{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,11]],"date-time":"2024-08-11T10:32:13Z","timestamp":1723372333437},"reference-count":35,"publisher":"IGI Global","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,1]]},"abstract":"<jats:p>The big data generated by today Web services makes very fastidious and time-consuming the investigators logs management and analysis tasks.  This is due partly to the lack of an efficient web service dedicated log data representation. We introduce, in this paper, an extensible standard based semantic ontology representation of Web service log data to identify hidden information and extract eventual scenario of Cyber-attacks in the web logs. The proposed ontology supports the Web service specification and it satisfies the forensics and admissibility requirements. Through a friendly graphical user interface, the investigator can define validation rules and queries and execute them using a logical reasoner over the proposed ontology to get some comprehensive forensic report ready to present to the court.  We also showed how the proposed ontology can facilitate the investigator analysis task, reduce required time, and enhance the forensics process comprehensiveness.<\/jats:p>","DOI":"10.4018\/ijwsr.2019010104","type":"journal-article","created":{"date-parts":[[2018,12,21]],"date-time":"2018-12-21T14:23:25Z","timestamp":1545402205000},"page":"70-92","source":"Crossref","is-referenced-by-count":7,"title":["Ontology-Based Smart Sound Digital Forensics Analysis for Web Services"],"prefix":"10.4018","volume":"16","author":[{"given":"Aymen","family":"Akremi","sequence":"first","affiliation":[{"name":"Umm Al-Qura University (UQU), Makkah, Saudi Arabia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mohamed-Foued","family":"Sriti","sequence":"additional","affiliation":[{"name":"Al Imam Mohammad Ibn Saud Islamic University (IMSIU), Riyad, Saudi Arabia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hassen","family":"Sallay","sequence":"additional","affiliation":[{"name":"Umm Al-Qura University (UQU), Makkah, Saudi Arabia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mohsen","family":"Rouached","sequence":"additional","affiliation":[{"name":"Sultan Qaboos University (SQU), Muscat, Oman"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"2432","reference":[{"key":"IJWSR.2019010104-0","doi-asserted-by":"crossref","unstructured":"Aeri, L. (2016). Intelligent Digital Forensic Analysis Method for Cyber Crime Investigation. International Journal of Police and Policing, 1, 8-13.","DOI":"10.22471\/police.2016.1.2.08"},{"key":"IJWSR.2019010104-1","doi-asserted-by":"crossref","DOI":"10.1145\/2837185.2837226","article-title":"Forensics-aware web services composition and ranking.","author":"A.Akremi","year":"2015","journal-title":"Proceedings of the 17th International Conference on Information Integration and Web-based Applications & Services"},{"key":"IJWSR.2019010104-2","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2015.95"},{"key":"IJWSR.2019010104-3","doi-asserted-by":"crossref","unstructured":"Amato, F., Cozzolino, G., & Mazzocca, N. (2016). Semantic Integration and Correlation of Digital Evidences in Forensic Investigations. Paper presented at the International Conference on P2P, Parallel, Grid, Cloud and Internet Computing.","DOI":"10.1007\/978-3-319-49109-7_39"},{"key":"IJWSR.2019010104-4","doi-asserted-by":"crossref","unstructured":"Berners-Lee, T., Hendler, J., & Lassila, O. (2001). The semantic web. Scientific American, 284(5), 34-43.","DOI":"10.1038\/scientificamerican0501-34"},{"key":"IJWSR.2019010104-5","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2015.10.002"},{"key":"IJWSR.2019010104-6","doi-asserted-by":"crossref","unstructured":"Brinson, A., Robinson, A., & Rogers, M. (2006). A cyber forensics ontology: Creating a new approach to studying cyber forensics. Digital Investigation, 3, 37-43.","DOI":"10.1016\/j.diin.2006.06.008"},{"key":"IJWSR.2019010104-7","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2017.08.002"},{"key":"IJWSR.2019010104-8","doi-asserted-by":"crossref","unstructured":"Cohen, M., Garfinkel, S., & Schatz, B. (2009). Extending the advanced forensic format to accommodate multiple data sources, logical evidence, arbitrary information and forensic workflow. Digital Investigation, 6, S57-S68.","DOI":"10.1016\/j.diin.2009.06.010"},{"issue":"1","key":"IJWSR.2019010104-9","first-page":"1","article-title":"An ontological approach to study and manage digital chain of custody of digital evidence.","volume":"35","author":"J.