Canadian Policing Research Catalogue

Mining writeprints from anonymous e-mails for forensic investigation / Farkhund Iqbal, Hamad Binsalleeh, Benjamin C. M. Fung, Mourad Debbabi.

This page has been archived on the Web

Information identified as archived is provided for reference, research or recordkeeping purposes. It is not subject to the Government of Canada Web Standards and has not been altered or updated since it was archived. Please contact us to request a format other than those available.

Location

Canadian Policing Research

Resource

e-Books

Authors

Publishers

  • [Place of publication not identified] : [Elsevier], 2009.

Bibliography

Includes bibliographical references.

Description

1 online resource (22 pages) : illustration, charts

Note

Author(s) affiliated with: Computer Security Laboratory, Faculty of Engineering and Computer Science, Concordia University.
Preprint submitted to Elsevier.
"17 December 2009".
Issued in Digital Investigation, 7 (1-2). pp. 56-64. ISSN 17422876

Summary

"Many criminals exploit the convenience of anonymity in the cyber world to conduct illegal activities. E-mail is the most commonly used medium for such activities. Extracting knowledge and information from e-mail text has become an important step for cybercrime investigation and evidence collection. Yet, it is one of the most challenging and time-consuming tasks due to special characteristics of e-mail dataset. In this paper, we focus on the problem of mining the writing styles from a collection of e-mails written by multiple anonymous authors. The general idea is to first cluster the anonymous e-mails by the stylometric features and then extract the writeprint, i.e., the unique writing style, from each cluster. We emphasize that the presented problem together with our proposed solution is different from the traditional problem of authorship identification, which assumes training data is available for building a classifier. Our proposed method is particularly useful in the initial stage of investigation, in which the investigator usually have very little information of the case and the true authors of suspicious e-mails collection. Experiments on a real-life dataset suggest that clustering by writing style is a promising approach for grouping e-mails written by the same author."--Page 1.

Subject

Online Access

Date modified: