You are on page 1of 6

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/266765590

Agent-Based Computing Application and its Importance to Digital Forensic


Domain

Conference Paper · July 2012


DOI: 10.13140/2.1.2167.5529

CITATIONS READS

0 414

2 authors:

Inikpi O. Ademu Chris Imafidon


University of East London University of Cambridge
10 PUBLICATIONS   10 CITATIONS    50 PUBLICATIONS   206 CITATIONS   

SEE PROFILE SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Application security tools View project

All content following this page was uploaded by Inikpi O. Ademu on 13 October 2014.

The user has requested enhancement of the downloaded file.


Agent-Based Computing Application and its
Importance to Digital Forensic Domain

Inikpi O. Ademu1, Chris O. Imafidon2


1
School of Architecture, Computing and Engineering, University of East London, Docklands
Campus, London, United Kingdom
2School of Architecture, Computing and Engineering, University of East London, Docklands
Campus, London, United Kingdom,
2Former Head of Management Unit, Queen Mary, University of London, London, United Kingdom

Abstract- The advancement of the digital forensic investigation requires a new design, improved mechanism
and processes. Forensic experts are faced with growth in data. Huge amount of data has expanded and grown
in recent years attempts to consume the storage space available. The problem created by this trend is that our
ability to analyse and filter data hasn’t grown at nearly the same pace. Computing resources are improving,
distributed computing field has made major contribution for improvement. By coding tools that can harness the
resources of computers. The aim of the research is to identify the main application areas in which agent
application has been successfully used currently and to recognise the importance of building digital forensic
tool with intelligent agent techniques.

Keywords- Agent, Intelligent Agent, Autonomy, Automated Tools, Digital Forensic

1. Introduction Intelligence (AI) in the pursuit of the goals for its


clients. AI is the limitation of human intelligence by
Intelligent agent is a new concept for developing mechanical means. In the terms of this research the
software appliactions. Currently, agents are the focus word agent generally indicates intelligent agent (IA).
of intense interest on the part of many fields of
computer science and artificial intelligence. Agent are According to Williams (2004) an agent is anything that
used in an increasingly wide variety of applications, can perceive its environment through sensors and act
from email filters to large open, complex mission upon that environment through effectors. The criterion
criticl system such as air traffic control, in both system that is used to evaluate and draw conclusion whether
the key abstraction used is that of an agent (Jennings an agent is successful or not is performance measure
and Wooldridge, 1998). Russell and Norvig (2010) and a critical success factor is based on how an agent
describe an agent as anything that can perceive its could perform a particular task. The intrinsic part of an
environment through sensors and act upon that agent is being autonomous, adaptive and cooperative in
environment through actuators. For instance a human the environment which it operates. The most desirable
agent has eyes, ears for sensors and hands, legs, for attribute of an agent is autonomous meaning the agent
actuators, a robotic agent might have cameras and should not be under the control of another agent
infrared range finders for sensors and various motor for (Ademu et al, 2012). The aim of the research is to
actuators. A typical example is Letizia, an intelligent identify the main application areas in which agent
agent used for reading documents off the World Wide application has been successfully used currently and to
Web (WWW). Most of the time when the user is recognise the importance of building digital forensic
accessing the WWW, the computer is idle, waiting for tool with agent technology.
instructions from the user to retrieve a new document.
Letizia uses this otherwise idle time to look for other 2. Properties of Intelligent Agent
documents somehow related to the document being
read, so that the user, after having read the document, Agent is a computer system put in some environment,
will get suggestions for other documents that might be that is capable of autonomous action in this
of interest. Letizia thus bases its searching on the environment on order to meet its design objectives
contents of relatively recently read documents (Lohani (Jennings and Wooldridge, 1998). The system should
and Jeevan, 2007). Wallace (1997) defined Intelligent be able to act without the direct intervention of humans
Software Agent as software that uses Artificial or other agents and should have control over its own
actions and internal state. In drawing a correlation
between the notion of autonomy with respect to agents
and encapsulation with respect to object oriented Continuity: An agent doesn’t necessarily
systems. An object encapsulates some state, and have work only when its owner is sitting by the
some control over this state so that it can only be computer, it can be active at all times. It is
modified through the methods that the object provides. thus a temporally continuous process (Lohani
Agent encapsulate state in the same way but it can also and Jeevan, 2007).
be thought that agent encapsulate behavior in addition
to the state but object cannot encapsulate behavior.
Due to this distinction (Jennings and Wooldridge,
1998) do not think of agents as invokig actions or Social ability: An agent is social software,
methods on agent rather they think of them requesting which interact to other agents to do its job. It
actions to be performed. The authors identified can be talking to other similar agents to
intelligent agent as a computer system that is capable exchange information, or it can talk to other
of flexible autonomous action in order to meet its kinds of agents to request and offer services.
design objectives. The properties of intelligent agent Communication with the owner is also
are: important. It is through this the agent is
praised or punished for its work, and the
owner can give further directions to the agent
for how it can do its job better (Herman,
Autonomy: The agent possesses the 1997).
capacity to act independently from its user,
both in chronological terms and in the sense
of adding intelligence to the user’s
instructions, and exercising control over its Flexibility: The agent works proactively,
own actions (Williams, 2004). that is directed by goals, but how it goes about
to reach these goals may vary. As opposed to
a script that performs the same sequence of
commands each time it is run, an agent can do
Reactivity: The agent senses in and acts in the same job in many different ways,
its own surroundings. The agent also reacts to depending on the situation and the
changes in the surroundings that are the result surroundings (Lohani and Jeevan, 2007).
of its own actions (Bradshaw, 1997).

Cooperation: The notion of cooperation


Proactivity: This refers to the agent’s with its user also seems to be fundamental in
ability to exhibit goal-directed behaviour and defining an agent, different from the one-way
take initiatives by itself to get closer to the flow of information of ordinary software;
defined goal, out of an external instruction by intelligent agents are therefore true interactive
its user (Russell and Norvig, 2010). It can tools (William, 2004).
predict, or at least make good guesses about
the consequences of its own actions, and in
this way use its reactivity to come closer to its
goal. This should happen simultaneously, and 3. Classification of Agent
on a periodical basis, which makes their use of
enormous help in saving time. According to (Jennings and Wooldridge, 1998) agent
can be classified by the type of the agent, by the
technology used to implement the agent, or by the
application domain itself. For the purpose of this
Adaptability: The agent’s capacity to research, agent application will be classified as
learn and change according to the experiences follows:
accumulated. This has to do with the feature
of having memory, and learning. An agent 3.1 Classification by the Type of Agent
learns from its user, from the external world
and even from other agents, and progressively Nienaber and Barnard (2005) classified an agent into
improves in performing its tasks, two namely, stationary agents and mobile agents. A
independently from external instructions stationary agent can be seen as autonomous software
(Lohani and Jeevan, 2007). that permanently resides on a particular host. Example
of such an agent is one that performs task on its host
machine such as accepting mobile agents, allocating techniques that are useful to develop results and proof
resources, performing specific task etc. A good that should not be disapproved and avoid errors that
example of stationary agent is Clippie, the Microsoft could be introduced by manual interpretation. There is
Office Assistant where its settings are for programs in need to consider the development of automated tools
Microsoft Office Suite. A mobile agent is a software for collection and analysis of digital evidence before
agent that has the ability to transport itself from one presentation.
host to another in a network. The ability to travel
allows a mobile agent to move to a host that contains Web Browser Agent: This is an intelligent agent
an object with which the agent wants to interact, and which helps keep track of what website is visited and
then to take advantage of the computing resources of customizes ones view of the web by automatically
the object’s host in order to interact with that object. keeping a bookmark list, ordered by how often and
An example of a mobile agent is a flight booking how recent one visit the site. It also let you know by
system where a logged request is transferred to a notifying you when sites you like are updated, and it
mobile agent that on its part negotiates the web seeking could also automatically download pages for browsing
suitable flight information quotations as well as offline. A good example is the IBM web browser
itineraries. intelligent, web spider which is used for collecting data
to build indexes to be used by a search engine.
3.2 Classification by Agent Application
Domain Data Mining – This is where information-specific
agents provide a context for data searches in vast
Commercial Application databases or other information sources (like the web
for example) from which cooperating intelligent
Shopping Assistant: Shopping Assistant uses personal agents will extract a selection of useful
intelligent agent technology to help the internet information. This field is one of the fastest-evolving
shopper to find the desired item quickly without having ones at the moment given the explosive growth of the
to browse from one page to the other. A good example amount of accessible information via networks and
is the trading and negotiation agent which negotiate communications Ralha (2009).
with other agents to buy or sell shares on behalf of
their users and the auction agent at EBay (Patel et al, Broker agents: Another types of agent that act as
2010). mediators or facilitators by matching user requests
against information or known solutions in databases or
Information Management Agents: These provided by database agents (Lohani and Jeevan,
agents help to selectively retrieve appropriate 2007).
information (Bradshaw, 1997). For instance instead of
hiring help desk consultant of helping the customers 3.3 Classification by Technology used to
search through the internet for an answer, with implement the Agent
intelligent agent, the customer describes the problem
and the agent automatically searches the appropriate Interface Agent: Interface agent emphasize
databases e.g. CD-ROM, or Internet then present a autonomy and learning in order to perform tasks for
united answer with the most likely first. The diversity their owners. Interface agents support and provide
of information available to us has increased, the need proactive assistance to a user learning to use a
to manage this information has also grown. The large particular application such as a spreadsheet or an
volume of information availabel throught he internet operating system (Jennings and Wooldridge, 1998).
and World Wide Web (WWW) represents a very real The user’s agent observes and monitors the actions
problem. Even though an end user is required to taken by the user in the interface, learns new short-cuts
constantly direct the management process there is need and suggests better ways of doing the task.
for such searches to b carried out by agents, acting
autonomously to search the web on behalf of some Personal assistant agents: This is an agent that
users this is so important in the digital forensic contains personalized learning algorithms developed
investigation Ademu, et al, 2011). for a single, specialized application or task.
Information filters for browsing tasks belong to this
Intelligent agent has been proposed in some distributed class of agents (Bradshaw, 1997).
application as a useful mechanism. Intelligent agent is
very applicable in digital forensic investigation. As Network management – This is where
Solomon and Lattimore (2006) mentioned, in many collaborative agents collect and exchange local
digital crimes, the procedures of accomplishing information on network statistics in order to achieve
forensic are neither consistent nor standardized, instead automation and optimization of decisions on network
there are some elementary guidelines for specific administration tasks like routing, access, service
situations. Rekhis et al (2009) mentioned that digital provisions, monitoring and statistical evaluation,
investigation should integrate the use of formal within a global view (Ralha, 2009).
4. Intelligent Agent applied to agents and emphasized on the importance of building
digital forensic tool with intelligent agent techniques.
Digital Foresic Investigation
The New Technologies Inc. (NTI) developed an
intelligent Filter program known as the Filter_1 which Acknowledgement
has the ability to make binary data printable and to
extract potentially useful data from a large volume of The authors would like to thank Dr David Preston and
binary data (Middleton, 2004). The intelligent filter the University of Cambridge Computer laboratory for
program or Filter_1 tool help to reduce the size of the providing support during this research.
bitstream files without sacrificing useful information.
IP Filter is possibly the most interesting and useful of
the Forensic Utilities. It was developed by NTI to help
law enforcement track down and investigate child
pornography cases. It has a simple DOS user interface
and is used in almost the same way as the Filter_1
(Stephenson, 2002). The difference is that it searches
for instances of email addresses, Web URLs, and
graphic or Zip file names. TextSearch Plus is a utility
for searching a disk for text strings. It can search both
allocated space and unallocated space (slack space).
When used to search the physical disk, it can be used
against any file system. TextSearch Plus makes an
excellent tool for parsing very large logs in an internet
backtracing investigation. It uses fuzzy logic and is
designed to process a large amount of data in a
relatively short time.

