Skip to main content

Digital Forensics 2.0

A Review on Social Networks Forensics

  • Chapter

Part of the book series: Studies in Computational Intelligence ((SCI,volume 555))

Abstract

Nowadays, Social Networks (SNs) are penetrating into all areas of human life including relationships, shopping, education and so on and this growing expansion is inevitable. In addition to their invaluable benefits, due to the plethora of confidential private/corporate information in SNs, these places become the potential target for criminal/illegal activities such as identity theft, fraud, organized crimes and even terrorist attacks. To cope with such issues, it is useful to incorporate social network forensics (SNF) techniques for analyzing and surveying social interactions to detect, predict and prevent all forms of potential criminal activities. This chapter is organized in two main parts. First, SNs, their security and privacy issues are introduced and analyzed. Then, as a reference point for future studies in the field, forensics methods within SNs are explained and classified; then the related literature is reviewed.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD   109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Hampton, K., et al.: Social networking sites and our lives. Technical report, Pew Internet & American Life Project (2011)

    Google Scholar 

  2. Rainie, L., Smith, A.: Politics on Social Networking Sites. press release, Pew Research Center (September 4, 2012), http://www.pewinternet.org/Press-Releases/2012/Politics-on-Social-Networking-Sites.aspx

  3. Cheng, J., et al.: Forensics Tools for Social Network Security Solutions. In: Proceedings of Student-Faculty Research Day. CSIS, Pace University, NY, USA (2009)

    Google Scholar 

  4. Silva, M., et al.: Virtual Forensics: Social Network Security Solutions. In: Proceedings of Student-Faculty Research Day. CSIS, Pace University, NY, USA (2009)

    Google Scholar 

  5. O’Reilly, T.: What is Web 2.0-Design Patterns and Business Models for the Next Generation of Software (2005), http://www.oreillynet.com/pub/a/oreilly/tim/news/2005/09/30/what-is-web-20.html (accessed February 2013)

  6. Rimskii, V.: The influence of the Internet on active social involvement and the formation and development of identities. Russian Social Science Review 52(1), 79–101 (2011)

    Google Scholar 

  7. Edosomwan, S., et al.: The History of Social Media and its Impact on Business. The Journal of Applied Management and Entrepreneurship 16(3) (2011)

    Google Scholar 

  8. Boyd, D.M., Ellison, N.B.: Social network sites: Definition, history, and scholarship. Journal of Computer-Mediated Communication 13(1), article 11 (2007)

    Google Scholar 

  9. Coyle, C.L., Vaughn, H.: Social networking: Communication revolution or evolution? Bell Labs Technical Journal 13(2), 13–17 (2008)

    Article  Google Scholar 

  10. Geierhos, M., Ebrahim, M.: Customer Interaction Management Goes Social: Getting Business Processes Plugged in Social Networks. In: Computational Social Networks, pp. 367–389. Springer, London (2012)

    Chapter  Google Scholar 

  11. Costa, A.A., Tavares, L.V.: Social e-business and the Satellite Network model: Innovative concepts to improve collaboration in construction. Automation in Construction 22, 387–397 (2012)

    Article  Google Scholar 

  12. Zhu, Z.: Discovering the influential users oriented to viral marketing based on online social networks. Physica A: Statistical Mechanics and its Applications 392(16), 3459–3469 (2013)

    Article  MathSciNet  Google Scholar 

  13. Domingo, M.C.: Managing Healthcare through Social Networks. Computer 43(7), 20–25 (2010)

    Article  Google Scholar 

  14. Meltzer, D., et al.: Exploring the use of social network methods in designing healthcare quality improvement teams. Social Science & Medicine 71(6), 1119–1130 (2010)

    Article  Google Scholar 

  15. Li, S., Hao, F., Li, M., Kim, H.-C.: Medicine Rating Prediction and Recommendation in Mobile Social Networks. In: Park, J.J(J.H.), Arabnia, H.R., Kim, C., Shi, W., Gil, J.-M. (eds.) GPC 2013. LNCS, vol. 7861, pp. 216–223. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  16. Greenhow, C., Schultz, K.: Using online social networks to support underrepresented students’ engagement in postsecondary education. In: Chinn, C.A., et al. (eds.) Proceedings of the 8th International Conference on Computer Supported Collaborative Learning (CSCL 2007). International Society of the Learning Sciences, pp. 232–233 (2007)

