Department of Informatics

Slides:



Advertisements
Similar presentations
Request Dispatching for Cheap Energy Prices in Cloud Data Centers
Advertisements

SpringerLink Training Kit
Luminosity measurements at Hadron Colliders
From Word Embeddings To Document Distances
Choosing a Dental Plan Student Name
Virtual Environments and Computer Graphics
Chương 1: CÁC PHƯƠNG THỨC GIAO DỊCH TRÊN THỊ TRƯỜNG THẾ GIỚI
THỰC TIỄN KINH DOANH TRONG CỘNG ĐỒNG KINH TẾ ASEAN –
D. Phát triển thương hiệu
NHỮNG VẤN ĐỀ NỔI BẬT CỦA NỀN KINH TẾ VIỆT NAM GIAI ĐOẠN
Điều trị chống huyết khối trong tai biến mạch máu não
BÖnh Parkinson PGS.TS.BS NGUYỄN TRỌNG HƯNG BỆNH VIỆN LÃO KHOA TRUNG ƯƠNG TRƯỜNG ĐẠI HỌC Y HÀ NỘI Bác Ninh 2013.
Nasal Cannula X particulate mask
Evolving Architecture for Beyond the Standard Model
HF NOISE FILTERS PERFORMANCE
Electronics for Pedestrians – Passive Components –
Parameterization of Tabulated BRDFs Ian Mallett (me), Cem Yuksel
L-Systems and Affine Transformations
CMSC423: Bioinformatic Algorithms, Databases and Tools
Some aspect concerning the LMDZ dynamical core and its use
Bayesian Confidence Limits and Intervals
实习总结 (Internship Summary)
Current State of Japanese Economy under Negative Interest Rate and Proposed Remedies Naoyuki Yoshino Dean Asian Development Bank Institute Professor Emeritus,
Front End Electronics for SOI Monolithic Pixel Sensor
Face Recognition Monday, February 1, 2016.
Solving Rubik's Cube By: Etai Nativ.
CS284 Paper Presentation Arpad Kovacs
انتقال حرارت 2 خانم خسرویار.
Summer Student Program First results
Theoretical Results on Neutrinos
HERMESでのHard Exclusive生成過程による 核子内クォーク全角運動量についての研究
Wavelet Coherence & Cross-Wavelet Transform
yaSpMV: Yet Another SpMV Framework on GPUs
Creating Synthetic Microdata for Higher Educational Use in Japan: Reproduction of Distribution Type based on the Descriptive Statistics Kiyomi Shirakawa.
MOCLA02 Design of a Compact L-­band Transverse Deflecting Cavity with Arbitrary Polarizations for the SACLA Injector Sep. 14th, 2015 H. Maesaka, T. Asaka,
Hui Wang†*, Canturk Isci‡, Lavanya Subramanian*,
Fuel cell development program for electric vehicle
Overview of TST-2 Experiment
Optomechanics with atoms
داده کاوی سئوالات نمونه
Inter-system biases estimation in multi-GNSS relative positioning with GPS and Galileo Cecile Deprez and Rene Warnant University of Liege, Belgium  
ლექცია 4 - ფული და ინფლაცია
10. predavanje Novac i financijski sustav
Wissenschaftliche Aussprache zur Dissertation
FLUORECENCE MICROSCOPY SUPERRESOLUTION BLINK MICROSCOPY ON THE BASIS OF ENGINEERED DARK STATES* *Christian Steinhauer, Carsten Forthmann, Jan Vogelsang,
Particle acceleration during the gamma-ray flares of the Crab Nebular
Interpretations of the Derivative Gottfried Wilhelm Leibniz
Advisor: Chiuyuan Chen Student: Shao-Chun Lin
Widow Rockfish Assessment
SiW-ECAL Beam Test 2015 Kick-Off meeting
On Robust Neighbor Discovery in Mobile Wireless Networks
Chapter 6 并发:死锁和饥饿 Operating Systems: Internals and Design Principles
You NEED your book!!! Frequency Distribution
Y V =0 a V =V0 x b b V =0 z
Fairness-oriented Scheduling Support for Multicore Systems
Climate-Energy-Policy Interaction
Hui Wang†*, Canturk Isci‡, Lavanya Subramanian*,
Ch48 Statistics by Chtan FYHSKulai
The ABCD matrix for parabolic reflectors and its application to astigmatism free four-mirror cavities.
Measure Twice and Cut Once: Robust Dynamic Voltage Scaling for FPGAs
Online Learning: An Introduction
Factor Based Index of Systemic Stress (FISS)
What is Chemistry? Chemistry is: the study of matter & the changes it undergoes Composition Structure Properties Energy changes.
THE BERRY PHASE OF A BOGOLIUBOV QUASIPARTICLE IN AN ABRIKOSOV VORTEX*
Quantum-classical transition in optical twin beams and experimental applications to quantum metrology Ivano Ruo-Berchera Frascati.
The Toroidal Sporadic Source: Understanding Temporal Variations
FW 3.4: More Circle Practice
ارائه یک روش حل مبتنی بر استراتژی های تکاملی گروه بندی برای حل مسئله بسته بندی اقلام در ظروف
Decision Procedures Christoph M. Wintersteiger 9/11/2017 3:14 PM
Limits on Anomalous WWγ and WWZ Couplings from DØ
Presentation transcript:

