SIFT: Sifting file types—application of explainable artificial intelligence in cyber forensics.
Uloženo v:
| Název: | SIFT: Sifting file types—application of explainable artificial intelligence in cyber forensics. |
|---|---|
| Autoři: | Alam, Shahid, Demir, Alper Kamil |
| Zdroj: | Cybersecurity (2523-3246); 9/11/2024, Vol. 7 Issue 1, p1-23, 23p |
| Témata: | DIGITAL forensics, FORENSIC sciences, ARTIFICIAL intelligence, CYBER intelligence (Computer security), DEEP learning |
| Abstrakt: | Artificial Intelligence (AI) is being applied to improve the efficiency of software systems used in various domains, especially in the health and forensic sciences. Explainable AI (XAI) is one of the fields of AI that interprets and explains the methods used in AI. One of the techniques used in XAI to provide such interpretations is by computing the relevance of the input features to the output of an AI model. File fragment classification is one of the vital issues of file carving in Cyber Forensics (CF) and becomes challenging when the filesystem metadata is missing. Other major challenges it faces are: proliferation of file formats, file embeddings, automation, We leverage and utilize interpretations provided by XAI to optimize the classification of file fragments and propose a novel sifting approach, named SIFT (Sifting File Types). SIFT employs TF-IDF to assign weight to a byte (feature), which is used to select features from a file fragment. Threshold-based LIME and SHAP (the two XAI techniques) feature relevance values are computed for the selected features to optimize file fragment classification. To improve multinomial classification, a Multilayer Perceptron model is developed and optimized with five hidden layers, each layer with i × n neurons, where i = the layer number and n = the total number of classes in the dataset. When tested with 47,482 samples of 20 file types (classes), SIFT achieves a detection rate of 82.1% and outperforms the other state-of-the-art techniques by at least 10%. To the best of our knowledge, this is the first effort of applying XAI in CF for optimizing file fragment classification. [ABSTRACT FROM AUTHOR] |
| Copyright of Cybersecurity (2523-3246) is the property of Springer Nature and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.) | |
| Databáze: | Complementary Index |
| FullText | Text: Availability: 0 CustomLinks: – Url: https://resolver.ebscohost.com/openurl?sid=EBSCO:edb&genre=article&issn=25233246&ISBN=&volume=7&issue=1&date=20240911&spage=1&pages=1-23&title=Cybersecurity (2523-3246)&atitle=SIFT%3A%20Sifting%20file%20types%E2%80%94application%20of%20explainable%20artificial%20intelligence%20in%20cyber%20forensics.&aulast=Alam%2C%20Shahid&id=DOI:10.1186/s42400-024-00241-9 Name: Full Text Finder Category: fullText Text: Full Text Finder Icon: https://imageserver.ebscohost.com/branding/images/FTF.gif MouseOverText: Full Text Finder – Url: https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=EBSCO&SrcAuth=EBSCO&DestApp=WOS&ServiceName=TransferToWoS&DestLinkType=GeneralSearchSummary&Func=Links&author=Alam%20S Name: ISI Category: fullText Text: Nájsť tento článok vo Web of Science Icon: https://imagesrvr.epnet.com/ls/20docs.gif MouseOverText: Nájsť tento článok vo Web of Science |
|---|---|
| Header | DbId: edb DbLabel: Complementary Index An: 179574805 RelevancyScore: 993 AccessLevel: 6 PubType: Academic Journal PubTypeId: academicJournal PreciseRelevancyScore: 993.275451660156 |
| IllustrationInfo | |