    Google Scholar 

  17. Fardoun, H.M., Alghazzawi, D.M., López, S.R., Penichet, V.M.R., Gallud, J.A.: Online Social Networks Impact in Secondary Education. In: Vittorini, P., Gennari, R., Marenzi, I., de la Prieta, F., Rodríguez, J.M.C. (eds.) International Workshop on Evidence-Based TEL. AISC, vol. 152, pp. 37–45. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  18. Miloslava, Č., et al.: Utilization of learning management systems & social networking systems not only in the process of education. In: Mastorakis, N., et al. (eds.) Proceedings of the 10th WSEAS International Conference on Communications, Electrical & Computer Engineering, and 9th WSEAS International Conference on Applied Electromagnetics, Wireless and Optical Communications (ACELAE 2011), pp. 154–159. World Scientific and Engineering Academy and Society (WSEAS), Stevens Point (2011)

    Google Scholar 

  19. Potts, J., et al.: Social network markets: a new definition of the creative industries. Journal of Cultural Economics 32(3), 167–185 (2008)

    Article  Google Scholar 

  20. Dong, Y., et al.: TeleDatA: data mining, social network analysis and statistics analysis system based on cloud computing in telecommunication industry. In: Proceedings of the Third International Workshop on Cloud Data Management (CloudDB 2011), pp. 41–48. ACM, New York (2011)

    Chapter  Google Scholar 

  21. Felzensztein, C., Gimmon, E.: Industrial clusters and social networking for enhancing inter-firm cooperation: the case of natural resources-based industries in Chile. Journal of Business Market Management 2(4), 187–202 (2008)

    Article  Google Scholar 

  22. ter Maat, J.: Identifying centrality metrics for different types of social networks. In: The 18th Twente Student Conference, Enschede, Netherlands (2008), http://referaat.cs.utwente.nl/conference/18/paper

  23. Takaffoli, M., et al.: A framework for analyzing dynamic social networks. In: 7th Conference on Applications of Social Network Analysis (ASNA 2010). University of Zurich (2010)

    Google Scholar 

  24. Dwyer, C., et al.: Trust and privacy concerns within social networking sites: A comparison of Facebook and MySpace. In: Proceedings of the 13th Americas Conference on Information Systems. Keystone, Colorado (2007)

    Google Scholar 

  25. Subrahmanyam, K., et al.: Online and offline social networks: Use of social networking sites by emerging adults. Journal of Applied Developmental Psychology 29(6), 420–433 (2008)

    Article  Google Scholar 

  26. Toriumi, F., et al.: Classification of social network sites based on network indexes and communication patterns. In: Proceedings of International Workshop on Social Web Mining Co-located with The Twenty-Second International Joint Conference on Artificial Intelligence (IJCAI) (2011)

    Google Scholar 

  27. Yammer, The Enterprise Social Network, https://www.yammer.com/

  28. Conti, M., Hasani, A., Crispo, B.: Virtual private social networks. In: Proceedings of the first ACM Conference on Data and Application Security and Privacy (CODASPY 2011), pp. 39–50. ACM, New York (2011)

    Chapter  Google Scholar 

  29. Allman, M.: On building special-purpose social networks for emergency communication. ACM SIGCOMM Computer Communication Review 40(5), 27–34 (2010)

    Article  Google Scholar 

  30. http://nucleusresearch.com/news/press-releases/facebook-costs-companies-1-dot-5-percent-of-total-productivity/ (accessed May 2013)

  31. Isheriff.: Strategies for managing social networking and personal web use in the workplace. White paper. Isheriff Company, Costa Mesa (2010)

    Google Scholar 

  32. Rooksby, J., et al.: Social Networking and the Workplace. School of Computer Science, North Haugh, University of St Andrews (2009)

    Google Scholar 

  33. http://www.dailymail.co.uk/femail/article-2080398/Facebook-cited-THIRD-divorces.html (accessed March 2013)

  34. http://www.guardian.co.uk/technology/2011/mar/08/facebook-us-divorces (accessed March 2013)

