Study on Social Network Forensics
Author:
Affiliation:

  • Article
  • | |
  • Metrics
  • |
  • Reference [16]
  • |
  • Related
  • | | |
  • Comments
    Abstract:

    Based on advances in computing technology and information technology, social networks have emerged as a new tool for people to exchange information and build interaction networks, and have become a key topic for social software studies in social computing. Social network forensics seeks to acquire, organize, analyze and visualize user information as direct, objective and fair evidence from a third-party perspective. Along with the rapid development of the Internet, social network forensics faces new challenges in dealing with user information being diverse, real-time and dynamic, huge in volume, and interactive, and also photo trustworthiness. It therefore has become a hot issue for opinion analysis, affective computing, content analysis in social networking relations, as well as individual, group and social behaviors in social networks and social computing. This paper designs a forensic model for social network forensics, and implements it on Sina microblogging. This model provides user information analysis, facial image recognition, and location presentation for trustworthiness analysis of digital evidence, and applies visualization to help reduce the difficulty of analysis and forensics on massive data from social networks.

    Reference
    [1] Wall D. Cybercrime: The Transformation of Crime in the Information Age. Polity, 2007. 14-16.
    [2] Dixon PD. An overview of computer forensics. Potentials, IEEE, 2005,24(5):7-10. [doi: 10.1109/MP.2005.1594001]
    [3] Garnkel SL. Digital forensics research: The next 10 years. Digital Investigation, 2010,7:64-73. [doi: 10.1016/j.diin.2010.05.009]
    [4] Kozushko H, Digital evidence. 2003. http://infohost.nmt.edu/~sfs/Students/HarleyKozushko/Papers/DigitalEvidencePaper.pdf
    [5] Agarwal A, Gupta M, Gupta S, Gupta SC. Systematic digital forensic investigation model. Int'l Journal of Computer Science and Security (IJCSS), 2011,5(1):118-131.
    [6] Pilli ES, Joshi RC, Niyogi R. A generic framework for network forensics. Int'l Journal of Computer Applications, 2010,1(11).
    [7] Slay J, Simon M, Irwin D. Voice over IP and forensics: A review of recent Australian work. In: Proc. of the 1st Int'l Conf. on Digital Forensics and Investigation (ICDFI). Beijing, 2012.
    [8] Meghanathan N, Allam SR, Moore LA. Tools and techniques for network forensics. Int'l Journal of Network Security & Its Applications (IJNSA), 2009,4,1(1):14-25.
    [9] Zhong LD. Forensic analysis of Web browser with dual layout engine. In: Proc. of the 1st Int'l Conf. on Digital Forensics and Investigation (ICDFI). Beijing, 2012.
    [10] Kent K, Chevalier S, Grance T, Dang H. Guide to integrating forensics into incident response. 2006. http://csrc.nist.gov/ publications/nistpubs/800-86/SP800-86.pdf
    [11] Erbacher RF, Christensen K, Sundberg A. Visual network forensic techniques and processes. In: Proc. of the 9th Annual NYS Cyber Security Conf. Symp. on Information Assurance. 2006. 72-80.
    [12] Wu CS, Qiu M. The method for obtaining electronic evidence from ASP dynamic website. Forensic Science and Technology, 2010,(5):43-45 (in Chinese with English abstract).
    [13] Ruan KY, Carthy J, Kechadi T, Crosbie M. Cloud forensics: An overview. In: Proc. of the Advances in Digital Forensics VII. 2012. 15-25.
    [14] Li YD, Hu DH, Fan YQ, Wu XD. Web page forensics: A Web spider based approach. In: Proc. of the 2nd Int'l Conf. on Digital Forensics and Investigation (ICDFI). 2013.
    [15] Huber M, Mulazzani M, Leithner M, Schrittwieser S, Wondracek G, Weippl E. Social snapshots: Digital forensics for online social networks. In: Proc. of the 27th Annual Computer Security Applications Conf. (ACSAC 2011). 2011. 113-122. [doi: 10.1145/ 2076732.2076748]
    [16] Qian X, Zhang Q, Huang XJ, Wu LD. 2D Trie for fast parsing. In: Proc. of the 23rd Int'l Conf. on Computational Linguistics (COLING 2010). Beijing: Association for Computational Linguistics, 2010. 904-912.Bolme DS, O'Hara S. PyVision—Computer vision toolkit. 2014. https://github.com/bolme/pyvision
    Related
    Cited by
    Comments
    Comments
    分享到微博
    Submit
Get Citation

吴信东,李亚东,胡东辉.社交网络取证初探.软件学报,2014,25(12):2877-2892

Copy
Share
Article Metrics
  • Abstract:6020
  • PDF: 9484
  • HTML: 2846
  • Cited by: 0
History
  • Received:May 05,2014
  • Revised:August 21,2014
  • Online: December 04,2014
You are the first2033151Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063