25.12.2013 Views

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

adjusting weights, techniques such as those utilised by Fogel [2001], using<br />

evolutionary algorithms based on a Darwinian approach, could also have been<br />

employed and may have increased the adaptability of the network [Russell,<br />

2003]. Harris also used a training set that was ten times larger than the testing<br />

set. Decreasing the size of the training set and altering the proportions of each<br />

file type may have increased the recognition for the file types, preventing the<br />

network from becoming over trained, losing the ability to generalise to new files.<br />

7.3.3 Recovering deleted information from other operating systems<br />

Whilst analysts are most likely to come across Windows operating systems,<br />

they may also see Mac and Linux based systems too [Burghardt, 2008].<br />

Deleted files in OS X have been the subject of research, by establishing if any<br />

given sector which is known to contain a deleted file has been overwritten; it is<br />

possible to calculate the chance of recovering useful evidence from the file. This<br />

is a useful technique, as the method identifies where blocks containing deleted<br />

information should be and in comparing them to the volume bitmap it can see if<br />

they have been overwritten. The technique is also limited in that it relies upon a<br />

complete and accurate entry in the journal; a log of file changes on the disk, and<br />

would therefore not provide assistance in cases where this is corrupt.<br />

7.4 Methodology<br />

The aim of this chapter is to evaluate methods to identify thumbnail cache file<br />

fragments. The methods described earlier in this research were based upon the<br />

identification of file fragments which consisted of multiple clusters. This<br />

research focuses on identifying single fragments of thumbnail cache files,<br />

without using any information outside the fragment to assist with its<br />

identification; it has already been established that a single fragment may be all<br />

that remains of a file. Therefore an important consideration for this research is<br />

the identification of methods which could be adapted to identify single fragments<br />

of information without any supplementary information about the system.<br />

Page<br />

165

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!