  35. http://nakedsecurity.sophos.com/2012/05/04/13-million-us-facebook-users-not-using-or-oblivious-to-privacy-controls/ (accessed May 2013)

  36. http://nakedsecurity.sophos.com/2012/08/02/fake-facebook-accounts (accessed May 2013)

  37. http://www.infosecurity-magazine.com/view/23520/outhoover-hoover-fbi-wants-massive-datamining-capability-for-social-media/ (accessed May 2013)

  38. Chen, Y.: Research on Social Media Network and National Security. In: Du, W. (ed.) Informatics and Management Science II. LNEE, vol. 205, pp. 593–599. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  39. Abdulhamid, S., et al.: Privacy and National Security Issues in Social Networks: the Challenges. International Journal of the Computer, the Internet and Management 19(3), 14–20 (2011)

    Google Scholar 

  40. Hare, F., Goldstein, J.: The interdependent security problem in the defense industrial base: An agent-based model on a social network. International Journal of Critical Infrastructure Protection 3(3), 128–139 (2010)

    Article  Google Scholar 

  41. Symantec Corporation: Internet Security Threat Report, 2012 Trends (18), 32 (2013)

    Google Scholar 

  42. Gao, H., et al.: Security issues in online social networks. IEEE Internet Computing 15(4), 56–63 (2011)

    Article  Google Scholar 

  43. Brown, G., et al.: Social Networks and Context- Aware Spam. In: Proceedings of ACM Conference on Computer Supported Cooperative Work (CSCW 2008), pp. 403–412. ACM Press (2008)

    Google Scholar 

  44. Galam, S.: Modeling rumors: the no plane Pentagon French hoax case. Physica A: Statistical Mechanics and Its Applications 320, 571–580 (2003)

    Article  MATH  MathSciNet  Google Scholar 

  45. Kimmel, A.J.: Rumors and the financial marketplace. The Journal of Behavioral Finance 5(3), 134–141 (2004)

    Article  MathSciNet  Google Scholar 

  46. Nekovee, M., Moreno, Y., Bianconi, G., Marsili, M.: Theory of rumor spreading in complex social networks. Physica A: Statistical Mechanics and its Applications 374(1), 457–470 (2007)

    Article  Google Scholar 

  47. Karp, R., et al.: Randomized rumor spreading. In: Proceedings of the 41st Annual Symposium on Foundations of Computer Science, pp. 565–574. IEEE (2000)

    Google Scholar 

  48. Sauerwald, T., Stauffer, A.: Rumor spreading and vertex expansion on regular graphs. In: Proceedings of the Twenty-Second Annual ACM-SIAM Symposium on Discrete Algorithms, pp. 462–475. SIAM (2011)

    Google Scholar 

  49. Xu, W., Zhang, F., Zhu, S.: Toward Worm Detection in Online Social Networks. In: Proceedings 26th Annual Computer Security Applications Conference (ACSAC 2010), pp. 11–20. ACM Press (2010)

    Google Scholar 

  50. Schmugar, C.: The Future of Social Networking Sites. McAfee Security Journal: Security Vision from McAfee Labs, 28–30 (2008)

    Google Scholar 

  51. http://www.net-security.org/secworld.php?id=10661 (accessed May 2013)

  52. Zheleva, E., Getoor, L.: Privacy in social networks: A survey. In: Aggarwal, C.C. (ed.) Social Network Data Analytics, pp. 277–306. Springer, US (2011)

    Chapter  Google Scholar 

  53. Beach, A., et al.: Solutions to security and privacy issues in mobile social networking. In: Proceedings of International Conference on Computational Science and Engineering (CSE 2009), vol. 4, pp. 1036–1042. IEEE (2009)

    Google Scholar 

  54. Rodríguez, E., et al.: A Digital Rights Management approach to privacy in online social networks. In: Workshop on Privacy and Protection in Web-based Social Networks (within ICAIL 2009), Barcelona (2009)

    Google Scholar 

  55. Johnson, M., Egelman, S., Bellovin, S.M.: Facebook and privacy: it’s complicated. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, Article 9. ACM (2012)

    Google Scholar 

  56. Sahinoglu, M., Akkaya, A.D., Ang, D.: Can We Assess and Monitor Privacy and Security Risk for Social Networks? Procedia-Social and Behavioral Sciences 57, 163–169 (2012)

