A Susceptible Evidence Processing Framework for Handheld Devices Through Digital Forensic Measurements

Authors

  • T. M. Bhraguram Research scholar, Computer Science and Engineering department, Dr. MGR Educational and Research Institute Chennai.
  • P. S. Rajakumar Professor, Computer Science and Engineering department, Dr. MGR Educational and Research Institute Chennai.
  • N. Kanya Professor, Head of The department IT, Dr. MGR Educational and Research Institute Chennai.

Keywords:

Evidence processing, Digital Forensic Investigation, evidence labelling, KDE

Abstract

Digital forensic comprises various actions for processing digital evidences like preprocess, identification, modeling, extraction, and documentation. All these actions are modelled and entitled through the court of law. Different procedures and methods are followed to perform these actions by the help of various platforms and hardware specifications. The analysis and processing of digital evidences depends on the hardware specifications of various companies and the systematic approach of various effective evidence processing software tools. Most of the hardware developing companies takes the security measures through on board circuits and this helps the digital investigators an advantage while retrieving evidences. Latest technological advancements in industry demands various sensitive security measures needs to be considered while launching new hardware devices specifically for communication purposes. Digital forensic plays a great role in retrieving sensitive evidences and its processing while a digital crime scene is evaluating. This activity considers various processing steps and it leads to the evaluation of both hardware and software participated in the crime scene. Mobile devices are the most sensitive and popular handheld devices used around the globe and the communication capability of these handheld devices makes the message passing and content delivery more flexible hence may lead to the misuse and hacked through the personal space. This article gives an effective framework for analysis and processing of digital evidences specifically for handheld devices like Mobiles, pager, laptop, Notebook and other electronic pads. Nowadays most of the communications occurred through handheld devices so the application of digital forensic measurements on these cases are highly important and sensitive. The digital crime analysis and its effective processing solved by the proposed framework and it integrates various levels of security pads. The framework proposed here comprises LR based Numerical and Verbal likelihood ratio during the digital evidence processing scenarios. This integrated mechanism works on the device platform scrutinize both platform dependent and independent factors and applied on the kernel layer with certain security measurements. Any handheld or mobile platforms may adapt with the changes and the retrieved kernel resources including any suspected communications can pass through the framework channel. Thus the scalable platforms may arise with sustainable security enhancements which are entitles according to the procedure established by law.

Downloads

Download data is not yet available.

References

Martire, K. A., Kemp, R. I., Sayle, M., & Newell, B. R. (2014). On the interpretation of likelihood ratios in forensic science evidence: Presentation formats and the weak evidence effect. Forensic Science International, 240, 61–68. http://dx.doi.org/10.1016/j.forsciint.2014.04.005

Bolck A and Alberink I (2011), Variation in Likelihood Ratios for forensic evidence evaluation of XTC tablets comparison, Journal of Chemometrics , 25: 41-49 DOI: 10.1002/cem.1361.

Martire, K. A., Kemp, R. I., Watkins, I., Sayle, M. A., & Newell, B. R. (2013). The expression and interpretation of uncertain forensic science evidence: Verbal equivalence, evidence strength, and the weak evidence effect. Law and Human Behavior, 37, 197–207. http://dx.doi.org/ 10.1037/lhb0000027.

Neumann C, Champod C, Puch-Solis R, Egli N, Anthonioz A, Bromage-Griffiths A, (2007), Computation of Likelihood Ratios in Fingerprint Identification for Configurations of Any Number of Minutiae, J Forensic Sci, 54-64.

Weyermann C, Marquis R, Delaporte C, Esseiva P, Dujourdy L, Lock E, Aalberg L, Dieckmann S, Zrcek F, Bosenko J (2008), Drug intelligence based on MDMA tablets data: (1) Organic impurities profiling. Forensic Science International 177 (1):11-16.

Marquis R, Weyermann C, Delaporte C, Esseiva P, Dujourdy L, Koper C, Aalberg L, Dahlenburg R, Zrcek F, Bosenko J (2008) Drug intelligence based on MDMA tablets data: (2) Phusical characteristics profiling. Forensic Science International 178 (1): 24-39.

Bayes T, Price, R (1763). An Essay towards solving a Problem in the Doctrine of Chance. By the late Rev. Mr. Bayes, communicated by Mr. Price, in a letter to John Canton, M. A. and F. R. S. Philosophical Transactions of the Royal Society of London 53: 370–418.

