CFP last date
20 May 2024
Reseach Article

A Methodology for Cyber Crime Identification using Email Corpus based on Gaussian Mixture Model

by V.sreenivasulu, R. Satya Prasad
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 117 - Number 13
Year of Publication: 2015
Authors: V.sreenivasulu, R. Satya Prasad
10.5120/20616-3315

V.sreenivasulu, R. Satya Prasad . A Methodology for Cyber Crime Identification using Email Corpus based on Gaussian Mixture Model. International Journal of Computer Applications. 117, 13 ( May 2015), 29-32. DOI=10.5120/20616-3315

@article{ 10.5120/20616-3315,
author = { V.sreenivasulu, R. Satya Prasad },
title = { A Methodology for Cyber Crime Identification using Email Corpus based on Gaussian Mixture Model },
journal = { International Journal of Computer Applications },
issue_date = { May 2015 },
volume = { 117 },
number = { 13 },
month = { May },
year = { 2015 },
issn = { 0975-8887 },
pages = { 29-32 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume117/number13/20616-3315/ },
doi = { 10.5120/20616-3315 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:59:19.573900+05:30
%A V.sreenivasulu
%A R. Satya Prasad
%T A Methodology for Cyber Crime Identification using Email Corpus based on Gaussian Mixture Model
%J International Journal of Computer Applications
%@ 0975-8887
%V 117
%N 13
%P 29-32
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The area of crime investigation has extended its roots to cyber media and has emerged exponentially with the technological strides. Among the various media used in Digital Forensics, Email Forensics took up the leading segment. In order to investigate the cyber crimes, there is an immense need to analyze the bulky email gatherings forensically. Data mining methods help in analyzing these large collections of data. Mixtures of data mining models along with the related methodologies are proposed in this paper to facilitate the email forensic assessor. The Performance is evaluated using False Rejection Ratio (FRR) and False Acceptance Ratio (FAR).

References
  1. Rachid Hadjidj et al "Towards An Integrated Email Forensic Analysis Framework", Digital Investigation 5,pp. 124-137, 2009.
  2. S. Appavu alias Balamurugam, Dr. R. Rajaram,"Data mining techniques for suspicious email detection: A comparative study",IADIS European Conference Data Mining, 2007.
  3. D. v. Chandra Sekhar and S. Sagar Imambi," Classifying and Identifying of Threats in Email Using Data Mining Techniques", Proceedings of the International MlitiConference of Engineers and Computer Scientists Vol. 1,I IMECS,19-21 March 2008,Homg Kong.
  4. Sahami et al "A Bayesian Approach to Filtering Junk Email In Learning for Text Categorization" – papers from the AAAI Workshop, pp. 55-62, Madison Wisconsin AAAI Technical Report WS-98-05, 1998.
  5. Gray et al," Software forensics: Extending authorship analysis techniques to computer programs", Third biannual conference of the international Association of Forensic Linguists (IAFL'97),1997.
  6. Dhanalakshmi R,L. Kavisankar,C. Chellappan"Enhanced Email Authentication Against spoofing Attacks To Mitigate Phishing, European Journal of Scientific research Vol . Issue 2011
  7. Marwan Al-Zarouni. (2004). "Tracing E-mail Headers", Proceedings of Australian Computer, Network & Information Forensics Conference on 25th November, School of Computer and Information Science, Edith Cowan University Western Australia 2004, pp. 16-30.
  8. eMailTrackerPro, http://www. emailtrackerpro. com/
  9. EmailTracer, http://www. cyberforensics. in
  10. Adcomplain, http://www. rdrop. com/users/billmc /adcomplain. html
  11. Aid4Mail Forensic, http://www. aid4mail. com/
  12. AbusePipe, http://www. datamystic. com/abusepipe . html
  13. AccessData's FTK, http://www. accessdata. com/
  14. EnCase Forensic, http://www. guidancesoftware. com
  15. FINALeMAIL, http://finaldata2. com
  16. Sawmill-GroupWise, http://www. sawmill. net
Index Terms

Computer Science
Information Sciences

Keywords

Email Forensics Data Mining Digital Forensics Word Net Query Analysis.