A summary of the report written by W. Alink, R.A.F. Bhoedjang, P.A. Boncz, and A.P. de Vries.

Slides:



Advertisements
Similar presentations
Overview of Data Structures and Algorithms
Advertisements

Key-word Driven Automation Framework Shiva Kumar Soumya Dalvi May 25, 2007.
CAPTURE SOFTWARE Please take a few moments to review the following slides. Please take a few moments to review the following slides. The filing of documents.
Xyleme A Dynamic Warehouse for XML Data of the Web.
ADVISE: Advanced Digital Video Information Segmentation Engine
Visual Web Information Extraction With Lixto Robert Baumgartner Sergio Flesca Georg Gottlob.
Direct Congress Dan Skorupski Dan Vingo 15 October 2008.
An Object-Oriented Architecture Supporting Web Application Testing Presented By: Bhavdeep Singh.
Technology for Computer Forensics by Alicia Castro.
1 Information Retrieval and Extraction 資訊檢索與擷取 Chia-Hui Chang, Assistant Professor Dept. of Computer Science & Information Engineering National Central.
Summary. Chapter 9 – Triggers Integrity constraints Enforcing IC with different techniques –Keys –Foreign keys –Attribute-based constraints –Schema-based.
BUSINESS DRIVEN TECHNOLOGY
Chapter 1 Introduction to Databases
Database Management Systems (DBMS)
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #12 Intelligent Digital Forensics September 30, 2009.
4/20/2017.
Databases & Data Warehouses Chapter 3 Database Processing.
Systems Analysis – Analyzing Requirements.  Analyzing requirement stage identifies user information needs and new systems requirements  IS dev team.
CS370 Spring 2007 CS 370 Database Systems Lecture 2 Overview of Database Systems.
OCLC Online Computer Library Center CONTENTdm ® Digital Collection Management Software Ron Gardner, OCLC Digital Services Consultant ICOLC Meeting April.
Some Thoughts on HPC in Natural Language Engineering Steven Bird University of Melbourne & University of Pennsylvania.
Database Solutions for Storing and Retrieving XML Documents.
© Paradigm Publishing Inc. 9-1 Chapter 9 Database and Information Management.
Image Collection Backend for Cameraphones. Introduction Project Goals Design an integrated system to upload image from a mobile phone to a remote server.
Supervised by Prof. LYU, Rung Tsong Michael Department of Computer Science & Engineering The Chinese University of Hong Kong Prepared by: Chan Pik Wah,
Metadata Normalisation in Europeana The Hague, 13 & 14 January 2009 Julie Verleyen Scientific Coordinator, Europeana Office EuropeanaLocal Knowledge Sharing.
Models of Models: Digital Forensics and Domain-Specific Languages Daniel A. Ray and Phillip G. Bradford The University of Alabama Tuscaloosa, AL
Public Domain/Open Source Software Evaluation Photo Organizer.
Computer Science 101 Database Concepts. Database Collection of related data Models real world “universe” Reflects changes Specific purposes and audience.
Digital Broadcasting Research Division Broadcasting media Research Group TV-Anytime Metadata Authoring Tool Jung Won Kang Digital Broadcasting Research.
© 2007 by Prentice Hall 1 Introduction to databases.
The Network Performance Advisor J. W. Ferguson NLANR/DAST & NCSA.
Digital Filing A Simple Way to Digitally Centralize and Distribute Documents.
XML and Digital Libraries M. Zubair Department of Computer Science Old Dominion University.
Bulk Metadata Structures in CERA Frank Toussaint, Michael Lautenschlager Max-Planck-Institut für Meteorologie World Data Center for Climate.
Contents 1.Introduction, architecture 2.Live demonstration 3.Extensibility.
1 Schema Registries Steven Hughes, Lou Reich, Dan Crichton NASA 21 October 2015.
Nate Trail Network Development & MARC Standards Office 8/1/2006 With help from Sydney Olive How to Build, Display and Find METS Objects.
Databases: An Overview Chapter 7, Exploring the Digital Domain.
Database Management Systems.  Database management system (DBMS)  Store large collections of data  Organize the data  Becomes a data storage system.
Dale E. Gary Professor, Physics, Center for Solar-Terrestrial Research New Jersey Institute of Technology 1 9/25/2012Prototype Review Meeting.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture 23 Intelligent Digital Forensics October 22, 2007.
Database Concepts Track 3: Managing Information using Database.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #15 Secure Multimedia Data.
Using automation to enhance the process of Digital Forensic analysis Daniel Walton School of Computer and Information Science
Coding Compliance Components Writing Custom Policies for Auditing, Expiration and More Jason Morrill Program Manager Windows SharePoint Services.
Information Retrieval Transfer Cycle Dania Bilal IS 530 Fall 2007.
Reviews Crawler (Detection, Extraction & Analysis) FOSS Practicum By: Syed Ahmed & Rakhi Gupta April 28, 2010.
Taming the Big Data in Computational Chemistry #euroCRIS2015 Barcelona 9-11-XI-2015 Carles Bo ICIQ (BIST) -
Collaborative Query Previews in Digital Libraries Lin Fu, Dion Goh, Schubert Foo Division of Information Studies School of Communication and Information.
The Collaborative Imaging Grid Paul Javid, Kurtis Heimerl A collaborative research environment enabling Researchers to learn from images when computer.
Presentation on Database management Submitted To: Prof: Rutvi Sarang Submitted By: Dharmishtha A. Baria Roll:No:1(sem-3)
July 19, 2004Joint Techs – Columbus, OH Network Performance Advisor Tanya M. Brethour NLANR/DAST.
Utilizing the Benefits of Native XML Database Technologies Alan Cornish Systems Librarian Washington State University Libraries.
Unit-8 Introduction Of MySql. Types of table in PHP MySQL supports various of table types or storage engines to allow you to optimize your database. The.
Chapter 11 Analysis Methodology Spring Incident Response & Computer Forensics.
Mechanisms for Requirements Driven Component Selection and Design Automation 최경석.
Understanding Core Database Concepts Lesson 1. Objectives.
Digital Video Library - Jacky Ma.
Introduction Multimedia initial focus
1.1 The Evolution of Database Systems
Dr. Bhavani Thuraisingham The University of Texas at Dallas
Manuscript Transcription Assistant Initiative
2/18/2019.
Computer Forensics Lab 1 INFORMATION TECHNOLOGY DEPARTMENT LEBANESE FRENCH UNIVERSITY (LFU) COURSE CODE: IT402CF 1.
Query Optimization.
Use Cases Simple Machine Translation (using Rainbow)
Understanding Core Database Concepts
Best Practices in Higher Education Student Data Warehousing Forum
Presentation transcript:

