The Use of Ontologies in Forensic Analysis of Smartphone Content

Mohammed Alzaabi

Abstract


Digital forensics investigators face a constant challenge in keeping track with evolving technologies such as smartphones. Analyzing the contents of these devices to infer useful information is becoming more time consuming as the volume and complexity of data are increasing. Typically, such analysis is undertaken by a human, which makes it dependent on the experience of the investigator. To overcome such impediments, an automated technique can be utilized in order to aid the investigator to quickly and eciently analyze the data.In this paper, we propose F-DOS; a set of ontologies that models the smartphone content for the purpose of forensic analysis. F-DOS can form a knowledge management component in a forensic analysis system. Its importance lies in its ability to encode the semantics of the smartphone content using concepts and their relationships that are modeled by F-DOS.Digital forensics investigators face a constant challenge in keeping track with evolving technologies such assmartphones. Analyzing the contents of these devices to infer useful information is becoming more timeconsuming as the volume and complexity of data are increasing. Typically, such analysis is undertaken by ahuman, which makes it dependent on the experience of the investigator. To overcome such impediments, anautomated technique can be utilized in order to aid the investigator to quickly and eciently analyze the data.In this paper, we propose F-DOS; a set of ontologies that models the smartphone content for the purpose offorensic analysis. F-DOS can form a knowledge management component in a forensic analysis system. Itsimportance lies in its ability to encode the semantics of the smartphone content using concepts and theirrelationships that are modeled by F-DOS.

Keywords


Digital Forensics, Forensic Analysis, Ontology, mobile device forensics

Full Text:

PDF

References


Ahmed, S. S. M. (2014). Intrusion Alert Analysis Framework Using Semantic Correlation (Unpublished doctoral dissertation). University of Victoria.

Cosic, J., Cosic, Z., & Baca, M. (2011). An Ontological Approach to Study and Manage Digital Chain of Custody of Digital Evidence. Journal of Information and Organizational Sciences, 35 (1), 1-13.

Dosis, S., Homem, I., & Popov, O. (2013). Semantic Representation and Integration of Digital Evidence. Procedia Computer Science, 22 , 1266-1275.

Fensel, D., Bussler, C., Ding, Y., Kartseva, V., Klein, M., Korotkiy, M., Siebes, R. (2002, June). SemanticWeb Application Areas. In the 7th International Workshop on Applications of Natural Language to Information Systems. Stockholm, Sweden.

Fernndez-Lpez, M., & Gmez-Prez, A. (2002, June). Overview and Analysis of Methodologies for Building Ontologies. The Knowledge Engineering Review, 17 (2), 129-156.

Fernndez-Lpez, M., Gmez-Prez, A., & Juristo, N. (1996). Methontology: from ontological art towards ontological engineering. In ECAI96 Workshop on Ontological Engineering (pp. 41-51). Budapest.

Gruber, T. R. (1995, November). Toward principles for the design of ontologies used for knowledge sharing. International Journal of Human-Computer Studies, 43 (56), 907-928.

Kota, V. K. (2012, December). An Ontological Approach for Digital Evidence Search. International Journal of Scientic and Research Pub-

lications, 2 (12), 1-5.

Luth, A. (2014). The Use of Ontology Framework for Automation Digital Forensics Investigation. International Journal of Computer,

Control, Quantum and Information Engineering, 8 (3), 423-425.

Park, H., Cho, S., & Kwon, H.-C. (2009). Cyber Forensics Ontology for Cyber Criminal Investigation. In M. Sorell (Ed.), Forensics in

Telecommunications, Information and Multimedia (pp. 160-165).


Refbacks

  • There are currently no refbacks.


Copyright (c) 2016 Journal of Digital Forensics, Security and Law

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

(c) 2006-2015 Association of Digital Forensics, Security and Law