Loading

Data Mining Technique to Data Collection and Analysis for Cyber Forensic
Prashant Khobragade1, Pranay Saraf2, Priya maidamwar3, Preeti Thakre4
1Prashant Khobragade*, Department of Computer Science and Engineering, G H Raisoni College of Engineering, Nagpur, India.
2Pranay Saraf, Department of Computer Science and Engineering, G H Raisoni College of Engineering, Nagpur, India.
3Preeti Thakre, Department of Computer Science and Engineering, G H Raisoni College of Engineering, Nagpur, India.
4Priya maidamwar, Department of Computer Science and Engineering, G H Raisoni College of Engineering, Nagpur, India.

Manuscript received on January 09, 2020. | Revised Manuscript received on January 22, 2020. | Manuscript published on January 30, 2020. | PP: 2786-2789 | Volume-8 Issue-5, January 2020. | Retrieval Number: D8543118419/2020©BEIESP | DOI: 10.35940/ijrte.D8543.018520

Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In the world of Digital forensic the uncovered digital may contain vital information for digital data investigation for investigator. Digital data collected from the crime scene leads to find out the clue after performing analysis by the examiner. This process of data examination data collection and analysis plays important role in cyber world for the forensic investigator. The cybercrime is a part of computer forensics where the digital evidences are analyze by the investigator and to perform analysis special measurements and techniques are required in order to use this details that has to be accepted in court of law for law enforcement. The data collection of evidence is a key aspect for the investigator, such kind of digital data has to be collected from different sources at the crime scene and this process involves to collect each and every evidence of digital crime scene and later this gather data will be analyze by the experts to reach to the conclusion. In this paper the proposed method collected the data from the crime scene efficiently which includes log data, transactional data, physical drive data, and network data; later this collected data analyzed to find out the theft node in the network. In this paper FTK 4.0 digital forensic tool used to reduce plenty of time for data processing and later report will be produce that will be accepted tin the court of law. This paper also focuses the data collection method with in the network and reach to the faulty node and later this faulty node analyzed with all collected data for forensic analysis. For this standard algorithm used to analyze the performance of distinct features used for network attacks. Kmeans clustering methodology is used to create cluster of victim node and represent victim data in systematic manner for the ease of law enforcement.
Keywords: Data Collection, SVM, K Means Clustering, Network Analysis, File System Analysis.
Scope of the Article: Data Mining.