25.12.2013 Views

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Having described current methods for the identification of deleted file fragments<br />

it is possible to take a single method with reasonable performance statistics,<br />

adapt it for fragment identification and apply it to the thumbnail cache file type.<br />

However this method would establish only the ability of the method being<br />

implemented to identify thumbnail cache file fragments, whereas a comparative<br />

study of the most commonly implemented methods would assist in<br />

implementing a single method with higher rates of identification for thumbnail<br />

cache files. A comparative study also prevents bias on the results of this<br />

research which the use of a single method may give and provides an<br />

opportunity to evaluate the performance of the methods on a single file type.<br />

Therefore the results on the file type can be accurately compared, highlighting<br />

the strengths and weaknesses of each approach.<br />

Trialling a variety of methods against the thumbnail cache may improve the<br />

accuracy of recovery and allow the corroboration of results. Based on the<br />

review of literature conducted earlier in this chapter the four types of methods<br />

chosen for evaluation in this research are: Brute force, Structural and<br />

Syntactical, Statistical, and Neural Network. Of each type a single method will<br />

be implemented; the specific implementations are discussed in later sections;<br />

each method will then be evaluated against the same test data set.<br />

In order to identify thumbnail cache fragments using the four methods identified<br />

it is first necessary to determine the data set which will be used to train and test<br />

the ability of each method; this is discussed in Section 7.5. This is followed by a<br />

description of how each of the identified methods was adapted to enable single<br />

fragment identification; the sections also describe how each method was<br />

applied to the thumbnail cache file formats [Sections 7.6 – 7.9]. The results of<br />

each method are then described in Section 7.10; after the results the methods<br />

are compared and evaluated in Section 7.11. <strong>Final</strong>ly a discussion of the<br />

Page<br />

166

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!