Department of Informatics Using Bayesian Networks to Quantify Digital Forensic Evidence and Hypotheses Richard E Overill Department of Informatics King’s College London richard.overill@kcl.ac.uk

Abstract In what appears to be an increasingly litigious world, courts, legal officials and law enforcement officers in a number of adversarial legal jurisdictions have begun to look for quantitative indications of (i) the probative value (or weight) of individual items of digital evidence connected with a case; and (ii) the relative plausibility of competing hypotheses (or narratives) purporting to explain how the recovered items of digital evidence (traces) were created.  We review the contributions that Bayesian Networks (BNs) are capable of making to the understanding, analysis and evaluation of crimes whose primary items of evidence are digital artefacts, and show how as a consequence they may help to fulfil both of the two above desiderata. 

Acknowledgements Work carried out in collaboration with the Computer Forensics Research Group at the University of Hong Kong, the Hong Kong Police Force Cyber Security & Technology Crime Bureau, and the Hong Kong Customs & Excise Department’s IPR Protection team

Relative Plausibility Likelihood Ratio(LR)= Pr⁡(𝐸|𝐻) Pr⁡(𝐸| 𝐻 ) ≈ Pr⁡(𝐸| 𝐻 𝑝 ) Pr⁡(𝐸| 𝐻 𝑑 ) provided that 𝐻 𝑝 & 𝐻 𝑑 together cover the hypothesis space Build and run Bayesian networks for 𝐻 𝑝 & 𝐻 𝑑 Case Study: HK Online Auction Fraud Conditional Probability Table (CPT) values were elicited from a panel of experienced DF experts; sensitivity analyses were performed

Online Auction Fraud LR

Probative Value Run the Bayesian network twice; once with all items of evidence in place, and once with evidential trace 𝐸 𝑖 removed. The difference in the posterior outputs of the BN is a measure of the probative value of 𝐸 𝑖 Case study: HK illicit P2P uploading of copyright protected material with BitTorrent CPT values were elicited from a panel of experienced DF experts; sensitivity analyses were performed

BitTorrent probative values Results ranked in decreasing order: 𝐸 18 > 𝐸 13 > 𝐸 3 > 𝐸 1 = 𝐸 2 > …. So a cost-effective triage schema would start by attempting to recover 𝐸 18 , then 𝐸 13 , then 𝐸 3 , then 𝐸 1 and 𝐸 2 , etc.

Cost-effective Triage - I Once measures of probative value are known, a cost-effective triage schema can be devised: Rank the expected evidential traces 𝐸 𝑖 in decreasing order of probative value. For traces of equal probative value, sub-rank them in increasing order of cost-benefit ratio where: 𝐶𝐵𝑅= 𝑖𝑛𝑣𝑒𝑠𝑡𝑖𝑔𝑎𝑡𝑜𝑟+𝑒𝑞𝑢𝑖𝑝𝑚𝑒𝑛𝑡 𝑐𝑜𝑠𝑡𝑠 𝑝𝑟𝑜𝑏𝑎𝑡𝑖𝑣𝑒 𝑣𝑎𝑙𝑢𝑒

Cost-effective Triage - II Traces of high probative value are recovered early on. Missing high probative value traces may cause the investigation to be de-prioritised. Traces of low probative value are recovered later. Low probative value traces with a high CBR may be excluded from the investigation.

Summary The application of Bayesian networks to the investigation of commonly occurring digital crimes in HK has permitted two developments: Investigators and prosecution / defence officials can obtain a quantitative measure of the plausibility of their and their opponent’s case Investigators can adopt a cost-effective triage schema which aims to recover ‘low-hanging fruit’ early on and allows for de-prioritisation.

Thank you! Questions or comments?