Skip to main content

Social Network Analysis Based on Authorship Identification for Cybercrime Investigation

  • Conference paper
Intelligence and Security Informatics (PAISI 2011)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6749))

Included in the following conference series:

Abstract

With the rapid development of Internet, cybercrime by means of Internet become serious. Mining their communication can be used to discover some latent criminal activities. Social network analysis is used for understanding their social communication status. But promulgating information on Internet is free. Criminals can hide in any corner by anonymity or forging their personal information. Authorship identification methods based on stylometry is necessary to identify criminal’s real authorship. So in this paper, social network analysis methods based on e-mail and blog was provided. Authorship identification using to judge authorship’s authenticity was proposed. Experiments on e-mail and blog dataset’s social network analysis were demonstrated.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Yang, C.V., Tobun, D.N.: Analyzing Content Development and Visualizing Social Interaction in Web Form. In: Proceedings of 2008 International Conference on Intelligence and Security Informatics,Taipei, pp. 25–30 (2008)

    Google Scholar 

  2. Freeman, L.: The Development of Social Network Analysis: A Study in the Sociology of Science. Empirical Press, Vancouver (2004)

    Google Scholar 

  3. Nadel, S.F.: The Theory of Social Structure. Cohen and West, London (1957)

    Google Scholar 

  4. Watts, D.: Six Degrees: The Science of a Connected Age. Norton & Company, America (1957)

    Google Scholar 

  5. Klovdahl, A.S., Potterat, J.J., Woodhouse, D.E., Muth, J.B., Muth, S.Q., Darrow, W.W.: Social Network and Infections Disease: the Colorado Springs Study. Social Science & Medicine 38, 79–88 (1994)

    Article  Google Scholar 

  6. Rosenthal, N., Fingrutd, M., Ethier, M., Karant, R., McDonald, D.: Social Movements and Network Analysis: A Case Study of Nineteenth-Century Women’s Reform in New York State. The American Journal of Sociology 90, 1022–1054 (1985)

    Article  Google Scholar 

  7. Basu, A.: Social network analysis of terrorist organization in india. In: 2006 Conference of the North American Association for Computational Social and Organizational Science, Notre Dame, USA (2006)

    Google Scholar 

  8. Memon, N., Larsen, H., Hicks, D., Harkiolakis, N.: Detecting hidden hierarchy in terrorist networks: some case studies. In: Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO International Workshops on Intelligence and Security Informatics,Taipei, pp. 477–489 (2008)

    Google Scholar 

  9. Fu, T., Chen, H.: Analysis of cyberactivism: a case study of online free tibet activities. In: Proceedings of 2008 IEEE International Conference on Intelligence and Security Informatics,Taipei, pp. 1–6 (2008)

    Google Scholar 

  10. Frantz, T., Carley, K.: Transforming raw-email data into social-network information. In: Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO International Workshops on Intelligence and Security Informatics, Taipei, pp. 413–420 (2008)

    Google Scholar 

  11. Bird, C., Gourley, A., Devanbu, P., Gertz, M., Swaminathan, A.: Mining email social networks. In: MSR 2006: Proceedings of the International Workshop on Mining Software Repositories, Shang hai,China, pp. 137–143 (2006)

    Google Scholar 

  12. Kernighan, B.W., Lin, S.: An efficient heuristic procedure for patitioning graphs. Bell System Technical Journal 49(2), 291–307 (1970)

    Article  MATH  Google Scholar 

  13. Newman, M.E.J.: Fast algorithm for detecting community structure in networks. Phys. Rev. E 69(6), 066133 (2004)

    Article  Google Scholar 

  14. Girvan, M., Newman, M.E.J.: Community structure in social and biological networks. Proceedings of the National Academy of Sciences of the United States of America 99(12), 7821–7826 (2001)

    Article  MATH  MathSciNet  Google Scholar 

  15. Abbasi, A., Chen, H.: Visualizing authorship for identification. In: Mehrotra, S., Zeng, D.D., Chen, H., Thuraisingham, B., Wang, F.-Y. (eds.) ISI 2006. LNCS, vol. 3975, pp. 60–71. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  16. Abbasi, A., Chen, H.: Writeprints: A Stylemetric Approach to Identity-Level Identification and Similarity Detection in Cyberspace. ACM Transactions on Information Systems 26(2) (2008)

    Google Scholar 

  17. Zheng, R., Li, J., Huang, Z., Chen, H.: A framework for authorship analysis of online messages: Writing-style features and techniques. Journal of the American Society for Information Science and Technology 57(3), 378–393 (2006)

    Article  Google Scholar 

  18. Zheng, R., Qin, Y., Huang, Z., Chen, H.: Authorship analysis in cybercrime investigation. In: Proceedings of the First International Symposium on Intelligence and Security Informatics, Tucson AZ, USA, pp. 59–73 (2003)

    Google Scholar 

  19. Teng, G.F., Lai, M.S., Ma, J.B., Li, Y.: E-mail Authorship Mining Based on SVM for Computer Forensic. In: Proceedings of 2004 International Conference on Machine Learning and Cybernetics, Shanghai, China, pp. 1204–1207 (2004)

    Google Scholar 

  20. Teng, G.F., Lai, M.S., Ma, J.B.: Selection and Extraction of Chinese E-mail Feature for Authorship Mining. Information 8(3), 437–442 (2005)

    Google Scholar 

  21. Ma, J.B., Li, Y., Teng, G.F.: Identifying chinese E-mail documents’ authorship for the purpose of computer forensic. In: Proceeding of 2008 IEEE Intelligence and Security Informatics Workshops, Taipei, pp. 251–259 (2008)

    Google Scholar 

  22. Ma, J.B., Teng, G.F., Zhang, Y.X., Li, Y.L., Li, Y.L.: A cybercrime forensic method for chinese web information authorship analysis. In: Chen, H., Yang, C.C., Chau, M., Li, S.-H. (eds.) PAISI 2009. LNCS, vol. 5477, pp. 14–24. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ma, J., Teng, G., Chang, S., Zhang, X., Xiao, K. (2011). Social Network Analysis Based on Authorship Identification for Cybercrime Investigation. In: Chau, M., Wang, G.A., Zheng, X., Chen, H., Zeng, D., Mao, W. (eds) Intelligence and Security Informatics. PAISI 2011. Lecture Notes in Computer Science, vol 6749. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22039-5_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22039-5_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22038-8

  • Online ISBN: 978-3-642-22039-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics