Title :
A Complexity Based Forensic Analysis of the Trojan Horse Defence
Author :
Overill, Richard E. ; Silomon, Jantje A M
Author_Institution :
Dept. of Inf., King´´s Coll. London, London, UK
Abstract :
The Operational Complexity Model (OCM) has been used to derive the complexities of the five most prevalent cyber-crimes occurring in southeast Asia, namely peer-to-peer (P2P) multimedia piracy, online auction fraud, online storage of offensive material, theft of online game weapons, and distributed denial of service (DDoS) attacks. In each case the complexity of the simplest Trojan horse process that might be invoked as an alternative explanation for the recovered digital evidence is also determined using the OCM, and the results are used to assess the relative plausibility of the two competing explanations in each case. Finally, the forensically determined circumstances under which a Trojan horse defence is most likely to be successful are outlined.
Keywords :
computational complexity; invasive software; Trojan horse defence; complexity based forensic analysis; cybercrime; digital evidence; distributed denial-of-service attack; online auction fraud; online game weapon theft; online offensive material storage; operational complexity model; peer-to-peer multimedia piracy; Complexity theory; Computers; Forensics; Games; IP networks; Trojan horses; Weapons; Trojan horse defence; alternative hypotheses; digital forensics; operational complexity model; posterior odds; relative plausibility metrics;
Conference_Titel :
Availability, Reliability and Security (ARES), 2011 Sixth International Conference on
Conference_Location :
Vienna
Print_ISBN :
978-1-4577-0979-1
Electronic_ISBN :
978-0-7695-4485-4
DOI :
10.1109/ARES.2011.120