    Article  Google Scholar 

  57. Fang, L., LeFevre, K.: Privacy wizards for social networking sites. In: Proceedings of the 19th International Conference on World Wide Web, pp. 351–360. ACM (2010)

    Google Scholar 

  58. Kafali, O., et al.: PROTOSS: A Run Time Tool for Detecting Privacy Violations in Online Social Networks. In: Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012), pp. 429–433. IEEE Computer Society, Washington, DC (2012)

    Chapter  Google Scholar 

  59. Sundsoy, P.R., et al.: The Activation of Core Social Networks in the Wake of the Oslo Bombing. In: Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012), pp. 586–590. IEEE Computer Society, Washington, DC (2012)

    Chapter  Google Scholar 

  60. Memon, N., Larsen, H.L., Hicks, D., Harkiolakis, N.: Detecting Hidden Hierarchy in Terrorist Networks: Some Case Studies. In: Yang, C.C., et al. (eds.) ISI Workshops 2008. LNCS, vol. 5075, pp. 477–489. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  61. Memon, N., et al.: Understanding the structure of terrorist networks. Int. J. Bus. Intell. Data Min. 2(4), 401–425 (2007)

    Article  Google Scholar 

  62. Morselli, C., Décary-Hétu, D.: Crime Facilitation Purposes of Social Networking Sites: A Review and Analysis of the " cyberbanging" Phenomenon. Public Safety Canada, Ottawa (2010)

    Google Scholar 

  63. Womer, S., Bunker, R.J.: Surños Gangs and Mexican Cartel Use of Social Networking Sites. Small Wars & Insurgencies 21(1), 81–94 (2010)

    Article  Google Scholar 

  64. Palmer, G.: A road map for digital forensics research. Technical Report from the first Digital Forensics Research Workshop (DFRWS), Utica, New York (2001)

    Google Scholar 

  65. http://www.mashable.com/2012/02/13/social-media-forensics (accessed March 2013)

  66. Zhao, H., et al.: Behavior modeling and forensics for multimedia social networks. IEEE Signal Processing Magazine 26(1), 118–139 (2009)

    Article  Google Scholar 

  67. Lau, S.: Uncovering Communications: A Forensic Look at Online Social Networking Communities. Financial Fraud Law Report (2009)

    Google Scholar 

  68. Nagy, Z.: Social media risks from forensic point of view. International Journal of Computers and Communications 6(4), 245–253 (2012)

    Google Scholar 

  69. Huber, M., et al.: Social snapshots: Digital forensics for online social networks. In: Proceedings of the 27th Annual Computer Security Applications Conference, pp. 113–122. ACM (2011)

    Google Scholar 

  70. Zainudin, N.M., Merabti, M., Llewellyn-Jones, D.: A Digital Forensic Investigation Model for Online Social Networking. In: Proceedings of The 11th Annual Conference on the Convergence of Telecommunications, Networking & Broadcasting (PGNet 2010), Liverpool, UK, pp. 21–22 (2010)

    Google Scholar 

  71. Mulazzani, M., et al.: Social Network Forensics: Tapping the Data Pool of Social Network. In: Eighth Annual IFIP WG 11.9 International Conference on Digital Forensics. University of Pretoria, Pretoria (2012)

    Google Scholar 

  72. Castiglione, A., Cattaneo, G., De Santis, A.: A forensic analysis of images on online social networks. In: Proceedings of Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), pp. 679–684. IEEE (2011)

    Google Scholar 

  73. Araujo-Valdez, K., et al.: Social Network Forensic Tools. In: Proceedings of Student-Faculty Research Day. CSIS, Pace University, NY, USA (2012)

    Google Scholar 

  74. Al Mutawa, N., Baggili, I., Marrington, A.: Forensic analysis of social networking applications on mobile devices. Digital Investigation 9, 24–33 (2012)

    Article  Google Scholar 

  75. Lau, R.Y.K., et al.: Social Media Analytics for Cyber Attack Forensic. International Journal of Research in Engineering and Technology (IJRET) 1(4), 217–220 (2012)

