Abstract
Bayesian belief network models designed for specific cyber crimes can be used to quickly collect and identify suspicious data that warrants further investigation. While Bayesian belief models tailored to individual cases exist, there has been no consideration of generalized case modeling. This paper examines the generalizability of two case-specific Bayesian belief networks for use in similar cases. Although the results are not conclusive, the changes in the degrees of belief support the hypothesis that generic Bayesian network models can enhance investigations of similar cyber crimes.
Chapter PDF
Similar content being viewed by others
References
Automated Reasoning Group, SamIam, University of California at Los Angeles, Los Angeles, California ( reasoning.cs.ucla.edu/samiam ), 2010.
R. Blincoe, Police sitting on forensic backlog risk, says top e-cop, The Register ( www.theregister.co.uk/2009/11/13/police_forensics_tool ), November 13, 2009.
F. Cohen, Two models of digital forensic examination, Proceedings of the Fourth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, pp. 42–53, 2009.
District Court of the Hong Kong Special Administrative Region, HKSAR against Man-Fai Tse, Criminal Case No. 1318 of 2011, Hong Kong, China, 2012.
L. Gomez, Triage in-Lab: Case backlog reduction with forensic digital profiling, Proceedings of the Argentine Conference on Informatics and Argentine Symposium on Computing and Law, pp. 217–225, 2012.
D. Heckerman, A Tutorial on Learning with Bayesian Networks, Technical Report MSR-TR-95-06, Microsoft Research, Advanced Technology Division, Microsoft, Redmond, Washington, 1996.
M. Kwan, K. Chow, F. Law and P. Lai, Reasoning about evidence using Bayesian networks, in Advances in Digital Forensics IV, I. Ray and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 275–289, 2008.
R. Neapolitan, Learning Bayesian Networks, Prentice-Hall, Upper Saddle River, New Jersey, 2003.
R. Overill, M. Kwan, K. Chow, P. Lai and F. Law, A cost-effective model for digital forensic investigations, in Advances in Digital Forensics V, G. Peterson and S. Shenoi (Eds.), Springer, Heidelberg, Germany, pp. 231–240, 2009.
R. Overill and J. Silomon, Digital meta-forensics: Quantifying the investigation, Proceedings of the Fourth International Conference on Cybercrime Forensics Education and Training, 2010.
J. Pearl, Probabilistic Reasoning in Intelligent Systems, Morgan Kaufmann, San Francisco, California, 1997.
M. Rogers, J. Goldman, R. Mislan, T. Wedge and S. Debrota, Computer Forensics Field Triage Process Model, Journal of Digital Forensics, Security and Law, vol. 1(2), pp. 19–37, 2006.
R. Sullivan and H. Delaney, Criminal investigations – A decision-making process, Journal of Police Science and Administration, vol. 10(3), pp. 335–343, 1982.
H. Tse, K. Chow and M. Kwan, Reasoning about evidence using Bayesian networks, in Advances in Digital Forensics VIII, G. Peterson and S. Shenoi (Eds.), Springer, Heidelberg, Germany, pp. 99–113, 2012.
Tuen Mun Magistrates Court of the Hong Kong Special Administrative Region, HKSAR against Nai-Ming Chan, Criminal Case No. 1268 of 2005, Hong Kong, China, 2005.
Y. Xiang and Z. Li, An analytical model for DDoS attacks and defense, Proceedings of the International Multi-Conference on Computing in the Global Information Technology, p. 66, 2006.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 IFIP International Federation for Information Processing
About this paper
Cite this paper
Tse, H., Chow, KP., Kwan, M. (2013). A Generic Bayesian Belief Model for Similar Cyber Crimes. In: Peterson, G., Shenoi, S. (eds) Advances in Digital Forensics IX. DigitalForensics 2013. IFIP Advances in Information and Communication Technology, vol 410. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-41148-9_17
Download citation
DOI: https://doi.org/10.1007/978-3-642-41148-9_17
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-41147-2
Online ISBN: 978-3-642-41148-9
eBook Packages: Computer ScienceComputer Science (R0)