Call for Paper - March 2023 Edition
IJCA solicits original research papers for the March 2023 Edition. Last date of manuscript submission is February 20, 2023. Read More

Author Identification for E-mail Forensic

Print
PDF
IJCA Proceedings on National Conference on Recent Trends in Computing
© 2012 by IJCA Journal
NCRTC - Number 2
Year of Publication: 2012
Authors:
Sobiya R. Khan
Smita M. Nirkhi
R. V. Dharaskar

Sobiya R Khan, Smita M Nirkhi and R V Dharaskar. Article: Author Identification for E-mail Forensic. IJCA Proceedings on National Conference on Recent Trends in Computing NCRTC(2):29-32, May 2012. Full text available. BibTeX

@article{key:article,
	author = {Sobiya R. Khan and Smita M. Nirkhi and R. V. Dharaskar},
	title = {Article: Author Identification for E-mail Forensic},
	journal = {IJCA Proceedings on National Conference on Recent Trends in Computing},
	year = {2012},
	volume = {NCRTC},
	number = {2},
	pages = {29-32},
	month = {May},
	note = {Full text available}
}

Abstract

E-mail communication has become the need of the hour, with the advent of Internet. However, it is being abused for various illegitimate purposes, such as, spamming, drug trafficking, cyber bullying, phishing, racial vilification, child pornography, and sexual harassment, etc. Several cyber crimes such as identity theft, plagiarism, internet fraud stipulate that the true identity of the e-mail's author be revealed, so that the culprits can be punished in the court of law, by gathering credible evidence against them. Forensic analysis can play a crucial role here, by letting the forensic investigator to gather evidence by examining suspected e-mail accounts. In this context, automated authorship identification can assist the forensic investigator in cyber crime investigation. In this paper we discuss how existing state-of-the-art techniques have been employed for author identification of e-mails and we propose our model for identifying most plausible author of e-mails.

References

  • Rachid Hadjidj, Mourad Debbabi, Hakim Lounis, Farkhund Iqbal, Adam Szporer, Djamel Benredjem, "Towards an integrated e-mail forensic analysis framework", Digital Investigation 5, pp. 124–137, 2009.
  • Iqbal F, Hadjidj R, Fung BCM, Debbabi M. , "A novel approach of mining write-prints for authorship attribution in e-mail forensics", Digital Investigation 5:pp. 42–51, 2008.
  • Zheng R, Li J, Chen H, Huang Z. , "A framework for authorship identification of online messages: writing-style features and classification techniques". Journal of the American Society for Information Science and Technology, February ; 57(3), pp. 378– 93, 2006.
  • Zheng R, Qin Y, Huang Z, Chen H. , "Authorship analysis in cybercrime investigation", In: Proc. 1st NSF/NIJ symposium. ISI Springer-Verlag; pp. 59–73, 2003.
  • de Vel O, Anderson A, Corney M, Mohay G. , "Mining e-mail content for author identification forensics", SIGMOD Record December ;30(4):55–64, 2001.
  • Farkhund Iqbal, Hamad Binsalleeh, Benjamin C. M. Fung, Mourad Debbabi. , "Mining writeprints from anonymous e-mails for forensic investigation", Digital Investigation, 2010.
  • Olivier de Vel, "Mining E-mail Authorship", KDD-2000 Workshop on Text Mining, August 20, Boston, 2000.
  • Abbasi A, Chen H. , "Writeprints: a stylometric approach to identity level identification and similarity detection in cyberspace", ACM Transactions on Information Systems, Vol. 26, No. 2, Article 7, March 2008.
  • Jiexun Li, Rong Zheng, Hsinchun Chen, "From Fingerprint to Writeprint", Communications of the ACM, 2006.
  • Sobiya R. Khan, Smita M. Nirkhi, R. V. Dharaskar, "E-mail Mining for Cyber Crime Investigation", Proceedings of International Conference on Advances in Computer and Communication Technology, pp. 138-141, February 2012.
  • Gray, A. , Sallis, P. , & MacDonell, S. , "Software forensics: Extending authorship analysis techniques to computer programs", Third biannual conference of the International Association of Forensic Linguists (IAFL '97), 1997.
  • Mosteller, F. , & Wallace, D. L. , "Applied Bayesian and classical inference: The case of the Federalist Papers", Second edition, New York: Springer- Verlag, 1964.
  • Mosteller, F. , & Wallace, D. L. , "Inference and disputed authorship: The Federalist. Reading", MA: Addison-Wesley, 1964.
  • Mendenhall, T. C. , "The characteristic curves of composition", Science, 11(11), 237–249, 1887.
  • Rudman, J. , "The state of authorship attribution studies: Some problems and solutions", Computers and the Humanities, 31, 351–365, 1998.
  • Craig, H. , "Authorial attribution and computational stylistics: If you can tell authors apart, have you learned anything about them?", Literary and Linguistic Computing, 14(1), 103–113, 1999.
  • Corney, M. , de Vel, O. , Anderson, A. , & Mohay, G. , "Gender-preferential text mining of E-mail discourse", Eighteeth annual Computer Security Applications Conference (ACSAC 2002), Las Vegas, NV, 2002.
  • Argamon, S. , S ? ari´c, M. , & Stein, S. S. , "Style mining of electronic messages for multiple authorship discrimination", Proceedings of the 9th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (pp. 475–480). ACM Press, 2003.
  • Koppel, M. , Argamon, S. , & Shimoni, A. R. , "Automatically categorizing written texts by author gender. Literary and Linguistic Computing, 17(4), 401–412, 2002.
  • Chaski, C. , "Empirical evaluations of language-based author identication techniques",Forensic Linguistics, 8, 2001.
  • Tweedie, F. J. , & Baayen, R. H. , " How variable may a constant be? Measures of lexical richness in perspective. Computers and the Humanities, 32, 323–352, 1998.
  • Gui-Fa Teng'J, Mao-Sheng Lai I, Jian-Bin Ma', Ying Li, "E-mail Authorship Mining based on SVM for Computer Forensic", Proceedings of the Third International Conference on Machine Learning and Cybermetics, Shanghai, August, pp. 26-29, 2004.