1 / 12

ICDFI 2013 Keynote Speech 1: Quantifying Likelihood in Digital Forensic Investigations

ICDFI 2013 Keynote Speech 1: Quantifying Likelihood in Digital Forensic Investigations. Dr Richard Overill Department of Informatics, King’s College London richard.overill@kcl.ac.uk. Synopsis. Introduction & Background Quantitative Tools for Digital Forensics Probability Theory

dagan
Télécharger la présentation

ICDFI 2013 Keynote Speech 1: Quantifying Likelihood in Digital Forensic Investigations

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. ICDFI 2013 Keynote Speech 1:Quantifying Likelihood in Digital Forensic Investigations Dr Richard Overill Department of Informatics, King’s College London richard.overill@kcl.ac.uk

  2. Synopsis • Introduction & Background • Quantitative Tools for Digital Forensics • Probability Theory • Bayesian Networks • Complexity Theory • Information Theory • How can these tools benefit us? • Summary & Conclusions

  3. Introduction & Background • Conventional (‘wet’) forensic scientists commonly quantify the outcomes of their investigations, for example: • There is a one in a million chance that two identical fingerprints were not produced by the same individual • There is a one in a billion chance that two identical DNA samples do not originate from the same individual • Digital forensic investigators generally don’t do this. Why?

  4. Quantitative Tools for Digital Investigations - I • Probability Theory • conventional forensic scientists commonly use it • Example: • Potential cosmic ray damage to CMOS and Flash RAM. In mid-1990s IBM found that a high-energy secondary cosmic ray strike could flip about one bit of CMOS RAM per month. But modern Flash memory is much more susceptible and much more densely packed, so the bit-flip rate is now per minute. This has clear implications for DFI.

  5. Quantitative Tools for Digital Investigations - II • Bayesian Networks (BNs) to reason about digital evidence and hypotheses • Pioneered by K-P Chow to reason about IP piracy over peer-to-peer networks • Need to choose conditional probabilities (CPs) for each node giving the probability of finding the each expected evidential trace if its associated hypothesis is (true, false) • We have shown the BN’s output is rather insensitive to the choice of CPs, so BNs are valid

  6. Example BN – DDoS Attack

  7. Complexity Theory - I • Ockham’s Razor and the Principle of Least Contrivance / Contingency • Hoyle: “A tornado sweeping through a junk-yard might assemble a Boeing 747 from the materials therein”, butwhat are the chances of that? • The least complex explanation of all the evidence is the most probable explanation • Measuring the complexity of alternative explanations (computational work, user role, software effort, etc.) can yield an odds ratio

  8. Complexity Theory - II • Example: the odds ratios against a Trojan Horse explanation for six common digital crimes have been calculated: • BitTorrent IP theft • Online auction fraud • Cyber locker extortion • Online game weapon theft • DDoS attack • Possession of child pornographic images

  9. Information Theory • Conventional (Shannon-Weaver) information theory (‘entropy’) measures the degree of unpredictability in the recovered evidence • Algorithmic information theory (Solomonov-Kolmogorov) measures the length of the shortest program that can reproduce all the recovered evidence • So there is a link between Complexity and Information Theory that can be exploited

  10. Benefits of Quantitative Tools • Enable the forensic investigator / examiner to prioritise cases that that have a high chance of success and to abandon cases which have a low chance of going to trial • Enables prosecution authorities to assess the relative strength of their case versus the defence’s case when deciding whether or not to proceed to trial • Enables courts to hear digital evidence presented in a similar manner to non-digital

  11. Summary & Conclusion • I hope I have persuaded you that: • quantitative tools exist to produce likelihood ratios and odds ratios for cases in which undisputed digital evidence can be fully accounted for by more than one explanation (hypothesis) • the benefits of adopting such tools are improving : • the conduct of the digital forensic investigation • the decision making of the prosecution authority • the conduct of the trial proceedings

  12. Thank you!Comments?Questions?

More Related