Research of Computer Forensics Based on Benford’s Law

Article Preview

Abstract:

In this paper we construct model in computer forensics by using Benford’s Law, which is one of three famous laws in statistics in linguistics. Especially, we use Benford’s Law to analyze data in file analysis and Anomaly detection. We illustrate that Benford’s Law is able to supply the strategy for data analysis. The future work, Benford’s Law will be the theoretical rule for intelligent compression of mass data.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 989-994)

Pages:

2148-2151

Citation:

Online since:

July 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Michael G. Noblett; Mark M. Pollitt, Lawrence A. Presley (October 2000). Recovering and examining computer forensic evidence. Retrieved 26 July (2010).

Google Scholar

[2] M. Pollitt, Computer forensics: an approach to evidence in cyberspace, in Proceedings of the National Information Systems Security Conference, Baltimore, MD, 1995, vol. 2, pp.487-491, http: /www. digitalevidencepro. com/Resources/Approach. pdf.

Google Scholar

[3] Sabah Al-Fedaghi and Bashayer Al-Babtain. Modeling the Forensics Process. http: /www. sersc. org/journals/IJSIA/vol6_no4_2012/9. pdf.

Google Scholar

[4] Chen Long, Mai Yonghao. Computer Forensics Technology. Wuhan: Wuhan University Press. (2007).

Google Scholar

[5] Ding Liping, Wang Yongji. Multi-dimension Forensics Model. Computer Security-proceeding of 20th National Symposium on computer security. 2006: 5-9.

Google Scholar

[6] Newcomb S. N ote on the frequency of use of the different digits in natural numbers. American Journal of Mathematics, 1881, 4(1/4): 39-40.

Google Scholar

[7] Benford F. The law of anomalous numbers. Proc of the American Philoso Phical. 1938: 551-572.

Google Scholar

[8] Mark Nigrini, Joseph T. Wells. Benford's Law: Applications for Forensic Accounting, Auditing, and Fraud Detection. (2012).

Google Scholar