Using Convolutional Neural Networks to Detect Compression Algorithms

11/17/2021
by   Shubham Bharadwaj, et al.
0

Machine learning is penetrating various domains virtually, thereby proliferating excellent results. It has also found an outlet in digital forensics, wherein it is becoming the prime driver of computational efficiency. A prominent feature that exhibits the effectiveness of ML algorithms is feature extraction that can be instrumental in the applications for digital forensics. Convolutional Neural Networks are further used to identify parts of the file. To this end, we observed that the literature does not include sufficient information about the identification of the algorithms used to compress file fragments. With this research, we attempt to address this gap as compression algorithms are beneficial in generating higher entropy comparatively as they make the data more compact. We used a base dataset, compressed every file with various algorithms, and designed a model based on that. The used model was accurately able to identify files compressed using compress, lzip and bzip2.

READ FULL TEXT
research
07/22/2020

Fragments-Expert: A Graphical User Interface MATLAB Toolbox for Classification of File Fragments

The classification of file fragments of various file formats is an essen...
research
10/15/2020

EnCoD: Distinguishing Compressed and Encrypted File Fragments

Reliable identification of encrypted file fragments is a requirement for...
research
05/01/2023

File Fragment Classification using Light-Weight Convolutional Neural Networks

In digital forensics, file fragment classification is an important step ...
research
02/25/2021

File fragment recognition based on content and statistical features

Nowadays, the speed up development and use of digital devices such as sm...
research
09/11/2020

MRZ code extraction from visa and passport documents using convolutional neural networks

Detecting and extracting information from Machine-Readable Zone (MRZ) on...
research
04/13/2022

A Natural Language Processing Approach for Instruction Set Architecture Identification

Binary analysis of software is a critical step in cyber forensics applic...
research
09/23/2021

Text Ranking and Classification using Data Compression

A well-known but rarely used approach to text categorization uses condit...

Please sign up or login with your details

Forgot password? Click here to reset