Mobile Forensic Images and Videos Signature Pattern Matching using M-Aho-Corasick
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 7
Abstract
Mobile forensics is an exciting new field of research. An increasing number of Open source and commercial digital forensics tools are focusing on less time during digital forensic examination. There is a major issue affecting some mobile forensic tools that allow the tools to spend much time during the forensic examination. It is caused by implementation of poor file searching algorithms by some forensic tool developers. This research is focusing on reducing the time taken to search for a file by proposing a novel, multi-pattern signature matching algorithm called M-Aho-Corasick which is adapted from the original Aho-Corasick algorithm. Experiments are conducted on five different datasets which one of the data sets is obtained from Digital Forensic Research Workshop (DFRWS 2010). Comparisons are made between M-Aho-Corasick using M_Triage with Dec0de, Lifter, XRY, and Xaver. The result shows that M-Aho-Corasick using M_Triage has reduced the searching time by 75% as compared to Dec0de, 36% as compared to Lifter, 28% as compared to XRY, and 71% as compared to Xaver. Thus, M-Aho-Corasick using M_Triage tool is more efficient than Dec0de, Lifter, XRY, and Xaver in avoiding the extraction of high number of false positive results.
Authors and Affiliations
Yusoof Hasheem, Kamaruddin Mohamad, Ahmed Abdi, Rashid Naseem
Method for Game Development Driven by User-eXperience: a Study of Rework, Productivity and Complexity of Use
The growing capabilities and revenues of video game development are important factors for software companies. However, game development processes could be considered im-mature, specifically in the design phase. Ambiguous...
Analysis of Resource Utilization on GPU
The problems arising due to massive data storage and data analysis can be handled by recent technologies, like cloud computing and parallel computing. MapReduce, MPI, CUDA, OpenMP, OpenCL are some of the widely available...
Network Efficiency – Optimized Automaton Approach
A sperner’s grid is thought of a finite state system, where in the model gives rise to an optimal network through characterization of paths .the automation graphs of the various states gives rise to different groomable l...
Credibility Evaluation of Online Distance Education Websites
Web credibility is becoming a significant factor in increasing user satisfaction, trust, and loyalty. Web credibility is particularly important for people who cannot visit an institution for one reason or other and mostl...
Defense Mechanisms against Machine Learning Modeling Attacks on Strong Physical Unclonable Functions for IOT Authentication: A Review
Security component in IoT system are very crucial because the devices within the IoT system are exposed to numerous malicious attacks. Typical security components in IoT system performs authentication, authorization, mes...