A summary of the report written by W. Alink, R.A.F. Bhoedjang, P.A. Boncz, and A.P. de Vries.

The Problem Large amount of data – possibly terabytes Limited amount of time Higher chance of missing traces Diversity of data Too many specialized tools Difficult to integrate results Time constraints Knowledge constraints

Solution Separate feature extraction from analysis: Feature Extraction: The extraction of useful features from raw data- Includes more than just file data Analysis: Browsing, querying and correlating. One output format for forensic analysis tools (based on XML) XML for storing and querying the output of the tools. Automate feature extraction Various current projects in law enforcement community related to automated feature extraction

XIRAF Prototype system that uses this approach “XML Information Retrieval Approach to digital Forensics” Automatic feature extraction from disk image/s Stores data in XML database Uses XQuery (XML query language) to access the database and the data from the disk-image.

Framework 3 components: Tool repository: feature extraction tools Feature extraction manager: manages the invocation of the tools, merges output and stores it in storage subsystem. Storage subsystem: composed of raw evidence (binary large objects) and extracted features (XML)

General Overview of process Image fed to system (binary data) Feature Extraction Manager extracts useful features (uses tool repository) Feature Extraction Manager stores features in single XML document (in form of a tree). The Feature Extraction Manager can then run other tools on the found data and add to the xml document. Data stored in storage sub system, where the binary data or the XML tree can be accessed

Forensic Applications Timeline browser Mainstream tools do file-system browsing (relies on file- system meta-data) This application of XIRAF can get all XML fragments with a timestamp, gathered from different tools (which could include things like chat logs). Photo search Finds digital images that meet desired conditions Can consider camera model, date and time of recording, image resolution and more.

Forensic Applications Child Pornography Detection Uses hash of various files that are known to contain child pornography Matches files against a database of hashes The hash database is converted to XML, and preloaded into the XML database XIRAF contains. The comparison is done during the feature extraction phase.

Conclusion/future work Too early to draw definitive conclusions (just a prototype) An increasing number of tools have started producing output in XML. Mobile phone queries More knowledge bases

References W. Alink, R.A.F. Bhoedjang, P.A. Boncz, and A.P. de Vries. ““XIRAF – XML-based indexing and querying for digital forensics”. Available at: