Towards an integrated e-mail forensic analysis framework

被引:34
作者
Hadjidj, Rachid [1 ]
Debbabi, Mourad [1 ]
Lounis, Hakim [1 ]
Iqbal, Farkhund [1 ]
Szporer, Adam [1 ]
Benredjem, Djamel [1 ]
机构
[1] Concordia Univ, Comp Secur Lab, Montreal, PQ H3G 1M8, Canada
关键词
Cyber crimes; E-mail forensics; E-mail social networks; Classification; Clustering; Statistical analysis; IDENTIFICATION;
D O I
10.1016/j.diin.2009.01.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to its simple and inherently vulnerable nature, e-mail communication is abused for numerous illegitimate purposes. E-mail spamming, phishing, drug trafficking, cyber bullying, racial vilification, child pornography, and sexual harassment are some common e-mail mediated cyber crimes. Presently, there is no adequate proactive mechanism for securing e-mail systems. In this context, forensic analysis plays a major role by examining suspected e-mail accounts to gather evidence to prosecute criminals in a court of law. To accomplish this task, a forensic investigator needs efficient automated tools and techniques to perform a multi-staged analysis of e-mail ensembles with a high degree of accuracy, and in a timely fashion. In this article, we present our e-mail forensic analysis software tool, developed by integrating existing state-of-the-art statistical and machine-learning techniques complemented with social networking techniques. In this framework we incorporate our two proposed authorship attribution approaches; one is presented for the first time in this article. (C) 2009 Elsevier Ltd. All rights reserved.
引用
收藏
页码:124 / 137
页数:14
相关论文
共 24 条
[1]  
Agrawal R., 1993, SIGMOD Record, V22, P207, DOI 10.1145/170036.170072
[2]  
[Anonymous], 2000, P WORKSH TEXT MIN AC
[3]  
[Anonymous], 2008, ACM Transactions on Information Systems (TOIS)
[4]  
Baayen R.H., 1996, LIT LINGUISTIC COMPU, V2, P110
[5]  
BHATTACHARYYA M, 2002, P 2002 NEW SEC PAR W
[6]  
de Vel O, 2001, SIGMOD REC, V30, P55, DOI 10.1145/604264.604272
[7]  
FARRINGDON JM, 2001, ANAL AUTHORSHIP GUID
[8]  
Forsyth R. S., 1996, Literary & Linguistic Computing, V11, P163, DOI 10.1093/llc/11.4.163
[9]  
GUNOPULOS D, 1998, P ACM SIGMOD C SEATT
[10]  
Holmes D. I., 1998, Literary & Linguistic Computing, V13, P111, DOI 10.1093/llc/13.3.111