Malmö University Publications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Diverging deep learning cognitive computing techniques into cyber forensics
Cyber Security and Forensics Research Group, Department of Computer Science, University of Eswatini, Private Bag 4, Kwaluseni, Eswatini.
Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT). Malmö University, Internet of Things and People (IOTAP). DigiFORs Research Group, Department of Computer Science, University of Pretoria, Lynwood Road, South Africa.ORCID iD: 0000-0003-4071-4596
DigiFORs Research Group, Department of Computer Science, University of Pretoria, Lynwood Road, South Africa.
2019 (English)In: Forensic science international. Synergy, ISSN 2589-871X, Vol. 1, p. 61-67Article in journal (Refereed) Published
Abstract [en]

More than ever before, the world is nowadays experiencing increased cyber-attacks in all areas of our daily lives. This situation has made combating cybercrimes a daily struggle for both individuals and organisations. Furthermore, this struggle has been aggravated by the fact that today's cybercriminals have gone a step ahead and are able to employ complicated cyber-attack techniques. Some of those techniques are minuscule and inconspicuous in nature and often camouflage in the facade of authentic requests and commands. In order to combat this menace, especially after a security incident has happened, cyber security professionals as well as digital forensic investigators are always forced to sift through large and complex pools of data also known as Big Data in an effort to unveil Potential Digital Evidence (PDE) that can be used to support litigations. Gathered PDE can then be used to help investigators arrive at particular conclusions and/or decisions. In the case of cyber forensics, what makes the process even tough for investigators is the fact that Big Data often comes from multiple sources and has different file formats. Forensic investigators often have less time and budget to handle the increased demands when it comes to the analysis of these large amounts of complex data for forensic purposes. It is for this reason that the authors in this paper have realised that Deep Learning (DL), which is a subset of Artificial Intelligence (AI), has very distinct use-cases in the domain of cyber forensics, and even if many people might argue that it's not an unrivalled solution, it can help enhance the fight against cybercrime. This paper therefore proposes a generic framework for diverging DL cognitive computing techniques into Cyber Forensics (CF) hereafter referred to as the DLCF Framework. DL uses some machine learning techniques to solve problems through the use of neural networks that simulate human decision-making. Based on these grounds, DL holds the potential to dramatically change the domain of CF in a variety of ways as well as provide solutions to forensic investigators. Such solutions can range from, reducing bias in forensic investigations to challenging what evidence is considered admissible in a court of law or any civil hearing and many more.

Place, publisher, year, edition, pages
Elsevier, 2019. Vol. 1, p. 61-67
Keywords [en]
Artificial intelligence, Cyber forensics, Cyberattacks, Cybercrimes, Deep learning, Framework, Investigations
National Category
Information Systems, Social aspects
Identifiers
URN: urn:nbn:se:mau:diva-39733DOI: 10.1016/j.fsisyn.2019.03.006PubMedID: 32411955Scopus ID: 2-s2.0-85065251412OAI: oai:DiVA.org:mau-39733DiVA, id: diva2:1521820
Available from: 2021-01-25 Created: 2021-01-25 Last updated: 2024-06-17Bibliographically approved

Open Access in DiVA

fulltext(976 kB)77 downloads
File information
File name FULLTEXT01.pdfFile size 976 kBChecksum SHA-512
608dfb4de664b451d1b189fa04538f7eb17172fdc27e91095fd5b2264c776a6054e775f4b0a7bba73f0a41dafe1d6cab10e0f10c3b91bdb30cb69305fe1a4af8
Type fulltextMimetype application/pdf

Other links

Publisher's full textPubMedScopus

Authority records

Kebande, Victor R.

Search in DiVA

By author/editor
Kebande, Victor R.
By organisation
Department of Computer Science and Media Technology (DVMT)Internet of Things and People (IOTAP)
Information Systems, Social aspects

Search outside of DiVA

GoogleGoogle Scholar
Total: 77 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

doi
pubmed
urn-nbn

Altmetric score

doi
pubmed
urn-nbn
Total: 82 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf