Forensic Science International: Digital Investigation, Volume (44), No (3), Year (2023-3) , Pages (301484-301500)

Title : ( Detecting the software usage on a compromised system: A triage solution for digital forensics )

Authors: somayeh soltani , Seyed Amin Hosseini Seno ,

Citation: BibTeX | EndNote

Abstract

One of the challenges of digital forensics is the high volume of investigative cases. To address this problem, researchers have proposed various triage methods. Detecting the applications that have run on the compromised system under inspection can be an excellent triage method that gives the investigator an overview of the system. In this paper, we construct the signature of software usage on a system using file path artifacts. We propose a software signature detection engine (SSDE) to identify the usage of the software on the system under investigation. The SSDE consists of two subsystems: the signature con-struction subsystem, which builds the software signature using the TF-IDF weighting scheme, and the signature detection subsystem, which identifies the executed set of software on the target system. We consider several parameters with different values in the design of SSDEs, leading to more than 500 SSDE models. We test the SSDE models against 14 pseudo-real systems from the M57 Patents scenario and evaluate their performance. The experimental results show that about 38% of SSDE models achieve near-perfect Precision, and about 18% of them achieve near-perfect Recall. We introduce the top models and determine which parameter values lead to the superior models. Besides, we compare the SSDE models with some doc2vec-based models. The results show that SSDE models have higher average Precision, slightly lower average Recall, and much less computational time.

Keywords

, Digital forensics Triage process Software signature TF, IDF Forensic differential analysis
برای دانلود از شناسه و رمز عبور پرتال پویا استفاده کنید.

@article{paperid:1092406,
author = {Soltani, Somayeh and Hosseini Seno, Seyed Amin},
title = {Detecting the software usage on a compromised system: A triage solution for digital forensics},
journal = {Forensic Science International: Digital Investigation},
year = {2023},
volume = {44},
number = {3},
month = {March},
issn = {2666-2817},
pages = {301484--301500},
numpages = {16},
keywords = {Digital forensics Triage process Software signature TF-IDF Forensic differential analysis},
}

[Download]

%0 Journal Article
%T Detecting the software usage on a compromised system: A triage solution for digital forensics
%A Soltani, Somayeh
%A Hosseini Seno, Seyed Amin
%J Forensic Science International: Digital Investigation
%@ 2666-2817
%D 2023

[Download]