Options
Expediting MRSH-v2 Approximate Matching with Hierarchical Bloom Filter Trees
Author(s)
Date Issued
2018-01-06
Date Available
2023-11-29T10:10:50Z
Abstract
Perhaps the most common task encountered by digital forensic investigators consists of searching through a seized device for pertinent data. Frequently, an investigator will be in possession of a collection of “known-illegal” files (e.g. a collection of child pornographic images) and will seek to find whether copies of these are stored on the seized drive. Traditional hash matching techniques can efficiently find files that precisely match. However, these will fail in the case of merged files, embedded files, partial files, or if a file has been changed in any way. In recent years, approximate matching algorithms have shown significant promise in the detection of files that have a high bytewise similarity. This paper focuses on MRSH-v2. A number of experiments were conducted using Hierarchical Bloom Filter Trees to dramatically reduce the quantity of pairwise comparisons that must be made between known-illegal files and files on the seized disk. The experiments demonstrate substantial speed gains over the original MRSH-v2, while maintaining effectiveness.
Type of Material
Book Chapter
Publisher
Springer
Series
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
216
Copyright (Published Version)
2018 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Language
English
Status of Item
Peer reviewed
Journal
Matoušek, P., Schmiedecker, M. (eds.). Digital Forensics and Cyber Crime. ICDF2C 2017
ISBN
9783319736969
This item is made available under a Creative Commons License
File(s)
Loading...
Name
MRSHv2BloomFilterTrees.pdf
Size
263.63 KB
Format
Adobe PDF
Checksum (MD5)
f5d5a6208e372e578b87d9ed92782dc5
Owning collection