skip to main content
10.1145/3377644.3377659acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccspConference Proceedingsconference-collections
research-article

An Information Intelligent Search Method for Computer Forensics Based on Text Similarity

Published: 26 February 2020 Publication History

Abstract

Data analysis is one of the research hotspots in the field of computer forensics. In the file system of the computer, there are files created and browsed by the user. The file contains information such as user information and transaction processing. This information can help forensic agency solve query valuable information, computer forensics, and other illegal and criminal activities. But how to find valuable information from a large amount of computer data is a major challenge. In order to achieve this goal, this paper proposes an information intelligent search method for computer forensics based on text similarity. This method is divided into two processes. First, information extraction technology is used to obtain the summary and keyword information of each text file on the computer. Then combine text similarity and keyword search algorithm to realize the search and analysis of semantic text. The experimental results show that this method can effectively solve the defects of traditional pattern matching algorithm and improve the effect of automatic data analysis.

References

[1]
F. James Sensenbrenner. 2006. Federal Rules of Civil Procedure. https://www.uscourts.gov/file/19892/download.
[2]
Riadi, I., Istiyanto, J. E., Ashari, A., and Subanar. 2013. Log analysis techniques using clustering in network forensics. International Journal of Computer Science & Information Security, 10(7).
[3]
Carvey H. 2011. Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry. Syngress Publishing. http://index-of.es/Varios-2/Windows%20Registr-y%20Forensics.pdf.
[4]
Beebe, N. L., and Liu, L. 2014. Ranki ng algorithms for digital forensic string search hits. Elsevier Science Publishers B. V. DOI= http://doi.acm.org/ 10.1016/j.diin.2014.05.007.
[5]
Nensi Kansagara and Shubham Singh. 2017. Thematically Clustering In Digital Forensics Text String Searching: A Survey. International Journal of Advanced Research in Computer Science, 8 (3), March-April 2017, 1128--1130.
[6]
Gyu-Sang Cho. 2013. A computer forensic method for detecting timestamp forgery in NTFS.Computers & Security. DOI=10.1016/j.cose.2012.11.003.
[7]
Xie, Haoyang, Jiang, Keyu and Yuan, Xiaohong, et al. 2012. Forensic Analysis of Windows Registry Against Intrusion. International Journal of Network Security & Its Applications. DOI=10.5121/ijnsa.2012.4209.
[8]
Knuth Donald, Jr James and Pratt, Vaughan. 1977. Fast Pattern Matching in Strings. SIAM J. Comput. 6. 323--350. DOI=10.1137/0206024.
[9]
Boyer R S and Moore J S. 1977. A Fast String Searching Algorithm[J]. Communications of the ACM, 1977: 762--772. DOI=10.1145/359842.359859.
[10]
Xiong, Z. 2011. A Composite Boyer-Moore algorithm for the string matching problem. International Conference on Parallel & Distributed Computing. IEEE. DOI= 10.1109/PDCAT.2010.58.
[11]
Pradhan, Nitesh, Gyanchandani, Manasi and Wadhvani, Rajesh. 2015. A Review on Text Similarity Technique used in IR and its Application. International Journal of Computer Applications. 120. 29--34. DOI=10.5120/21257-4109.
[12]
Farouk, M. 2019. Measuring sentences similarity: a survey. Indian Journal of Science and Technology. DOI=10.17485/ijst/2019/v12i25/143977.
[13]
Yung-Hsing Peng and Chang-Biau Yang. 2014. Finding the gapped longest common subsequence by incremental suffix maximum queries. Information and Computation, Volume 237, Pages 95--100. DOI= https://doi.org/10.1016/j.ic.2014.06.001.
[14]
Barrón-Cedeño Alberto, Rosso Paolo, Agirre Eneko and Labaka, Gorka. 2010. Plagiarism Detection across Distant Language Pairs. Coling 2010 23rd International Conference on Computational Linguistics, Proceedings of the Conference. 2. 37--45.
[15]
Niu, Y., Qiao, C., Li, H., and Huang, M. 2018. Word embedding based edit distance. https://arxiv.org/pdf/181-0.10752.pdf.
[16]
Qian Gang, Sural Shamik, Gu Yuelong and Pramanik, S. 2004. Similarity between Euclidean and cosine angle distance for nearest neighbor queries. Proceedings of the ACM Symposium on Applied Computing. 2. 1232--1237. DOI=10.1145/967900.968151.
[17]
Mihalcea R, Corley C and Strapparava C. 2006. Corpus-based and Knowledge-based Measures of Text Semantic Similarity. Proceedings, The Twenty-First National Conference on Artificial Intelligence and the Eighteenth Innovative Applications of Artificial Intelligence Conference, July 16-20, 2006, Boston, Massachusetts, USA. DBLP.

Cited By

View all

Index Terms

  1. An Information Intelligent Search Method for Computer Forensics Based on Text Similarity

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICCSP 2020: Proceedings of the 2020 4th International Conference on Cryptography, Security and Privacy
    January 2020
    160 pages
    ISBN:9781450377447
    DOI:10.1145/3377644
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    In-Cooperation

    • NJU: Nanjing University

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 26 February 2020

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Computer forensics
    2. Information retrieval
    3. Pattern matching algorithm
    4. Text similarity

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    ICCSP 2020

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 143
      Total Downloads
    • Downloads (Last 12 months)4
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 05 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media