A Review of Evidence Extraction Techniques in Big Data Environment

Siti Hawa Mokhtar, Gopinath Muruti, Zul Azri Ibrahim, Fiza Abdul Rahim, Hairoladenan Kasim

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Today, information era where data is being generated at high in volume, variety, and velocity, a new technology is needed to cope with such data. Companies are no longer depends on the traditional tools and techniques to cater and handle data. Not only ending on how to store and process the data, they also wanted to gain insight of the data to optimize business process and gain a larger profit. To satisfy these requirements, a good analytic method must be applied to big data in order to extract value and knowledge from these data sets. While computer engineers are working on that part, this valuable data is also being eyed somewhere else. New attacks and attempts to taint the security, privacy, and integrity of the data are being developed somewhere without we knowing. This paper aims to analyze different analytics methods and tools, which can be applied in big data environment, in actionable time while at the same time extract evidence of intrusion in order for the results to be presented in a court of law fitting a digital forensic process.

Original languageEnglish
Title of host publication2018 International Conference on Smart Computing and Electronic Enterprise, ICSCEE 2018
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781538648360
DOIs
Publication statusPublished - 15 Nov 2018
Event2018 International Conference on Smart Computing and Electronic Enterprise, ICSCEE 2018 - Shah Alam, Malaysia
Duration: 11 Jul 201812 Jul 2018

Publication series

Name2018 International Conference on Smart Computing and Electronic Enterprise, ICSCEE 2018

Other

Other2018 International Conference on Smart Computing and Electronic Enterprise, ICSCEE 2018
CountryMalaysia
CityShah Alam
Period11/07/1812/07/18

Fingerprint

evidence
Industry
Profitability
Engineers
Big data
privacy
integrity
engineer
new technology
profit
Digital forensics
Law
Values

All Science Journal Classification (ASJC) codes

  • Signal Processing
  • Social Sciences (miscellaneous)
  • Education
  • Artificial Intelligence
  • Computer Networks and Communications
  • Computer Science Applications

Cite this

Mokhtar, S. H., Muruti, G., Ibrahim, Z. A., Abdul Rahim, F., & Kasim, H. (2018). A Review of Evidence Extraction Techniques in Big Data Environment. In 2018 International Conference on Smart Computing and Electronic Enterprise, ICSCEE 2018 [8538437] (2018 International Conference on Smart Computing and Electronic Enterprise, ICSCEE 2018). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ICSCEE.2018.8538437
Mokhtar, Siti Hawa ; Muruti, Gopinath ; Ibrahim, Zul Azri ; Abdul Rahim, Fiza ; Kasim, Hairoladenan. / A Review of Evidence Extraction Techniques in Big Data Environment. 2018 International Conference on Smart Computing and Electronic Enterprise, ICSCEE 2018. Institute of Electrical and Electronics Engineers Inc., 2018. (2018 International Conference on Smart Computing and Electronic Enterprise, ICSCEE 2018).
@inproceedings{cd15d9c17d2f494bbb69bdacc212ad86,
title = "A Review of Evidence Extraction Techniques in Big Data Environment",
abstract = "Today, information era where data is being generated at high in volume, variety, and velocity, a new technology is needed to cope with such data. Companies are no longer depends on the traditional tools and techniques to cater and handle data. Not only ending on how to store and process the data, they also wanted to gain insight of the data to optimize business process and gain a larger profit. To satisfy these requirements, a good analytic method must be applied to big data in order to extract value and knowledge from these data sets. While computer engineers are working on that part, this valuable data is also being eyed somewhere else. New attacks and attempts to taint the security, privacy, and integrity of the data are being developed somewhere without we knowing. This paper aims to analyze different analytics methods and tools, which can be applied in big data environment, in actionable time while at the same time extract evidence of intrusion in order for the results to be presented in a court of law fitting a digital forensic process.",
author = "Mokhtar, {Siti Hawa} and Gopinath Muruti and Ibrahim, {Zul Azri} and {Abdul Rahim}, Fiza and Hairoladenan Kasim",
year = "2018",
month = "11",
day = "15",
doi = "10.1109/ICSCEE.2018.8538437",
language = "English",
series = "2018 International Conference on Smart Computing and Electronic Enterprise, ICSCEE 2018",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
booktitle = "2018 International Conference on Smart Computing and Electronic Enterprise, ICSCEE 2018",
address = "United States",