Cole, S. Forensics Without Uniqueness, Conclusions Without Individualization: The New Epistemology of Forensic Identification. Law, Probability and Risk 2009, 8 (3), 233–255

Koehler, J. J., & Macchi, L. (2004). Thinking about low-probability events. An Exemplar-Cuing theory. Psychological Science, 15, 540–546. http:// dx.doi.org/10.1111/j.0956-7976.2004. 00716.x

Evett, I. W.; Lambert, J. A.; Buckleton, J. S. A Bayesian Approach to Interpreting Footwear Marks in Forensic Casework. Sci. and Justice 1998, 38 (4), 241–247.

Thomson, W. C. Discussion Paper: Hard Cases Make Bad Law–Reactions to R v T. Law, Probability and Risk 2012, 11 (4), 347–359.

Ponce, A., and F. Pascual. 1999. Critical review of presumptive tests for bloodstains. Forensic Science Communications 1(2). http://www.fbi.gov/about-us/lab/forensic-sciencecommunications/ fsc/archive/july1999/ponce.htm (accessed March 10, 2011).

Adderley, R., Bond, J.W., Townsley, M. Use of data mining techniques to model crime scene investigator performance 26th SGAI International Conference on Innovative Techniques and Applications of Artificial Intelligence, Cambridge UK, 2006.

Skopik, Settanni, & Fiedler (2016). A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing. Computers & Security, 60, 154–176. doi.org/10.1016/j.cose.2016.04.003.

Harris, A. Corner, U. Hahn, James is polite and punctual (and useless): a Bayesian formalisation of faint praise, THINK REASONING (2013), http:// dx.doi.org/10.1080/13546783.2013.801367.

Taroni, F., Aitken, C., Garbolino, P., & Biedermann, A. (2006). Bayesian networks and probabilistic inference in forensic science. West Sussex, UK: Wiley. http://dx.doi.org/10.1002/0470091754

Christensen, Michael E. RaynorRory McDonald (2015). What Is Disruptive Innovation? Harvard Business Review, 44–53. Retrieved from https://hbr.org/2015/12/what-is-disruptive-innovation.

Taroni, F., Aitken, C., Garbolino, P., & Biedermann, A. (2006). Bayesian networks and probabilistic inference in forensic science. West Sussex, UK: Wiley. http://dx.doi.org/10.1002/0470091754

Tversky, A., & Kahneman, D. (1982). Evidential impact of base rates. In D. Kahneman, P. Slovic, & A. Tversky (Eds.), Judgment under uncertainty: Heuristics and biases (pp. 153–160). Cambridge, UK: Cambridge University Press. http://dx.doi.org/10.1017/CBO9780511809477.011

Thompson, W. C., Kaasa, S. O., & Peterson, T. (2013). Do jurors give appropriate weight to forensic identification evidence? Journal of Empirical Legal Studies, 10, 359–397. http://dx.doi.org/10.1111/jels.12013

Thompson, W. C. (2012). Discussion paper: Hard cases make bad law: Reactions to R v. T. Law Probability and Risk, 11, 347–359. http://dx .doi.org/10.1093/lpr/mgs020

Cankaya EC, Kupka B. A Survey of Digital Forensics Tools for Database Extraction. In Future Technologies Conference; 2016; San Fransisco: IEEE. p. 1014-1019.

[J. Beckett and J. Slay, “Digital forensics: Validation and verification in a dynamic work environment,” Proc. Annu. Hawaii Int. Conf. Syst. Sci., no. February 2014, 2007.

Riadi and A. Firdonsyah, “Forensic Investigation Technique on Android ’ s Blackberry Messenger using NIST Framework,” Int. J. Cyber - Secur. Digit. Forensics ( IJCSDF ) Soc. Digit. Inf. Wirel. Commun., vol. 6, no. 4, pp. 198–205.

Downloads

Published

23.02.2024

How to Cite

Bhraguram, T. M. ., Rajakumar, P. S. ., & Kanya, N. . (2024). A Susceptible Evidence Processing Framework for Handheld Devices Through Digital Forensic Measurements. International Journal of Intelligent Systems and Applications in Engineering, 12(17s), 427–442. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4894

Issue

Section

Research Article