Prior Publisher
The Association of Digital Forensics, Security and Law (ADFSL)
Abstract
Digital forensics investigators face a constant challenge in keeping track with evolving technologies such as smartphones. Analyzing the contents of these devices to infer useful information is becoming more time consuming as the volume and complexity of data are increasing. Typically, such analysis is undertaken by a human, which makes it dependent on the experience of the investigator. To overcome such impediments, an automated technique can be utilized in order to aid the investigator to quickly and eciently analyze the data.In this paper, we propose F-DOS; a set of ontologies that models the smartphone content for the purpose of forensic analysis. F-DOS can form a knowledge management component in a forensic analysis system. Its importance lies in its ability to encode the semantics of the smartphone content using concepts and their relationships that are modeled by F-DOS.Digital forensics investigators face a constant challenge in keeping track with evolving technologies such assmartphones. Analyzing the contents of these devices to infer useful information is becoming more timeconsuming as the volume and complexity of data are increasing. Typically, such analysis is undertaken by ahuman, which makes it dependent on the experience of the investigator. To overcome such impediments, anautomated technique can be utilized in order to aid the investigator to quickly and eciently analyze the data.In this paper, we propose F-DOS; a set of ontologies that models the smartphone content for the purpose offorensic analysis. F-DOS can form a knowledge management component in a forensic analysis system. Itsimportance lies in its ability to encode the semantics of the smartphone content using concepts and theirrelationships that are modeled by F-DOS.
References
Ahmed, S. S. M. (2014). Intrusion Alert Analysis Framework Using Semantic Correlation (Unpublished doctoral dissertation). University of Victoria.
Cosic, J., Cosic, Z., & Baca, M. (2011). An Ontological Approach to Study and Manage Digital Chain of Custody of Digital Evidence. Journal of Information and Organizational Sciences, 35 (1), 1-13.
Dosis, S., Homem, I., & Popov, O. (2013). Semantic Representation and Integration of Digital Evidence. Procedia Computer Science, 22 , 1266-1275.
Fensel, D., Bussler, C., Ding, Y., Kartseva, V., Klein, M., Korotkiy, M., Siebes, R. (2002, June). SemanticWeb Application Areas. In the 7th International Workshop on Applications of Natural Language to Information Systems. Stockholm, Sweden.
Fernndez-Lpez, M., & Gmez-Prez, A. (2002, June). Overview and Analysis of Methodologies for Building Ontologies. The Knowledge Engineering Review, 17 (2), 129-156.
Fernndez-Lpez, M., Gmez-Prez, A., & Juristo, N. (1996). Methontology: from ontological art towards ontological engineering. In ECAI96 Workshop on Ontological Engineering (pp. 41-51). Budapest.
Gruber, T. R. (1995, November). Toward principles for the design of ontologies used for knowledge sharing. International Journal of Human-Computer Studies, 43 (56), 907-928.
Kota, V. K. (2012, December). An Ontological Approach for Digital Evidence Search. International Journal of Scientic and Research Pub-
lications, 2 (12), 1-5.
Luth, A. (2014). The Use of Ontology Framework for Automation Digital Forensics Investigation. International Journal of Computer,
Control, Quantum and Information Engineering, 8 (3), 423-425.
Park, H., Cho, S., & Kwon, H.-C. (2009). Cyber Forensics Ontology for Cyber Criminal Investigation. In M. Sorell (Ed.), Forensics in
Telecommunications, Information and Multimedia (pp. 160-165).
Recommended Citation
Alzaabi, Mohammed; Martin, Thomas A.; Taha, Kamal; and Jones, Andy
(2015)
"The Use of Ontologies in Forensic Analysis of Smartphone Content,"
Journal of Digital Forensics, Security and Law: Vol. 10
, Article 9.
DOI: https://doi.org/10.15394/jdfsl.2015.1215
Available at:
https://commons.erau.edu/jdfsl/vol10/iss4/9
Included in
Computer Engineering Commons, Computer Law Commons, Electrical and Computer Engineering Commons, Forensic Science and Technology Commons, Information Security Commons