    Google Scholar 

  76. Chu, H.C., Deng, D.J., Park, J.H.: Live data mining concerning social networking forensics based on a Facebook session through aggregation of social data. IEEE Journal on Selected Areas in Communications 29(7), 1368–1376 (2011)

    Article  Google Scholar 

  77. Son, J.: Social Network Forensics: Evidence Extraction Tool Capabilities. Masters Theses, AUT University (2012)

    Google Scholar 

  78. Alzaidy, R.: Criminal Network Mining and Analysis for Forensic Investigations. Doctoral dissertation, Faculty of Engineering and Computer Science, Concordia University, Canada (2010)

    Google Scholar 

  79. Ressler, S.: Social network analysis as an approach to combat terrorism: past, present, and future research. Homeland Security Affairs 2(2), 1–10 (2006)

    Google Scholar 

  80. Svenson, P., Svensson, P., Tullberg, H.: Social Network Analysis And Information Fusion For Anti-Terrorism. In: Proceedings of the Conference on Civil and Military Readiness 2006 (CIMI 2006), Enköping, Stockholm, Sweden, paper S3.1 (2006)

    Google Scholar 

  81. Lu, Y., et al.: Social network analysis of a criminal hacker community. Journal of Computer Information Systems 51(2), 31–41 (2010)

    Google Scholar 

  82. Yang, C.C., Sageman, M.: Analysis of terrorist social networks with fractal views. Journal of Information Science 35(3), 299–320 (2009)

    Article  Google Scholar 

  83. Kerschbaum, F., Schaad, A.: Privacy-preserving social network analysis for criminal investigations. In: Proceedings of the 7th ACM Workshop on Privacy in the Electronic Society, pp. 9–14. ACM (2008)

    Google Scholar 

  84. L’Huillier, G., et al.: Topic-based social network analysis for virtual communities of interests in the dark web. SIGKDD Explor. Newsl. 12(2), 66–73 (2011)

    Article  MathSciNet  Google Scholar 

  85. http://www.nytimes.com/2012/01/14/us/federal-security-program-monitored-public-opinion.html?_r=0 (accessed March 2013)

  86. news.bbc.co.uk/2/hi/7962631.stm (accessed May 2013)

  87. Chakraborty, A., et al.: SPAM: A Framework for Social Profile Abuse Monitoring. Course Project, Department of Computer Science. Stony Brook University (2012), http://www.cs.sunysb.edu/~aychakrabort/courses/cse508/

  88. Corley, C.D., et al.: Monitoring influenza trends through mining social media. In: International Conference on Bioinformatics & Computational Biology, pp. 340–346 (2009)

    Google Scholar 

  89. Patrick, A.S.: Monitoring corporate password sharing using social network analysis. In: International Sunbelt Social Network Conference. St. Pete Beach, Florida (2008)

    Google Scholar 

  90. Sindhu, K.K., Meshram, B.B.: Digital Forensics and Cyber Crime Datamining. Journal of Information Security 3(3), 196–201 (2012)

    Article  Google Scholar 

  91. Brown, R., Pham, B., de Vel, O.: Design of a digital forensics image mining system. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds.) KES 2005. LNCS (LNAI), vol. 3683, pp. 395–404. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  92. Qin, L.: Data mining method based on computer forensics-based ID3 algorithm. In: Proceedings of the 2nd IEEE International Conference on Information Management and Engineering (ICIME), pp. 340–343. IEEE (2010)

    Google Scholar 

  93. Reid, E., Qin, J., Chung, W., Xu, J., Zhou, Y., Schumaker, R., Sageman, M., Chen, H.: Terrorism knowledge discovery project: A knowledge discovery approach to addressing the threats of terrorism. In: Chen, H., Moore, R., Zeng, D.D., Leavitt, J. (eds.) ISI 2004. LNCS, vol. 3073, pp. 125–145. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  94. Ozgul, F., Bondy, J., Aksoy, H.: Mining for offender group detection and story of a police operation. In: Proceedings of the Sixth Australasian Conference on Data Mining and Analytics, vol. 70, pp. 189–193. Australian Computer Society, Inc. (2007)

    Google Scholar 

  95. Xu, J.J., Chen, H.: CrimeNet explorer: a framework for criminal network knowledge discovery. ACM Transactions on Information Systems (TOIS) 23(2), 201–226 (2005)