Rekhis et al (2009) developed a system for digital


investigation of network security incident using
techniques known as intrusion response probabilistic
cognitive maps that are constructed to analyse the
attacks performed against the network. In their work
the authors emphasized that focusing merely on
restoring the system as disadvantageous, valuable
information and traces that allow understanding the
attack could be removed, if the compromised system is
formatted or reinstalled, this weakness point up the
need for conducting a post - incident digital forensic
investigation. And in dealing with the problem faced
with collecting and analysing of large amount of data,
digital forensic investigation should reconcile both the
expertise of the incident response team and the use of
formal reasoning techniques, this allows the better
filtering of the data to be analysed and source of
evidence to be explored and also validate the result of
the formal techniques by the incident response team
before presenting them. The recommendation by this
authors relates to this present research where
emphasizes is made for intelligent and reasoning
techniques to be applied to digital forensic.

Conclusion
The research identifies the current state of the art in
applied agent system. Agents where classified into
types, application domain and technology used. The
research discussed a wide variety of agent application.
This research has pinched from different literature in
order to discuss the rapidlly evolving area of software
Reference at: http://www.sciRP.org/journal/ijens/ (Accessed 20
April 2011)
[1] Ademu, I. Imafidon, C. Preston, D., (2012)
Intelligent Software Agent applied to Digital Forensic [11] Russell, S. Norvig, P. (2010) Artificial
and its Usefulness Vol. 2 (1) Available at: Intelligence: A modern approach. 3rdEdition. P 34 New
http://interscience.in/IJCSI_Vol2Iss1/IJCSI_Paper_21. Jersey: Prentice Hall
pdf (Accessed 10 April 2012)
[12] Solomon, J. Lattimore, Erik. (2006) Computer
[2] Ademu, I. Imafidon, C. I. Preston, D. (2011) A forensics Available at: http://citeseerx.ist.psu.edu/
New Approach of Digital Forensic Model for Digital (Accessed 10 February 2011)
Forensic Investigation Vol. 2, (12) Available at:
[13] Stephenson, P. (2000) Investigating Computer-
http://thesai.org/Downloads/Volume2No12/Paper%202
Related Crime Florida: CRC p 32
6-
A%20New%20Approach%20of%20Digital%20Forens [14] Wallace, D. (1997). Intelligent software agents:
ic%20Model%20for%20Digital%20Forensic%20Inves Definitions and applications. Available at:
tigation.pdf (Accessed 28 April 2012) http://alumnus.caltech.edu/~croft/research/agent/definit
ion/ (Accessed 25 August 2012).
[3] Bradshaw, J. (1997) Software Agent p 347 London:
MIT Press [15] Williams, G. (2004) Synchronizing E-Security
Kluwer Academic Publishers. Pp 34-35
[4] Hermans, B. (1997). Intelligent software agents on
the internet: An inventory of currently offered
functionality in the information society and a
prediction of (near) future developed.
Available at:
http://www.firstmonday.dk/issues/issues2_3/ch_123/
(Accessed 1 April 2012)

[5] Jennings, N. Wooldridge, M. (1997) Agent


Technology: Foundations, Applications and Markets
Pp 12-14 Berlin: Springer

[6] Lohani, M, Jeevan, V. (2006) intelligent software


agents for library application Vol. 28 (3) Available at:
www.emeraldinsight.com/0143-5124.htm (Accessed
18 April 2012)

[7] Nienaber, R. Barnard, A. (2005) Software quality


management supported by software agent technology.
Available at:
http://www.informingscience.org/proceedings/InSITE2
005/I53f40Nien.pdf (Accessed 13 April 2012)

[8] Patel, A. Qi, W. Wills, C. (2010) A review and


future research directions of secure and trustworthy
mobile agent-based e-marketplace systems Vol. 28 (3)
Available at: www.emeraldinsight.com/0968-
5227.htm Accessed 15 April 2012

[9] Ralha, C. (2009) Towards the integration of multi-


agent application and data mining.

Available at:
http://www.springer.com/cda/content/9781441905215.
ci.pdf Accessed 22 April 2012

[10] Rekhis, S. Krichene, J. Boudriga, N. (2009).


Forensic investigation in communication networks
using incomplete digital evidence Vol. 2 (9). Available

View publication stats

You might also like