25.12.2013 Views

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Table 7-19: Method 4 Results for the unknown data set (Data Set 3)<br />

Classification of each Fragment by Method(Percentage)<br />

H1 H2 H3 H4 H5 H6 Total<br />

No. 28 253 9028 932 60974 308473707 308544922<br />

9.07485E- 8.19978E-<br />

%<br />

0.002925992 0.000302063 0.01976179 99.97691908<br />

06 05<br />

7.11 Comparison of Classification Methods<br />

The methods described and implemented throughout this chapter have different<br />

strengths and weaknesses. Each of the four methods adapted and implemented<br />

during this research has shown to assist with the identification of thumbnail<br />

cache file fragments. Table 7.20 shows the success and false positive rate for<br />

each method tested on data set 2. The table shows that the structural and<br />

syntactical method achieved 100 % success with no false positives for<br />

categories H1 and H2; this method also achieved the highest success rate for<br />

H4. The highest success rate for H3 was achieved by the statistical approach;<br />

the neural network achieved the highest success rate for H5.<br />

The Brute Force approach provides a quick way of implementing a system to<br />

identify information; it relies on unique sequences which can be used to classify<br />

information. The sequences are identifiable to an analyst by a brief examination<br />

of the file type. The Brute Force method can only identify fragments containing<br />

known sequences; this relies on the analyst selecting a sequence which occurs<br />

in every instance of the classification they are attempting to identify. Depending<br />

on the frequency of the keyword, it is possible to attract a substantial amount of<br />

false-positives; whilst the amount of information is still reduced from the original<br />

data set the analyst may need to use other methods to further refine the<br />

potential information.<br />

Page<br />

196

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!