Wednesday, May 6, 2020

Artificial Intelligence Computer Science, California...

Name: Aleena Davy Net-ID: sw7839 Research: Artificial Intelligence in Computer Forensics Department of Computer Science, California State University East Bay, USA Abstract: Computer Forensics is crucial to solving computer related criminal investigations. The world has evolved a great deal in technology but this has led to the misuse of the resources as well. It is of utmost importance to be able to stop cyber attacks; however it is no easy task as the current forensic tools are not designed to analyze the large amount of data which is the result of the vast use of digital storage and media. This paper is the integration of two research subjects which discusses about the use of Artificial Intelligence in Computer Forensics. It mainly†¦show more content†¦It is true that intelligent agents perform better when compared to humans. This is because they have rational thinking whereas humans have the ‘emotion’ factor associated with them. It is of no big surprise that it can help solve problems efficient and faster where human intelligence fails. In relation to cyber forensics analyzing a large amount of data can be often very tedious an d time consuming and even if that doesn’t matter, there are less chances of finding the exact data by the forensic expert which could result in the breakthrough of the case. Over the generations digital forensics has helped solve many child exploitation cases, server invasion which could result in accessing user’s private and sensitive information. Other types of cyber attacks could be forgery of people’s signature, documents and tampering with file extensions so that files could be hidden or become corrupted. There are many types of cyber attacks, some of them are denial of service attack which interrupts the network and prevents the user from accessing the resource. Another type of attack is probing attack, this type of cyber attack the attacker scans for any loophole in the resource. One other type is remote to local attack. In this type of attack the attacker gets access to a resource and deletes or tampers with the file. Lastly, the remote to local attack. This happens when the attacker hacks into the system and accesses the private

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.