Abstract
Today’s electronic devices are so ubiquitous that the collection and use of digital evidence has become a standard part of many criminal and civil investigations. The uncovering and examination of those shreds of evidence is a relatively new and important process to provide crucial information in a court of law. Suspects routinely have their laptops and cell phones examined for corroborating evidence. However, digital forensic investigators are facing several challenges such as file obfuscation, encryption, alteration and a massive amount of evidence. These challenges often lead to incomplete analysis and inadequate conclusions. Consequently, a digital forensic examiner uses specialized forensic software to accurately identify the file types to determine which of them may contain potential evidence.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
McKemmish, R.: What is forensic computing? Trends Issues Crime Crim. Justice 118(118), 1–6 (1999)
Kent, K., Chevalier, S., Grance, T., Dang, H.: Guide to integrating forensic techniques into incident response (2006)
Kessler, G.: File signatures (2015). http://www.garykessler.net/library/file_sigs.html. Accessed 26 Oct 2015
McDaniel, M.: Automatic File Type Detection Algorithm. James Madison University (2001)
McDaniel, M., Heydari, M.H.: Content based file type detection algorithms. In:. Proceedings of 36th Annual Hawaii International Conference on System Sciences (2003)
Li, W.J., Wang, K., Stolfo, S.J., Herzog, B.: Fileprints: identifying file types by n-gram analysis. In: Proceedings from 6th Annual IEEE Systems Man and Cybernetics (SMC) Information Assurance Workshop 2005, vol. 2005, pp. 64–71, June 2005
Dunham, J., Sun, M., Tseng, J.: Classifying file type of stream ciphers in depth using neural networks. In: The 3rd ACS/IEEE International Conference on Computer Systems and Applications (2005)
Amirani, M.C., Toorani, M., Shirazi, A.A.B: A new approach to content-based file type detection. In: IEEE Symposium on Computers and Communications, 2008, pp. 1103–1108, July 2008
Cao, D., Luo, J., Yin, M., Yang, H.: Feature selection based file type identification algorithm. In: 2010 IEEE International Conference on Intelligent Computing and Intelligent Systems, vol. 3, pp. 58–62 (2010)
Ahmed, I., Lhee, K., Shin, H., Hong, M.: Content-based File-type identification using cosine similarity and a divide-and-conquer approach. IETE Tech. Rev. 27(6), 465 (2010)
Ahmed, I., Lhee, K., Shin, H., Hong, M.: Fast content-based file-type identification. In: 7th Annual IFIP WG 11.9 International Conference on Digital Forensics, pp. 65–75 (2011)
Amirani, M.C., Toorani, M., Mihandoost, S.: Feature-based type identification of file fragments. Secur. Commun. Netw. 6(1), 115–128 (2013)
Evensen, J.D., Lindahl, S., Goodwin, M.: File-type detection using naïve Bayes and n-gram analysis. In: Norwegian Information Security Conference, NISK, vol. 7, no. 1. Fredrikstad (2014)
Vafaie, H., De Jong, K.: Genetic algorithms as a tool for feature selection in machine learning. In: International Conference on Tools with AI, pp. 200–203 (1992)
Qian, J., Zhuo, L., Zheng, J., Wang, F., Li, X., Ai, B.: A genetic algorithm based wrapper feature selection method for classification of hyper spectral data using support vector machine. Geogr. Res. 27(3), 493–501 (2008)
Jourdan, L., Dhaenens, C., Talbi, E.: A genetic algorithm for feature selection in data-mining for genetics. In: Proceedings of the 4th Metaheuristics International Conference (2001)
Hall, M.: Correlation-based feature selection for machine learning. The University of Waicato (1999)
Harris, R.: Using artificial neural networks for forensic file type identification. Master’s Thesis, Purdue Univ. (2007)
Kohavi, R.: A study of cross-validation and bootstrap for accuracy estimation and model selection. Int. J. Conf. Artif. Intell. 14(12), 1137–1143 (1995)
Fei-Fei, L., Fergus, R., Perona, P.: Learning generative visual models from few training examples: an incremental Bayesian approach tested on 101 object categories. Comput. Vis. Image Underst. 106(1), 59–70 (2007)
CoolUtils, Powerful image converter yet easy-to-use (2017)
T.E.I of Crete, E-Thesis (2015). http://nefeli.lib.teicrete.gr/search/. Accessed 26 Oct 2015
The MathWorks Inc., MATLAB. The MathWorks Inc., Natick, Massachusetts (2016)
Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: The WEKA data mining software. ACM SIGKDD Explor. Newsl. 11(1), 10 (2009)
Goldberg, D.E.: Genetic Algorithms in Search, Optimization and Machine Learning. Oct 1989
Salzberg, S.L.: In: Quinlan, J.R. (ed) C4.5: Programs for Machine Learning. Morgan Kaufmann Publishers, Inc. (1993); Mach. Learn. 16(3), 235–240 (1994)
Chang, C.-C., Lin, C.-J.: LIBSVM: a library for support vector machines. ACM Trans. Intell. Syst. Technol. 2(3), 27:1–27:27 (2011)
NCH Software, Convert Between All Popular Image Formats with Pixillion (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer International Publishing AG, part of Springer Nature
About this chapter
Cite this chapter
Κarampidis, K., Deligiannis, I., Papadourakis, G. (2019). Combining Genetic Algorithms and Neural Networks for File Forgery Detection. In: Tsihrintzis, G., Sotiropoulos, D., Jain, L. (eds) Machine Learning Paradigms. Intelligent Systems Reference Library, vol 149 . Springer, Cham. https://doi.org/10.1007/978-3-319-94030-4_12
Download citation
DOI: https://doi.org/10.1007/978-3-319-94030-4_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-94029-8
Online ISBN: 978-3-319-94030-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)