An Implementation of Time Line Events Visualization Tool Using Forensic Digger Algorithm

Authors

  • Priyanka Khatik Department of CSE, Infinity Management & Engineering College, Sagar, M.P., India
  • Preeti Choudhary Department of CSE, Infinity Management & Engineering College, Sagar, M.P., India

Keywords:

Server Time Line Analysis, Server Log, Event Log, Web Analysis

Abstract

Introduction should lead the reader to the importance of the study; tie-up published literature with the aims of the study and clearly states the rationale behind the investigation. It should state the purpose and summarize the rationale for the study and gives a concise background. Use references to provide the most salient background rather than an exhaustive review. The last sentence should concisely state your purpose for carrying out the study.

References

Stephenson, P.: Formal modeling of post-incident root cause analysis. Int. J. Digit. Evid. 2 (2003)

[2]. Gladyshev, P., Patel, A.: Finite state machine approach to digital event reconstruction. Digit. Invest. 1 (2004)

Khan M, Chatwin C, Young R. A framework for post-event timeline reconstruction using neural networks. Digital Investigation 2007;4: 146–57.

Stallard, T.B.:Automated analysis for digital forensic science. Master’s thesis, University of California, Davis (2002)

Stallard,T.,Levitt,K.N.:Automated analysis for digital forensic science: Semantic integrity checking. In: ACSAC 160–169 (2003)

Abbott, J., Bell, J., Clark, A., Vel, O.D., Mohay, G.: Automated recognition of event scenarios for digital forensics. In: SAC ’06: Proceedings of the 2006 ACM symposium on applied computing pp. 293–300.ACMPress,NewYork (2006)

Elsaesser, C., Tanner, M.C.: Automated diagnosis for computer forensics. Technical report, The MITRE Corporation (2001)

Neuhaus, S., Zeller, A.: Isolating intrusions by automatic experiments. In: Proceedings of the 13th annual network and distributed system security symposium. pp. 71–80 (2006)

Olsson J, Boldt M. Computer forensic timeline visualization tool. Digital Investigation 2009;6(S1):S78–87.

Guðjónsson K. Mastering the super timeline with log2timeline. SANS Reading Room; 2010.

Bunting. EnCE study guide; 2008. pp. 235–237.

Buchholz F, Falk C. In: DFRWS, editor. Design and implementation of Zeitline: a forensic timeline; 2005

Carbone R, Bean C. Generating computer forensic super-timelines under Linux; 2011.

Sutapat Thiprungsri. Miklos A. Vasarhelyi, Cluster Analysis for Anomaly Detection in Accounting Data: An Audit Approach, The International Journal of Digital Accounting Research,pp 69-84,2011.

Gerald Schrenk, Rainer Poisel, “A Discussion of Visualization Techniques for the Analysis of Digital Evidence”, International Conference on Availability, Reliability and Security,pp758-763,2011.

Downloads

Published

2014-04-30

How to Cite

[1]
P. Khatik and P. Choudhary, “An Implementation of Time Line Events Visualization Tool Using Forensic Digger Algorithm”, Int. J. Comp. Sci. Eng., vol. 2, no. 4, pp. 216–220, Apr. 2014.

Issue

Section

Research Article