25.12.2013 Views

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

ate for HTML and JPEG files [Veenman, 2007]. Veenman also establishes the<br />

need to combine such techniques with pre-existing carving techniques in order<br />

to maximise the information being carved, which may take a greater length of<br />

time to run on a given storage device. To date, such techniques have been<br />

relatively separate in their research and implementation, and whether<br />

developing a tool encompassing several methods would decrease the error rate<br />

on more complex file types is still unknown.<br />

Calhoun [2008] looked at predicting the file types of fragments using linear<br />

discriminant and longest common substrings. It was found that using longer<br />

byte sequences for statistical analysis would improve the prediction rate of the<br />

linear discriminant method; this may be due to the fact that information is<br />

normally stored in several bytes. Veenman [2007] also looked at statistical<br />

methods for identifying fragments but used data surrounding the fragments<br />

being tested to provide a context. Providing information which places a<br />

fragment in context of its location and surrounding information is useful during<br />

an analysis as it may assist with identifying the likely type of smaller fragments<br />

and providing an overall timeline of the activity on the machine.<br />

7.3.2 Neural Networks<br />

Whilst tools currently used by analysts, such as Encase and FTK, rely on<br />

header and footer information for the majority of their carving, a criminal may<br />

alter such information to prevent automated software finding the files. If these<br />

tools were the only method of investigation on a case such evidence may not be<br />

discovered. Neural Networks are adaptive and research has shown they may<br />

identify tampered documents which are otherwise overlooked. Harris [2007]<br />

investigated the possibility for recovering binary file types, and whilst his results<br />

showed that such networks could identify several important file types, a number<br />

of factors may improve upon his research. Firstly, Harris used back propagation<br />

to adjust the weights on the network, and whilst this is a common algorithm for<br />

Page<br />

164

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!