164<br />

7.3.3 Recovering deleted information from other operating systems ...... 165<br />

7.4 Methodology ......................................................................................... 165<br />

7.5 Information to be carved ....................................................................... 167<br />

7.5.1 Corpus Generation ......................................................................... 167<br />

7.5.2 File Fragment Classification ........................................................... 169<br />

7.5.3 Preparing the File Fragments ......................................................... 170<br />

7.5.4 Distribution of File Types ................................................................ 172<br />

7.5.5 Training and Testing Sets .............................................................. 173<br />

7.6 Brute Force Approach ........................................................................... 175<br />

7.7 Structural and Syntactical Approach ..................................................... 177<br />

7.7.1 H1:.................................................................................................. 177<br />

7.7.2 H2................................................................................................... 180<br />

7.7.3 H3................................................................................................... 181<br />

7.7.4 H4................................................................................................... 182<br />

7.7.5 H5................................................................................................... 183<br />

7.7.6 H6................................................................................................... 183<br />

7.8 Statistical Approach .............................................................................. 183<br />

7.8.1 Construction ................................................................................... 184<br />

7.8.2 Using Bayesian Networks for Classification ................................... 185<br />

7.9 Neural Network Approach ..................................................................... 187<br />

7.10 Results ................................................................................................ 188<br />

7.10.1 Method 1: Brute Force approach .................................................. 188<br />

7.10.2 Method 2: Structural and Syntactical approach ............................ 190<br />

7.10.3 Method 3: Statistical approach ..................................................... 192<br />

7.10.4 Method 4: Neural Network approach ............................................ 194<br />

7.11 Comparison of Classification Methods ................................................ 196<br />

7.12 Discussion .......................................................................................... 198<br />

7.13 Chapter Conclusion ............................................................................ 201<br />

8 The creation of a Hybrid Identification Approach ......................................... 203<br />

8.1 Introduction ........................................................................................... 203<br />

8.2 Problem Definition................................................................................. 204<br />

8.3 Methodology ......................................................................................... 207<br />

8.4 JPEG Identification Research ............................................................... 207<br />

8.5 Visual Thumbnail JPEG File Fragment Identification ............................ 209<br />

8.6 A hybrid approach for thumbnail cache identification ............................ 215<br />

viii

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!