Notification: Our email services are now fully restored after a brief, temporary outage caused by a denial-of-service (DoS) attack. If you sent an email on Dec 6 and haven't received a response, please resend your email.
CFP last date
20 December 2024
Reseach Article

Author Identification for E-mail Forensic

Published on May 2012 by Sobiya R. Khan, Smita M. Nirkhi, R. V. Dharaskar
National Conference on Recent Trends in Computing
Foundation of Computer Science USA
NCRTC - Number 2
May 2012
Authors: Sobiya R. Khan, Smita M. Nirkhi, R. V. Dharaskar
0fc8fbb1-c231-4749-983f-56c919200262

Sobiya R. Khan, Smita M. Nirkhi, R. V. Dharaskar . Author Identification for E-mail Forensic. National Conference on Recent Trends in Computing. NCRTC, 2 (May 2012), 29-32.

@article{
author = { Sobiya R. Khan, Smita M. Nirkhi, R. V. Dharaskar },
title = { Author Identification for E-mail Forensic },
journal = { National Conference on Recent Trends in Computing },
issue_date = { May 2012 },
volume = { NCRTC },
number = { 2 },
month = { May },
year = { 2012 },
issn = 0975-8887,
pages = { 29-32 },
numpages = 4,
url = { /proceedings/ncrtc/number2/6526-1016/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Recent Trends in Computing
%A Sobiya R. Khan
%A Smita M. Nirkhi
%A R. V. Dharaskar
%T Author Identification for E-mail Forensic
%J National Conference on Recent Trends in Computing
%@ 0975-8887
%V NCRTC
%N 2
%P 29-32
%D 2012
%I International Journal of Computer Applications
Abstract

E-mail communication has become the need of the hour, with the advent of Internet. However, it is being abused for various illegitimate purposes, such as, spamming, drug trafficking, cyber bullying, phishing, racial vilification, child pornography, and sexual harassment, etc. Several cyber crimes such as identity theft, plagiarism, internet fraud stipulate that the true identity of the e-mail's author be revealed, so that the culprits can be punished in the court of law, by gathering credible evidence against them. Forensic analysis can play a crucial role here, by letting the forensic investigator to gather evidence by examining suspected e-mail accounts. In this context, automated authorship identification can assist the forensic investigator in cyber crime investigation. In this paper we discuss how existing state-of-the-art techniques have been employed for author identification of e-mails and we propose our model for identifying most plausible author of e-mails.

References
  1. Rachid Hadjidj, Mourad Debbabi, Hakim Lounis, Farkhund Iqbal, Adam Szporer, Djamel Benredjem, "Towards an integrated e-mail forensic analysis framework", Digital Investigation 5, pp. 124–137, 2009.
  2. Iqbal F, Hadjidj R, Fung BCM, Debbabi M. , "A novel approach of mining write-prints for authorship attribution in e-mail forensics", Digital Investigation 5:pp. 42–51, 2008.
  3. Zheng R, Li J, Chen H, Huang Z. , "A framework for authorship identification of online messages: writing-style features and classification techniques". Journal of the American Society for Information Science and Technology, February ; 57(3), pp. 378– 93, 2006.
  4. Zheng R, Qin Y, Huang Z, Chen H. , "Authorship analysis in cybercrime investigation", In: Proc. 1st NSF/NIJ symposium. ISI Springer-Verlag; pp. 59–73, 2003.
  5. de Vel O, Anderson A, Corney M, Mohay G. , "Mining e-mail content for author identification forensics", SIGMOD Record December ;30(4):55–64, 2001.
  6. Farkhund Iqbal, Hamad Binsalleeh, Benjamin C. M. Fung, Mourad Debbabi. , "Mining writeprints from anonymous e-mails for forensic investigation", Digital Investigation, 2010.
  7. Olivier de Vel, "Mining E-mail Authorship", KDD-2000 Workshop on Text Mining, August 20, Boston, 2000.
  8. Abbasi A, Chen H. , "Writeprints: a stylometric approach to identity level identification and similarity detection in cyberspace", ACM Transactions on Information Systems, Vol. 26, No. 2, Article 7, March 2008.
  9. Jiexun Li, Rong Zheng, Hsinchun Chen, "From Fingerprint to Writeprint", Communications of the ACM, 2006.
  10. Sobiya R. Khan, Smita M. Nirkhi, R. V. Dharaskar, "E-mail Mining for Cyber Crime Investigation", Proceedings of International Conference on Advances in Computer and Communication Technology, pp. 138-141, February 2012.
  11. Gray, A. , Sallis, P. , & MacDonell, S. , "Software forensics: Extending authorship analysis techniques to computer programs", Third biannual conference of the International Association of Forensic Linguists (IAFL '97), 1997.
  12. Mosteller, F. , & Wallace, D. L. , "Applied Bayesian and classical inference: The case of the Federalist Papers", Second edition, New York: Springer- Verlag, 1964.
  13. Mosteller, F. , & Wallace, D. L. , "Inference and disputed authorship: The Federalist. Reading", MA: Addison-Wesley, 1964.
  14. Mendenhall, T. C. , "The characteristic curves of composition", Science, 11(11), 237–249, 1887.
  15. Rudman, J. , "The state of authorship attribution studies: Some problems and solutions", Computers and the Humanities, 31, 351–365, 1998.
  16. Craig, H. , "Authorial attribution and computational stylistics: If you can tell authors apart, have you learned anything about them?", Literary and Linguistic Computing, 14(1), 103–113, 1999.
  17. Corney, M. , de Vel, O. , Anderson, A. , & Mohay, G. , "Gender-preferential text mining of E-mail discourse", Eighteeth annual Computer Security Applications Conference (ACSAC 2002), Las Vegas, NV, 2002.
  18. Argamon, S. , S ? ari´c, M. , & Stein, S. S. , "Style mining of electronic messages for multiple authorship discrimination", Proceedings of the 9th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (pp. 475–480). ACM Press, 2003.
  19. Koppel, M. , Argamon, S. , & Shimoni, A. R. , "Automatically categorizing written texts by author gender. Literary and Linguistic Computing, 17(4), 401–412, 2002.
  20. Chaski, C. , "Empirical evaluations of language-based author identication techniques",Forensic Linguistics, 8, 2001.
  21. Tweedie, F. J. , & Baayen, R. H. , " How variable may a constant be? Measures of lexical richness in perspective. Computers and the Humanities, 32, 323–352, 1998.
  22. Gui-Fa Teng'J, Mao-Sheng Lai I, Jian-Bin Ma', Ying Li, "E-mail Authorship Mining based on SVM for Computer Forensic", Proceedings of the Third International Conference on Machine Learning and Cybermetics, Shanghai, August, pp. 26-29, 2004.
Index Terms

Computer Science
Information Sciences

Keywords

Cyber Crime E-mail Forensic Analysis Author Identification Stylometric Techniques