Abstract
Email correspondence is regularly manhandled for directing social designing assaults including spamming, phishing, data fraud, and circulating malware. This is to a great extent credited to the issue of obscurity intrinsic. Finding the authorship of email which can be stated as attribution problem is contemplated as content classification issue where the styles of writing of people are displayed in view of their already composed documents. In this paper, Multiple Association Rules for Authorship Attribution (CMARAA) is proposed to solve the problem of authorship attribution. The proposed method makes the remarkable composition style of features of a person. The experimental evaluation shows that CMARAA classifies with 92% of accuracy being the most accurate algorithm when compared to other classification algorithms for different combinations of authors.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Casey E (2010) Handbook of digital forensics and investigation. Elsevier
de Vel O (2000) Mining e-mail authorship. KDD workshop on text mining
Iqbal F, Khan LA, Fung BCM, Debbabi M (2010) E-mail authorship verification for forensic investigation. In: Proceedings of the 25th ACM SIGAPP symposium on applied computing (SAC), ACM Press
Koppel M, Schler J, Argamon S, Messeri E (2006) Authorship attribution with thousands of candidate authors. In: Proceedings of the 29th annual international ACM SIGIR conference on Research and development in information retrieval
Stamatatos E (2009) A survey of modern authorship attribution methods. J Am Soc Inf Sci Technol (JASIST)
Grieve J (2007) Quantitative authorship attribution: an evaluation of techniques. Lit Linguist Comput
Abbasi A, Chen H (2008) Writeprints: a stylometric approach to identity-level identification and similarity detection in cyberspace. ACM Trans Inf Syst 26(2):7
Mendenhall TC (1887) The characteristic curves of composition. JSTOR
de Vel O, Anderson A, Corney M, Mohay G (2001) Multi-topic e-mail authorship attribution forensics. In: Proceedings of ACM conference on computer security e workshop on data mining for security
de Vel O, Anderson A, Corney M, Mohay G (2001) Mining e-mail content for author identification forensics. SIGMOD
Ledger GR, Merriam TVN (1994) Shakespeare, fletcher, and the two noble kinsmen. Lit Linguist Comput
Iqbal F, Binsalleeh H, Fung BCM, Debbabi M (2010) Mining writeprints from anonymous e-mails for forensic investigation. Digit Investing
Iqbal F, Binsalleeh H, Fung BCM, Debbabi M (2013) A unified data mining solution for authorship analysis in anonymous textual communications. Inf Sci Special Issue Data Min Inf Secure
Teng G, Lai M, Ma J, Li Y (2004) E-mail authorship mining based on SVM for computer forensic. In: Proceedings of the 3rd international conference on machine learning and cyhemetics
Corney M, de Vel O, Anderson A, Mohay G (2002) Gender-preferential text mining of e-mail discourse. In: Proceedings of the 18th annual computer security applications conference (ACSAC)
Ding SHH, Fung BCM, Debbabi M (2015) A visualizable evidence-driven approach for authorship attribution. ACM Trans Inf Syst Secur (TISSEC)
Acknowledgements
The authors would like to acknowledge and thank technical education quality improvement program TEQIP phase III, BMS College of Engineering for funding this research work.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Patil, S., Nadimpalli, S.V., Yadav, P.K. (2019). Email Authorship Attribution. In: Saini, H., Singh, R., Kumar, G., Rather, G., Santhi, K. (eds) Innovations in Electronics and Communication Engineering. Lecture Notes in Networks and Systems, vol 65. Springer, Singapore. https://doi.org/10.1007/978-981-13-3765-9_47
Download citation
DOI: https://doi.org/10.1007/978-981-13-3765-9_47
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-3764-2
Online ISBN: 978-981-13-3765-9
eBook Packages: EngineeringEngineering (R0)