    Article  Google Scholar 

  96. Chaurasia, N., et al.: A Survey on Terrorist Network Mining: Current Trends and Opportunities. International Journal of Computer Science and Engineering Survey 3(4) (2012)

    Google Scholar 

  97. Hosseinkhani, J., Chaprut, S., Taherdoost, H.: Criminal Network Mining by Web Structure and Content Mining. In: Proceedings of the 11th WSEAS International Conference on Information Security and Privacy (ISP 2012), Prague, Czech Republic, pp. 210–215 (2012)

    Google Scholar 

  98. Nohuddin, P.N., et al.: Finding “interesting” trends in social networks using frequent pattern mining and self organizing maps. Knowledge-Based Systems 29, 104–113 (2012)

    Article  Google Scholar 

  99. Maruhashi, K., Guo, F., Faloutsos, C.: MultiAspectForensics: Pattern mining on large-scale heterogeneous networks with tensor analysis. In: Proceedings of International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 203–210. IEEE (2011)

    Google Scholar 

  100. Brandes, U., Wagner, D.: Analysis and visualization of social networks. In: Graph Drawing Software, pp. 321–340. Springer, Heidelberg (2004)

    Google Scholar 

  101. Henry, N., Fekete, J.D., McGuffin, M.J.: NodeTrix: a hybrid visualization of social networks. IEEE Transactions on Visualization and Computer Graphics 13(6), 1302–1309 (2007)

    Article  Google Scholar 

  102. Boman, M., et al.: Social network visualization as a contact tracing tool. In: Proceedings of the First International Workshop on Agent Technology for Disaster Management, pp. 131–133 (2006)

    Google Scholar 

  103. Bosma, M., Meij, E., Weerkamp, W.: A framework for unsupervised spam detection in social networking sites. In: Baeza-Yates, R., de Vries, A.P., Zaragoza, H., Cambazoglu, B.B., Murdock, V., Lempel, R., Silvestri, F. (eds.) ECIR 2012. LNCS, vol. 7224, pp. 364–375. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  104. Gao, H., et al.: Detecting and characterizing social spam campaigns. In: Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement, pp. 35–47. ACM (2010)

    Google Scholar 

  105. Stringhini, G., Kruegel, C., Vigna, G.: Detecting spammers on social networks. In: Proceedings of the 26th Annual Computer Security Applications Conference, pp. 1–9. ACM (2010)

    Google Scholar 

  106. Wang, D., Irani, D., Pu, C.: A social-spam detection framework. In: Proceedings of the 8th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference, pp. 46–54. ACM (2011)

    Google Scholar 

  107. Huber, M., et al.: Exploiting social networking sites for spam. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 693–695 (2010)

    Google Scholar 

  108. Lumezanu, C., Feamster, N.: Observing common spam in Twitter and email. In: Proceedings of the 2012 ACM Conference on Internet Measurement Conference (IMC 2012), pp. 461–466. ACM, New York (2012)

    Chapter  Google Scholar 

  109. Wang, A.H.: Detecting spam bots in online social networking sites: A machine learning approach. In: Foresti, S., Jajodia, S. (eds.) Data and Applications Security and Privacy XXIV. LNCS, vol. 6166, pp. 335–342. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  110. Sharma, A., Panigrahi, P.K.: A Review of Financial Accounting Fraud Detection based on Data Mining Techniques. International Journal of Computer Applications 39(1), 37–47 (2012)

    Article  Google Scholar 

  111. Wiil, U.K., Memon, N., Karampelas, P.: Detecting new trends in terrorist networks. In: Proceedings of International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 435–440. IEEE (2010)

    Google Scholar 

  112. Halalai, R., Lemnaru, C., Potolea, R.: Distributed community detection in social networks with genetic algorithms. In: Proceedings of International Conference on Intelligent Computer Communication and Processing (ICCP), pp. 35–41. IEEE (2010)

    Google Scholar 

  113. Blondel, V.D., et al.: Fast unfolding of communities in large networks. Journal of Statistical Mechanics: Theory and Experiment (10), P10008 (2008)

    Google Scholar 

  114. Greene, D., Doyle, D., Cunningham, P.: Tracking the evolution of communities in dynamic social networks. In: Proceedings of International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 176–183. IEEE (2010)