\u0106osi\u0107","year":"2011","journal-title":"Journal of Information and Organizational Sciences"},{"key":"IJWSR.2019010104-10","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2013.27"},{"key":"IJWSR.2019010104-11","doi-asserted-by":"crossref","unstructured":"Danyliw, R., Meijer, J., & Demchenko, Y. (2007). The Incident Object Description Exchange Format RFC 5070 (Proposed Standard). IETF.","DOI":"10.17487\/rfc5070"},{"key":"IJWSR.2019010104-12","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2013.09.214"},{"key":"IJWSR.2019010104-13","unstructured":"Ellison, D., & Venter, H. (2016). An ontology for digital security and digital forensics investigative techniques. Proceedings of the 11th International Conference on Cyber Warfare and Security, ICCWS."},{"key":"IJWSR.2019010104-14","unstructured":"Ellison, D., & Venter, H. (2016). A Semantic web Approach for the Organisation of Information in Security and Digital Forensics. Proceedings of the 15th European Conference on Cyber Warfare and Security."},{"key":"IJWSR.2019010104-15","unstructured":"Encase. (2006). EnCase\u00ae Field Intelligence Model. Retrieved from https:\/\/www.ondata.es\/seminario\/pdf\/encase_field_intelligence_model.pdf"},{"key":"IJWSR.2019010104-16","first-page":"107","author":"D.Fensel","year":"2011","journal-title":"Web service modeling ontology. In Semantic Web Services"},{"key":"IJWSR.2019010104-17","first-page":"13","author":"S.Garfinkel","year":"2006","journal-title":"Advanced forensic format: an open extensible format for disk imaging. In Advances in Digital Forensics II"},{"key":"IJWSR.2019010104-18","doi-asserted-by":"crossref","unstructured":"Garfinkel, S. L. (2010). Digital forensics research: The next 10 years. Digital Investigation, 7, S64-S73.","DOI":"10.1016\/j.diin.2010.05.009"},{"key":"IJWSR.2019010104-19","unstructured":"Group, C. D. E. S. F. W. (2006). Survey of disk image storage formats. Paper presented at the 6th annual digital forensic research workshop (DFRWS\u201905), New Orleans."},{"key":"IJWSR.2019010104-20","author":"O. M.Group","year":"2006","journal-title":"CORBA Component Model 4.0 Specification (Version 4.0)"},{"issue":"2","key":"IJWSR.2019010104-21","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1006\/knac.1993.1008","article-title":"A translation approach to portable ontology specifications.","volume":"5","author":"T. R.Gruber","year":"1993","journal-title":"Knowledge Acquisition"},{"key":"IJWSR.2019010104-22","unstructured":"Horstmann, M., & Kirtland, M. (1997). DCOM architecture. Microsoft White Paper."},{"key":"IJWSR.2019010104-23","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2009.5137303"},{"key":"IJWSR.2019010104-24","author":"A.Martin","year":"2007","journal-title":"FireWire memory dump of a windows XP computer: a forensic approach"},{"key":"IJWSR.2019010104-25","unstructured":"Martin, D., Burstein, M., Hobbs, J., Lassila, O., McDermott, D., McIlraith, S., . . . Payne, T. (2004). OWL-S: Semantic markup for web services. W3C Member Submission, 22(4)."},{"key":"IJWSR.2019010104-26","unstructured":"McGuinness, D. L., Fikes, R., Rice, J., & Wilder, S. (2000). An environment for merging and testing large ontologies. Paper presented at the KR."},{"key":"IJWSR.2019010104-27","doi-asserted-by":"publisher","DOI":"10.1017\/S089006049812406X"},{"issue":"2","key":"IJWSR.2019010104-28","first-page":"137","article-title":"An automated approach for digital forensic analysis of heterogeneous big data. The Journal of Digital Forensics","volume":"11","author":"H.Mohammed","year":"2016","journal-title":"Security and Law"},{"key":"IJWSR.2019010104-29","doi-asserted-by":"publisher","DOI":"10.1109\/IRI.2016.81"},{"key":"IJWSR.2019010104-30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02312-5_18"},{"key":"IJWSR.2019010104-31","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2010.5593235"},{"key":"IJWSR.2019010104-32","doi-asserted-by":"publisher","DOI":"10.1016\/j.websem.2007.03.004"},{"key":"IJWSR.2019010104-33","doi-asserted-by":"publisher","DOI":"10.1109\/SKG.2006.85"},{"key":"IJWSR.2019010104-34","doi-asserted-by":"crossref","unstructured":"Wiles, J., Alexander, T., Ashlock, S., Ballou, S., Depew, L., Dominguez, G., . . . Reis, K. (2007). Forensic examination in a terabyte world. Techno security\u2019s guide to e-discovery and digital forensics, 129-146.","DOI":"10.1016\/B978-159749223-2.50009-1"}],"container-title":["International Journal of Web Services Research"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=220390","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,5]],"date-time":"2022-05-05T21:46:50Z","timestamp":1651787210000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJWSR.2019010104"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2019,1]]},"references-count":35,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.4018\/ijwsr.2019010104","relation":{},"ISSN":["1545-7362","1546-5004"],"issn-type":[{"value":"1545-7362","type":"print"},{"value":"1546-5004","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1]]}}}