70 likes | 183 Vues
This project explores the application of pattern matching in computer forensics, focusing on critical areas such as prevention, detection, and analysis. Key examples include its use in steganography and cryptology, as well as its relevance in everyday user computing and significant projects like human genome sequencing and journalism. We aim to develop a specialized pattern matching program, leveraging tools such as PX Binary Viewer and MD5 algorithms for system baselining, ultimately enhancing our ability to identify and analyze digital evidence effectively.
E N D
Computer Forensics CSI CSCI Pattern Matching Andrew Burns Brian Norton
Forensics:Broad areas of study • Prevention • Detection • Analysis • Steganography
Examples of Pattern Matching: • Steganography/Cryptology • Use in everyday End-User computers • Use in sophisticated projects such as human genome sequencing, law enforcement, journalism • Pattern Matching - our area of study in this project
Iranian News photo(s) released to Agence France-Presse July 2008 Major US news outlets issue retractions days later.
Project Description • Where we hope to go: • To develop a Pattern Matching program • For now: • Use of PX Binary Viewer • Preview of C Program • Later Steps: • MD5 Algorithms • System Baselining similar to a photograph - used as comparison tool.
References • Computer Forensics Laboratory and Tools, G. A. Francia III and K. Clinton: Jacksonville State University - JCSC 20, 6 (June 2005) • Network Forensics, “Surviving Network Attacks” Ben Laurie, AL Digital, Queue, June 2004, pp 50-56 • Criminal Computer Forensics Management Ray Yeager, Kennesaw State University pp 168-174 • Wikipedia • “The role of key loggers in computer-based assessment forensics” • “System Baseling - A Forensic Perspective” K. Monroe, D Bailey • Invitation to Computer Science 3rd Ed. Schneider and Gersting