}

Mokhtar, SH, Muruti, G, Ibrahim, ZA, Abdul Rahim, F & Kasim, H 2018, A Review of Evidence Extraction Techniques in Big Data Environment. in 2018 International Conference on Smart Computing and Electronic Enterprise, ICSCEE 2018., 8538437, 2018 International Conference on Smart Computing and Electronic Enterprise, ICSCEE 2018, Institute of Electrical and Electronics Engineers Inc., 2018 International Conference on Smart Computing and Electronic Enterprise, ICSCEE 2018, Shah Alam, Malaysia, 11/07/18. https://doi.org/10.1109/ICSCEE.2018.8538437

A Review of Evidence Extraction Techniques in Big Data Environment. / Mokhtar, Siti Hawa; Muruti, Gopinath; Ibrahim, Zul Azri; Abdul Rahim, Fiza; Kasim, Hairoladenan.

2018 International Conference on Smart Computing and Electronic Enterprise, ICSCEE 2018. Institute of Electrical and Electronics Engineers Inc., 2018. 8538437 (2018 International Conference on Smart Computing and Electronic Enterprise, ICSCEE 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - A Review of Evidence Extraction Techniques in Big Data Environment

AU - Mokhtar, Siti Hawa

AU - Muruti, Gopinath

AU - Ibrahim, Zul Azri

AU - Abdul Rahim, Fiza

AU - Kasim, Hairoladenan

PY - 2018/11/15

Y1 - 2018/11/15

N2 - Today, information era where data is being generated at high in volume, variety, and velocity, a new technology is needed to cope with such data. Companies are no longer depends on the traditional tools and techniques to cater and handle data. Not only ending on how to store and process the data, they also wanted to gain insight of the data to optimize business process and gain a larger profit. To satisfy these requirements, a good analytic method must be applied to big data in order to extract value and knowledge from these data sets. While computer engineers are working on that part, this valuable data is also being eyed somewhere else. New attacks and attempts to taint the security, privacy, and integrity of the data are being developed somewhere without we knowing. This paper aims to analyze different analytics methods and tools, which can be applied in big data environment, in actionable time while at the same time extract evidence of intrusion in order for the results to be presented in a court of law fitting a digital forensic process.

AB - Today, information era where data is being generated at high in volume, variety, and velocity, a new technology is needed to cope with such data. Companies are no longer depends on the traditional tools and techniques to cater and handle data. Not only ending on how to store and process the data, they also wanted to gain insight of the data to optimize business process and gain a larger profit. To satisfy these requirements, a good analytic method must be applied to big data in order to extract value and knowledge from these data sets. While computer engineers are working on that part, this valuable data is also being eyed somewhere else. New attacks and attempts to taint the security, privacy, and integrity of the data are being developed somewhere without we knowing. This paper aims to analyze different analytics methods and tools, which can be applied in big data environment, in actionable time while at the same time extract evidence of intrusion in order for the results to be presented in a court of law fitting a digital forensic process.

UR - http://www.scopus.com/inward/record.url?scp=85059384362&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85059384362&partnerID=8YFLogxK

U2 - 10.1109/ICSCEE.2018.8538437

DO - 10.1109/ICSCEE.2018.8538437

M3 - Conference contribution

AN - SCOPUS:85059384362

T3 - 2018 International Conference on Smart Computing and Electronic Enterprise, ICSCEE 2018

BT - 2018 International Conference on Smart Computing and Electronic Enterprise, ICSCEE 2018

PB - Institute of Electrical and Electronics Engineers Inc.

ER -

Mokhtar SH, Muruti G, Ibrahim ZA, Abdul Rahim F, Kasim H. A Review of Evidence Extraction Techniques in Big Data Environment. In 2018 International Conference on Smart Computing and Electronic Enterprise, ICSCEE 2018. Institute of Electrical and Electronics Engineers Inc. 2018. 8538437. (2018 International Conference on Smart Computing and Electronic Enterprise, ICSCEE 2018). https://doi.org/10.1109/ICSCEE.2018.8538437