    Google Scholar 

  115. Altshuler, Y., Fire, M., Shmueli, E., Elovici, Y., Bruckstein, A., Pentland, A(S.), Lazer, D.: Detecting Anomalous Behaviors Using Structural Properties of Social Networks. In: Greenberg, A.M., Kennedy, W.G., Bos, N.D. (eds.) SBP 2013. LNCS, vol. 7812, pp. 433–440. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  116. Heard, N.A., et al.: Bayesian anomaly detection methods for social networks. The Annals of Applied Statistics 4(2), 645–662 (2010)

    Article  MATH  MathSciNet  Google Scholar 

  117. Bilgin, C.C., Yener, B.: Dynamic Network Evolution: Models, Clustering, Anomaly detection. IEEE Networks (2006)

    Google Scholar 

  118. Gupta, N., Dey, L.: Detection and Characterization of Anomalous Entities in Social Communication Networks. In: Proceedings of 20th International Conference on Pattern Recognition (ICPR), pp. 738–741. IEEE (2010)

    Google Scholar 

  119. Chen, Z., Hendrix, W., Samatova, N.F.: Community-based anomaly detection in evolutionary networks. Journal of Intelligent Information Systems 39(1), 59–85 (2012)

    Article  Google Scholar 

  120. Krombholz, K., Merkl, D., Weippl, E.: Fake identities in social media: A case study on the sustainability of the Facebook business model. Journal of Service Science Research 4(2), 175–212 (2012)

    Article  Google Scholar 

  121. Dinakar, K., et al.: Common sense reasoning for detection, prevention, and mitigation of cyberbullying. ACM Transactions on Interactive Intelligent Systems (TiiS) 2(3), Article 18 (2012)

    Google Scholar 

  122. Ying, X., Wu, X., Barbará, D.: Spectrum based fraud detection in social networks. In: Proceedings of 27th International Conference on Data Engineering (ICDE), pp. 912–923. IEEE (2011)

    Google Scholar 

  123. Cetintas, S., et al.: Identifying similar people in professional social networks with discriminative probabilistic models. In: Proceedings of the 34th International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 1209–1210. ACM (2011)

    Google Scholar 

  124. Liu, X., Troncy, R., Huet, B.: Using social media to identify events. In: Proceedings of the 3rd ACM SIGMM International Workshop on Social Media, pp. 3–8. ACM (2011)

    Google Scholar 

  125. Saraf, P., et al.: Social Media Analysis and Geospatial Crime Report Clustering for Crime Prediction & Prevention. Data Analytics Course Project, Department of Computer Science. Virginia Tech University (2011)

    Google Scholar 

  126. Uchida, C.D.: Predictive Policing in Los Angeles: Planning and Development. Justice & Security Strategies, Inc. (2009)

    Google Scholar 

  127. http://rt.com/news/software-tracks-predicts-raytheon-878/ (accessed June 2013)

  128. Liben‐Nowell, D., Kleinberg, J.: The link‐prediction problem for social networks. Journal of the American Society for Information Science and Technology 58(7), 1019–1031 (2007)

    Google Scholar 

  129. Chaurasia, N., et al.: Exploring the Current Trends and Future Prospects in Terrorist Network Mining. In: Wyld, C.D., et al. (eds.) Proceedings of The Second International Conference on Computer Science, Engineering and Applications (CCSEA 2012), Delhi, India, vol. 2(2) (2012)

    Google Scholar 

  130. Grover, V., Adderley, R., Bramer, M.: Review of current crime prediction techniques. In: Springer London, Applications and Innovations in Intelligent Systems XIV, pp. 233–237 (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to MohammadReza Keyvanpour .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Keyvanpour, M., Moradi, M., Hasanzadeh, F. (2014). Digital Forensics 2.0. In: Muda, A., Choo, YH., Abraham, A., N. Srihari, S. (eds) Computational Intelligence in Digital Forensics: Forensic Investigation and Applications. Studies in Computational Intelligence, vol 555. Springer, Cham. https://doi.org/10.1007/978-3-319-05885-6_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-05885-6_2

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-05884-9

  • Online ISBN: 978-3-319-05885-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics