On the use of data visualization techniques to support digital forensic analysis: a survey of current approaches

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The task of analysis within the digital forensic investigation life-cycle is examined and the support provided for its constituent activities by a representative sample of forensic tools evaluated. It is suggested that the core activity of analysis (i.e. the derivation of a testable high-level hypothesis or narrative of user behaviour) is a creative activity which depends primarily on the experience of the digital forensic analyst. Such activity is thus difficult to formalise and difficult to support with tools. It is further reasoned that the interactive and exploratory nature of data-visualization (data-viz) is synergistic with the problem and thus provides a suitable basis for the provision of analytical tool support.
Original languageEnglish
Title of host publicationIssues in cybercrime, security and digital forensics
Subtitle of host publicationproceedings of the 2nd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2012)
EditorsGeorge R. S. Weir, Ameer Al-Nemrat
Place of PublicationLondon
PublisherUniversity of East London
Pages121-132
Number of pages12
ISBN (Print)9780947649852
Publication statusPublished - May 2012
Event2nd International Conference on Cybercrime, Security and Digital Forensics - University of East London, London, United Kingdom
Duration: 14 May 201215 May 2012
Conference number: 2

Conference

Conference2nd International Conference on Cybercrime, Security and Digital Forensics
Abbreviated titleCyberforensics 2012
Country/TerritoryUnited Kingdom
CityLondon
Period14/05/1215/05/12

Keywords

  • Digital forensics
  • Information visualisation
  • Computer security

Fingerprint

Dive into the research topics of 'On the use of data visualization techniques to support digital forensic analysis: a survey of current approaches'. Together they form a unique fingerprint.

Cite this