Open Access   Article Go Back

An Implementation of Time Line Events Visualization Tool Using Forensic Digger Algorithm

P. Khatik1 , P. Choudhary2

Section:Research Paper, Product Type: Journal Paper
Volume-2 , Issue-4 , Page no. 16-20, Apr-2014

Online published on Apr 30, 2014

Copyright © P. Khatik , P. Choudhary . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: P. Khatik , P. Choudhary, “An Implementation of Time Line Events Visualization Tool Using Forensic Digger Algorithm,” International Journal of Computer Sciences and Engineering, Vol.2, Issue.4, pp.16-20, 2014.

MLA Style Citation: P. Khatik , P. Choudhary "An Implementation of Time Line Events Visualization Tool Using Forensic Digger Algorithm." International Journal of Computer Sciences and Engineering 2.4 (2014): 16-20.

APA Style Citation: P. Khatik , P. Choudhary, (2014). An Implementation of Time Line Events Visualization Tool Using Forensic Digger Algorithm. International Journal of Computer Sciences and Engineering, 2(4), 16-20.

BibTex Style Citation:
@article{Khatik_2014,
author = {P. Khatik , P. Choudhary},
title = {An Implementation of Time Line Events Visualization Tool Using Forensic Digger Algorithm},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2014},
volume = {2},
Issue = {4},
month = {4},
year = {2014},
issn = {2347-2693},
pages = {16-20},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=142},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=142
TI - An Implementation of Time Line Events Visualization Tool Using Forensic Digger Algorithm
T2 - International Journal of Computer Sciences and Engineering
AU - P. Khatik , P. Choudhary
PY - 2014
DA - 2014/04/30
PB - IJCSE, Indore, INDIA
SP - 16-20
IS - 4
VL - 2
SN - 2347-2693
ER -

VIEWS PDF XML
3581 3446 downloads 3498 downloads
  
  
           

Abstract

Introduction should lead the reader to the importance of the study; tie-up published literature with the aims of the study and clearly states the rationale behind the investigation. It should state the purpose and summarize the rationale for the study and gives a concise background. Use references to provide the most salient background rather than an exhaustive review. The last sentence should concisely state your purpose for carrying out the study.

Key-Words / Index Term

Server Time Line Analysis, Server Log, Event Log, Web Analysis

References

[1]. Stephenson, P.: Formal modeling of post-incident root cause analysis. Int. J. Digit. Evid. 2 (2003)
[2]. [2]. Gladyshev, P., Patel, A.: Finite state machine approach to digital event reconstruction. Digit. Invest. 1 (2004)
[3]. Khan M, Chatwin C, Young R. A framework for post-event timeline reconstruction using neural networks. Digital Investigation 2007;4: 146�57.
[4]. Stallard, T.B.:Automated analysis for digital forensic science. Master�s thesis, University of California, Davis (2002)
[5]. Stallard,T.,Levitt,K.N.:Automated analysis for digital forensic science: Semantic integrity checking. In: ACSAC 160�169 (2003)
[6]. Abbott, J., Bell, J., Clark, A., Vel, O.D., Mohay, G.: Automated recognition of event scenarios for digital forensics. In: SAC �06: Proceedings of the 2006 ACM symposium on applied computing pp. 293�300.ACMPress,NewYork (2006)
[7]. Elsaesser, C., Tanner, M.C.: Automated diagnosis for computer forensics. Technical report, The MITRE Corporation (2001)
[8]. Neuhaus, S., Zeller, A.: Isolating intrusions by automatic experiments. In: Proceedings of the 13th annual network and distributed system security symposium. pp. 71�80 (2006)
[9]. Olsson J, Boldt M. Computer forensic timeline visualization tool. Digital Investigation 2009;6(S1):S78�87.
[10]. Gu�j�nsson K. Mastering the super timeline with log2timeline. SANS Reading Room; 2010.
[11]. Bunting. EnCE study guide; 2008. pp. 235�237.
[12]. Buchholz F, Falk C. In: DFRWS, editor. Design and implementation of Zeitline: a forensic timeline; 2005
[13]. Carbone R, Bean C. Generating computer forensic super-timelines under Linux; 2011.
[14]. Sutapat Thiprungsri. Miklos A. Vasarhelyi, Cluster Analysis for Anomaly Detection in Accounting Data: An Audit Approach, The International Journal of Digital Accounting Research,pp 69-84,2011.
[15]. Gerald Schrenk, Rainer Poisel, �A Discussion of Visualization Techniques for the Analysis of Digital Evidence�, International Conference on Availability, Reliability and Security,pp758-763,2011.