An Implementation of Time Line Events Visualization Tool Using Forensic Digger Algorithm
Keywords:
Server Time Line Analysis, Server Log, Event Log, Web AnalysisAbstract
Introduction should lead the reader to the importance of the study; tie-up published literature with the aims of the study and clearly states the rationale behind the investigation. It should state the purpose and summarize the rationale for the study and gives a concise background. Use references to provide the most salient background rather than an exhaustive review. The last sentence should concisely state your purpose for carrying out the study.
References
Stephenson, P.: Formal modeling of post-incident root cause analysis. Int. J. Digit. Evid. 2 (2003)
[2]. Gladyshev, P., Patel, A.: Finite state machine approach to digital event reconstruction. Digit. Invest. 1 (2004)
Khan M, Chatwin C, Young R. A framework for post-event timeline reconstruction using neural networks. Digital Investigation 2007;4: 146–57.
Stallard, T.B.:Automated analysis for digital forensic science. Master’s thesis, University of California, Davis (2002)
Stallard,T.,Levitt,K.N.:Automated analysis for digital forensic science: Semantic integrity checking. In: ACSAC 160–169 (2003)
Abbott, J., Bell, J., Clark, A., Vel, O.D., Mohay, G.: Automated recognition of event scenarios for digital forensics. In: SAC ’06: Proceedings of the 2006 ACM symposium on applied computing pp. 293–300.ACMPress,NewYork (2006)
Elsaesser, C., Tanner, M.C.: Automated diagnosis for computer forensics. Technical report, The MITRE Corporation (2001)
Neuhaus, S., Zeller, A.: Isolating intrusions by automatic experiments. In: Proceedings of the 13th annual network and distributed system security symposium. pp. 71–80 (2006)
Olsson J, Boldt M. Computer forensic timeline visualization tool. Digital Investigation 2009;6(S1):S78–87.
Guðjónsson K. Mastering the super timeline with log2timeline. SANS Reading Room; 2010.
Bunting. EnCE study guide; 2008. pp. 235–237.
Buchholz F, Falk C. In: DFRWS, editor. Design and implementation of Zeitline: a forensic timeline; 2005
Carbone R, Bean C. Generating computer forensic super-timelines under Linux; 2011.
Sutapat Thiprungsri. Miklos A. Vasarhelyi, Cluster Analysis for Anomaly Detection in Accounting Data: An Audit Approach, The International Journal of Digital Accounting Research,pp 69-84,2011.
Gerald Schrenk, Rainer Poisel, “A Discussion of Visualization Techniques for the Analysis of Digital Evidence”, International Conference on Availability, Reliability and Security,pp758-763,2011.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
