skip to main content
10.1145/2047456.2047466acmotherconferencesArticle/Chapter ViewAbstractPublication PagesinfoseccdConference Proceedingsconference-collections
research-article

Undergraduate research in computer forensics

Published:30 September 2011Publication History

ABSTRACT

We describe a research program in cybercrime and computer forensics which relies heavily on research by undergraduates. The goals of this program are to complete projects as defined by clients, but also to allow students to experience the frustrations and enjoyment of solving real-world problems. Furthermore, this experiential approach builds a rich educational environment for students where they must "work for a boss" (faculty member) and with "coworkers" (other students) in a group effort. Overall, students have found the experiences to be beneficial, and we typically have more applicants for the positions than are possible to fill. We describe three of the actual projects used and illustrate our lessons learned.

References

  1. National Science Foundation, "Research Experiences for Undergraduates". Retrieved on 7 June 2011 from www.nsf.gov/pubs/2009/nsf09598/nsf09598.pdfGoogle ScholarGoogle Scholar
  2. National Science Foundation. "Human Resources". Retrieved on 7 June 2011 from www.nsf.gov/pubs/2008/nsf08011/nsf08011_5.pdfGoogle ScholarGoogle Scholar
  3. "Pennsylvania State System of Higher Education". Retrieved on 7 June 2011 from www.passhe.eduGoogle ScholarGoogle Scholar
  4. US National Security Agency. "National Centers for Academic Excellence in Information Assurance Education". Retrieved on 7 June 2011 from www.nsa.gov/ia/academic_outreach/nat_cae/Google ScholarGoogle Scholar
  5. Michael W. Berry and Murray Browne, "Email Surveillance Using Nonnegative Matrix Factorization," Computational & Mathematical Organization Theory, Volume 11, Issue 3 (October 2005). Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. The Porter Stemming Algorithm. Retrieved on 29 June 2011 from http://tartarus.org/~martin/PorterStemmer/.Google ScholarGoogle Scholar
  7. Alberto Pascual-Montano, J. M. Carazo, Kieko Kochi, Dietrich Lehmann, and Roberto D. Pascual-Marqui, "Nonsmooth Nonnegative Matrix Factorization (nsNMF)," IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 28, No. 3, March 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Daniel D. Lee and H. Sebastian Seung, "Learning the parts of objects by non-negative matrix factorization," Nature, Vol. 401, pp. 788--791, October 1999, Stefan Katzenbeisser and Fabien A. P. Petitcolas. Information Hiding Techniques for Steganography and Digital Watermarking. Artech House. Norwood, MA. 2000.Google ScholarGoogle Scholar
  9. Apache Subversion. Retrieved on 29 June 2011 from http://subversion.apache.org/.Google ScholarGoogle Scholar
  10. TortoiseSVN. Retrieved on 29 June 2011 from http://tortoisesvn.tigris.org/.Google ScholarGoogle Scholar
  11. Stefan Katzenbeisser and Fabien A. P. Petitcolas. Information Hiding Techniques for Steganography and Digital Watermarking. Artech House. Norwood, MA. 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. David Kahn. The Code Breakers. Scribner. New York, NY. 1967.Google ScholarGoogle Scholar
  13. Bin Li, et al. "A Survey on Image Steganography and Steganalysis." Journal of Information Hiding and Multimedia Signal Processing. Volume. 2, Number. 2. Ubiquitous International. April, 2011.Google ScholarGoogle Scholar
  14. Changyong Xu and Xijian Ping. "A Steganographic Algorithm in Uncompressed Video Sequence Based on Difference between Adjacent Frames." In Proceedings of the Fourth International Conference on Image and Graphics (ICIG '07). IEEE Computer Society, Washington, DC. 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. K. Kancherla and S. Mukkamala. "Video Steganalysis Using Motion Estimation." In Proceedings of the 2009 international joint conference on Neural Networks (IJCNN'09). IEEE Press. Piscataway. 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. "FFmpeg." Retrieved on 24 June 2011 from http://www.ffmpeg.org/Google ScholarGoogle Scholar
  17. Brandeis University. "The Benefits of Experiential Learning." Retrieved on 29 June 2011 from http://www.brandeis.edu/experientiallearning/forfaculty/benefits.htmlGoogle ScholarGoogle Scholar

Index Terms

  1. Undergraduate research in computer forensics

    Recommendations

    Reviews

    Xiaohong Yuan

    Providing research experiences to undergraduate students is important for improving student interest and retention. It allows students to develop the ability to apply what they learn in the classroom to real-life situations and to develop problem-solving abilities. The authors of this paper describe their experiences of involving undergraduate students in three projects related to computer forensics. These projects represent a client-driven project, a research-based project, and something in between. Based on the lessons learned from their experiences, the authors provide valuable suggestions on how to successfully provide research experiences to undergraduate students, which is beneficial to other instructors interested in involving undergraduate students in research. However, how to assess the undergraduate research program is not described clearly in the paper. Online Computing Reviews Service

    Access critical reviews of Computing literature here

    Become a reviewer for Computing Reviews.

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      InfoSecCD '11: Proceedings of the 2011 Information Security Curriculum Development Conference
      September 2011
      111 pages
      ISBN:9781450308120
      DOI:10.1145/2047456

      Copyright © 2011 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 30 September 2011

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate18of23submissions,78%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader