Digital Forensic Process in Cyber Crime Data Mining
Jagadeesha G.M1, Kotrappa Sirbi2, Veeragangadhara Swamy.T.M3

1Jagadeesha.G.M, Rao Bahadur Mahabeshwarappa Engineering College, Visvesvaraya Technological University, Belagavi, Karnataka.

2Kotrappa.Sirbi, Sheshgiri College of Engineering, Visvesvaraya Technological University, Belagavi, Karnataka.

3Veeragangadhara Swamy T.M, Rao Bahadur Mahabeshwarappa Engineering College, Visvesvaraya Technological University, Belagavi, Karnataka.

Manuscript received on 04 April 2019 | Revised Manuscript received on 11 April 2019 | Manuscript Published on 26 April 2019 | PP: 365-369 | Volume-8 Issue-6S April 2019 | Retrieval Number: F61320486S19/19©BEIESP

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: With enormous developments in communication and information technology, the rate of crimes increasing exponentially using technology. Data Scientists are in very much need of addressing the security issues with cyber-crime. The crimes will be committed with the help of digital devices, Data Scientists need to follow some actual outlines and methodologies to mend the raw information for investigation will be used as important evidences. In this paper ,Crimes at cyber operations will be dealt with forensic investigation, phases at Storage media, analysis of Unseen evidence at file organization, investigation methods for Network, investigation Methods for Memory & data mining for Cyber Forensic. Mining Algorithm Apriori is used to find the cyber-attack pattern and also system uses the tools like Winpcap, jpcap for background process. Integrating all the techniques discussed above will be used to predict the cyber-attack suspect.

Keywords: Cyber Crime, Data Mining, Data Science, Digital Forensic, Network Investigation.
Scope of the Article: Communication