Automated user analysis with user input log

Jae Min Kim, Sung Woo Jung

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Many studies are on progress in the field of digital forensics. However, most analysis methods lack from complexity as the size of data to be investigated enlarges. Thus, automated ways of analyzing the data is required to reduce the work done by the analysts. In our study, we propose an automated user analysis method that works based on the user input log. From the automated analysis, we provide priority on the further user classification, which helps reduce the total number of potential user to 21% of the total users, even in the worst case. In average cases, the exact matching user is found within the 10.5% highest priority users. By combining our proposed method with other existing methods, it would be possible to further reduce the complexity of jobs need to be done by the analysts.

Original languageEnglish
Title of host publicationAdvances in Intelligent and Soft Computing
Pages355-360
Number of pages6
Volume144 AISC
EditionVOL. 1
DOIs
Publication statusPublished - 2012 Jun 29
Event2011 2nd International Congress on Computer Applications and Computational Science, CACS 2011 - Bali, Indonesia
Duration: 2011 Nov 152011 Nov 17

Publication series

NameAdvances in Intelligent and Soft Computing
NumberVOL. 1
Volume144 AISC
ISSN (Print)18675662

Other

Other2011 2nd International Congress on Computer Applications and Computational Science, CACS 2011
CountryIndonesia
CityBali
Period11/11/1511/11/17

Fingerprint

Digital forensics

ASJC Scopus subject areas

  • Computer Science(all)

Cite this

Kim, J. M., & Jung, S. W. (2012). Automated user analysis with user input log. In Advances in Intelligent and Soft Computing (VOL. 1 ed., Vol. 144 AISC, pp. 355-360). (Advances in Intelligent and Soft Computing; Vol. 144 AISC, No. VOL. 1). https://doi.org/10.1007/978-3-642-28314-7_48

Automated user analysis with user input log. / Kim, Jae Min; Jung, Sung Woo.

Advances in Intelligent and Soft Computing. Vol. 144 AISC VOL. 1. ed. 2012. p. 355-360 (Advances in Intelligent and Soft Computing; Vol. 144 AISC, No. VOL. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Kim, JM & Jung, SW 2012, Automated user analysis with user input log. in Advances in Intelligent and Soft Computing. VOL. 1 edn, vol. 144 AISC, Advances in Intelligent and Soft Computing, no. VOL. 1, vol. 144 AISC, pp. 355-360, 2011 2nd International Congress on Computer Applications and Computational Science, CACS 2011, Bali, Indonesia, 11/11/15. https://doi.org/10.1007/978-3-642-28314-7_48
Kim JM, Jung SW. Automated user analysis with user input log. In Advances in Intelligent and Soft Computing. VOL. 1 ed. Vol. 144 AISC. 2012. p. 355-360. (Advances in Intelligent and Soft Computing; VOL. 1). https://doi.org/10.1007/978-3-642-28314-7_48
Kim, Jae Min ; Jung, Sung Woo. / Automated user analysis with user input log. Advances in Intelligent and Soft Computing. Vol. 144 AISC VOL. 1. ed. 2012. pp. 355-360 (Advances in Intelligent and Soft Computing; VOL. 1).
@inproceedings{48543feeb857406d9256a452ee0bc8f4,
title = "Automated user analysis with user input log",
abstract = "Many studies are on progress in the field of digital forensics. However, most analysis methods lack from complexity as the size of data to be investigated enlarges. Thus, automated ways of analyzing the data is required to reduce the work done by the analysts. In our study, we propose an automated user analysis method that works based on the user input log. From the automated analysis, we provide priority on the further user classification, which helps reduce the total number of potential user to 21{\%} of the total users, even in the worst case. In average cases, the exact matching user is found within the 10.5{\%} highest priority users. By combining our proposed method with other existing methods, it would be possible to further reduce the complexity of jobs need to be done by the analysts.",
author = "Kim, {Jae Min} and Jung, {Sung Woo}",
year = "2012",
month = "6",
day = "29",
doi = "10.1007/978-3-642-28314-7_48",
language = "English",
isbn = "9783642283130",
volume = "144 AISC",
series = "Advances in Intelligent and Soft Computing",
number = "VOL. 1",
pages = "355--360",
booktitle = "Advances in Intelligent and Soft Computing",
edition = "VOL. 1",

}

TY - GEN

T1 - Automated user analysis with user input log

AU - Kim, Jae Min

AU - Jung, Sung Woo

PY - 2012/6/29

Y1 - 2012/6/29

N2 - Many studies are on progress in the field of digital forensics. However, most analysis methods lack from complexity as the size of data to be investigated enlarges. Thus, automated ways of analyzing the data is required to reduce the work done by the analysts. In our study, we propose an automated user analysis method that works based on the user input log. From the automated analysis, we provide priority on the further user classification, which helps reduce the total number of potential user to 21% of the total users, even in the worst case. In average cases, the exact matching user is found within the 10.5% highest priority users. By combining our proposed method with other existing methods, it would be possible to further reduce the complexity of jobs need to be done by the analysts.

AB - Many studies are on progress in the field of digital forensics. However, most analysis methods lack from complexity as the size of data to be investigated enlarges. Thus, automated ways of analyzing the data is required to reduce the work done by the analysts. In our study, we propose an automated user analysis method that works based on the user input log. From the automated analysis, we provide priority on the further user classification, which helps reduce the total number of potential user to 21% of the total users, even in the worst case. In average cases, the exact matching user is found within the 10.5% highest priority users. By combining our proposed method with other existing methods, it would be possible to further reduce the complexity of jobs need to be done by the analysts.

UR - http://www.scopus.com/inward/record.url?scp=84862728291&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84862728291&partnerID=8YFLogxK

U2 - 10.1007/978-3-642-28314-7_48

DO - 10.1007/978-3-642-28314-7_48

M3 - Conference contribution

AN - SCOPUS:84862728291

SN - 9783642283130

VL - 144 AISC

T3 - Advances in Intelligent and Soft Computing

SP - 355

EP - 360

BT - Advances in Intelligent and Soft Computing

ER -