Author:
Haggerty John,Haggerty Sheryllynne,Taylor Mark
Abstract
Purpose
– The purpose of this paper is to propose a novel approach that automates the visualisation of both quantitative data (the network) and qualitative data (the content) within emails to aid the triage of evidence during a forensics investigation. Email remains a key source of evidence during a digital investigation, and a forensics examiner may be required to triage and analyse large email data sets for evidence. Current practice utilises tools and techniques that require a manual trawl through such data, which is a time-consuming process.
Design/methodology/approach
– This paper applies the methodology to the Enron email corpus, and in particular one key suspect, to demonstrate the applicability of the approach. Resulting visualisations of network narratives are discussed to show how network narratives may be used to triage large evidence data sets.
Findings
– Using the network narrative approach enables a forensics examiner to quickly identify relevant evidence within large email data sets. Within the case study presented in this paper, the results identify key witnesses, other actors of interest to the investigation and potential sources of further evidence.
Practical implications
– The implications are for digital forensics examiners or for security investigations that involve email data. The approach posited in this paper demonstrates the triage and visualisation of email network narratives to aid an investigation and identify potential sources of electronic evidence.
Originality/value
– There are a number of network visualisation applications in use. However, none of these enable the combined visualisation of quantitative and qualitative data to provide a view of what the actors are discussing and how this shapes the network in email data sets.
Subject
Library and Information Sciences,Management Science and Operations Research,Business and International Management,Management Information Systems
Reference25 articles.
1. Access Data
(2013), “Access Data”, available at: www.accessdata.com (accessed 30 October 2013).
2. BBC
(2012), “Paedophile ring members jailed indefinitely”, available at: www.bbc.co.uk/news/uk-england-19947914 (accessed 30 October 2013).
3. Chu, H.C.
,
Deng, D.J.
and
Park, J.H.
(2011), “Live data mining concerning social networking forensics based on a facebook session through aggregation of social data”, IEEE Journal on Selected Areas in Communications, Vol. 29 No. 7, pp. 1368-1376.
4. DeBarr, D.
,
Ramanathan, V.
and
Harry Wechsler, H.
(2013), “Phishing detection using traffic behavior, spectral clustering and random forests”, Proceedings of Intelligence and Security Informatics (ISI 2013) in Seattle, IEEE, Washington, DC, pp. 67-72.
5. Dou, W.
,
Wang, X.
,
Skau, D.
,
Ribarsky, W.
and
Zhou, M.X.
(2012), “LeadLine: interactive visual analysis of text data through event identification and exploration”, Proceedings of the IEEE Symposium on Visual Analytics Science and Technology in Seattle, IEEE, Washington, DC, pp. 93-102.
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献