| Items | – Name: Title Label: Title Group: Ti Data: SIFT: Sifting file types—application of explainable artificial intelligence in cyber forensics. – Name: Author Label: Authors Group: Au Data: <searchLink fieldCode="AR" term="%22Alam%2C+Shahid%22">Alam, Shahid</searchLink><br /><searchLink fieldCode="AR" term="%22Demir%2C+Alper+Kamil%22">Demir, Alper Kamil</searchLink> – Name: TitleSource Label: Source Group: Src Data: Cybersecurity (2523-3246); 9/11/2024, Vol. 7 Issue 1, p1-23, 23p – Name: Subject Label: Subject Terms Group: Su Data: <searchLink fieldCode="DE" term="%22DIGITAL+forensics%22">DIGITAL forensics</searchLink><br /><searchLink fieldCode="DE" term="%22FORENSIC+sciences%22">FORENSIC sciences</searchLink><br /><searchLink fieldCode="DE" term="%22ARTIFICIAL+intelligence%22">ARTIFICIAL intelligence</searchLink><br /><searchLink fieldCode="DE" term="%22CYBER+intelligence+%28Computer+security%29%22">CYBER intelligence (Computer security)</searchLink><br /><searchLink fieldCode="DE" term="%22DEEP+learning%22">DEEP learning</searchLink> – Name: Abstract Label: Abstract Group: Ab Data: Artificial Intelligence (AI) is being applied to improve the efficiency of software systems used in various domains, especially in the health and forensic sciences. Explainable AI (XAI) is one of the fields of AI that interprets and explains the methods used in AI. One of the techniques used in XAI to provide such interpretations is by computing the relevance of the input features to the output of an AI model. File fragment classification is one of the vital issues of file carving in Cyber Forensics (CF) and becomes challenging when the filesystem metadata is missing. Other major challenges it faces are: proliferation of file formats, file embeddings, automation, We leverage and utilize interpretations provided by XAI to optimize the classification of file fragments and propose a novel sifting approach, named SIFT (Sifting File Types). SIFT employs TF-IDF to assign weight to a byte (feature), which is used to select features from a file fragment. Threshold-based LIME and SHAP (the two XAI techniques) feature relevance values are computed for the selected features to optimize file fragment classification. To improve multinomial classification, a Multilayer Perceptron model is developed and optimized with five hidden layers, each layer with i × n neurons, where i = the layer number and n = the total number of classes in the dataset. When tested with 47,482 samples of 20 file types (classes), SIFT achieves a detection rate of 82.1% and outperforms the other state-of-the-art techniques by at least 10%. To the best of our knowledge, this is the first effort of applying XAI in CF for optimizing file fragment classification. [ABSTRACT FROM AUTHOR] – Name: Abstract Label: Group: Ab Data: <i>Copyright of Cybersecurity (2523-3246) is the property of Springer Nature and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract.</i> (Copyright applies to all Abstracts.) |
| PLink | https://erproxy.cvtisr.sk/sfx/access?url=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edb&AN=179574805 |
| RecordInfo | BibRecord: BibEntity: Identifiers: – Type: doi Value: 10.1186/s42400-024-00241-9 Languages: – Code: eng Text: English PhysicalDescription: Pagination: PageCount: 23 StartPage: 1 Subjects: – SubjectFull: DIGITAL forensics Type: general – SubjectFull: FORENSIC sciences Type: general – SubjectFull: ARTIFICIAL intelligence Type: general – SubjectFull: CYBER intelligence (Computer security) Type: general – SubjectFull: DEEP learning Type: general Titles: – TitleFull: SIFT: Sifting file types—application of explainable artificial intelligence in cyber forensics. Type: main BibRelationships: HasContributorRelationships: – PersonEntity: Name: NameFull: Alam, Shahid – PersonEntity: Name: NameFull: Demir, Alper Kamil IsPartOfRelationships: – BibEntity: Dates: – D: 11 M: 09 Text: 9/11/2024 Type: published Y: 2024 Identifiers: – Type: issn-print Value: 25233246 Numbering: – Type: volume Value: 7 – Type: issue Value: 1 Titles: – TitleFull: Cybersecurity (2523-3246) Type: main |
| ResultId | 1 |
Full Text Finder
Nájsť tento článok vo Web of Science