25.12.2013 Views

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Event reconstruction can be modelled using finite state machines [Gladyshev,<br />

2005]. However in order to construct each model it is necessary to spend a<br />

significant amount of time analysing the information to produce the states and<br />

identify the relationships; it is also time consuming to evaluate files in this way.<br />

However it is useful for identifying the order of events and can provide<br />

assistance in identifying impossible sequences of events, therefore it is<br />

necessary for an analyst to assess the potential reward from using such a<br />

system against the high use of resources.<br />

Neural networks have also been used for event reconstruction [Khan, 2007];<br />

with a recurrent neural network achieving the highest accuracy of those tested.<br />

However accuracy overall improved when the complexity of the data set was<br />

increased; providing a more realistic model of the file types likely to be<br />

encountered during an analysis. If the neural network is not presented with<br />

realistic data, such as a cross section of files it is likely to encounter when used<br />

on a suspects hard drive, then its ability to function on an actual hard drive may<br />

not be as high as its ability during testing.<br />

Zeitline is an event reconstruction method, which stores events in chronological<br />

order to make it easier to identify patterns and group events together to create<br />

larger more complex events. The ability of this package to model complicated<br />

events makes it very useful to an analyst however it relies heavily on user<br />

interaction and may therefore require too many resources for some<br />

investigations.<br />

2.3.4 Corrupting data<br />

Corruption can be the result of deliberate manipulation of data by software,<br />

such as the deletion of files, or the result of a virus; however the reliability of<br />

Page 30

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!