Formal knowledge model for online social network forensics

被引:17
|
作者
Arshad, Humaira [1 ]
Jantan, Aman [2 ]
Hoon, Gan Keng [2 ]
Abiodun, Isaac Oludare [2 ]
机构
[1] Islamia Univ Bahawalpur, Bahawalpur, Pakistan
[2] Univ Sains Malaysia, Sch Comp Sci, George Town, Malaysia
关键词
Forensic automation; Knowledge model; Formal model; Forensic ontology; Online social network forensics; RECONSTRUCTION; CHALLENGES; SCIENCE; EVENT;
D O I
10.1016/j.cose.2019.101675
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Currently, examining social media networks is an integral part of most investigations. However, getting a clear view of the events relevant to the incident from a large set of data, such as social media, is a challenging task. Automation of the forensic and analysis process is the only solution to manage large data sets and get useful information. However, automation in digital forensics is a technical issue with legal implications. The legal system accepts only those automated processes that are reproducible, explainable, and rigorously testable. Therefore, automated forensic processes must be based on formal theories, which are rare in digital forensics. This article explains a theoretical and formal knowledge model for forensic automation on online social networks. This model consists of an event-based knowledge model, which provides theoretical concepts that can assist in the construction and interpretation of the events related to the incident under investigation. The proposed model is implemented through an ontology to provide semantically rich and formal representation to the concepts. This article also describes the feasibility of legally acceptable automated analysis operators, based on a formal theory, for online social network forensics. (C) 2019 Elsevier Ltd. All rights reserved.
引用
收藏
页数:11
相关论文
共 50 条
  • [1] The Ethics of Online Social Network Forensics
    Kim, Jongwoo
    Baskerville, Richard
    Ding, Yi
    [J]. E-LIFE: WEB-ENABLED CONVERGENCE OF COMMERCE, WORK, AND SOCIAL LIFE, WEB 2015, 2016, 258 : 97 - 111
  • [2] Social Network Forensics Analysis Model Based on Network Representation Learning
    Zhao, Kuo
    Zhang, Huajian
    Li, Jiaxin
    Pan, Qifu
    Lai, Li
    Nie, Yike
    Zhang, Zhongfei
    [J]. ENTROPY, 2024, 26 (07)
  • [3] A cloud-based forensics tracking scheme for online social network clients
    Lin, Feng-Yu
    Huang, Chien-Cheng
    Chang, Pei-Ying
    [J]. FORENSIC SCIENCE INTERNATIONAL, 2015, 255 : 64 - 71
  • [4] A SURVEY OF SOCIAL NETWORK FORENSICS
    Karabiyik, Umit
    Canbaz, Muhammed Abdullah
    Aksoy, Ahmet
    Tuna, Tayfun
    Akbas, Esra
    Gonen, Bilal
    Aygun, Ramazan S.
    [J]. JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, 2016, 11 (04) : 55 - 128
  • [5] USING SOCIAL SOFTWARE FOR PERSONAL KNOWLEDGE MANAGEMENT IN FORMAL ONLINE LEARNING
    Pettenati, Maria Chiara
    Cigognini, Elisabetta
    Mangione, Jose
    Guerin, Elizabeth
    [J]. TURKISH ONLINE JOURNAL OF DISTANCE EDUCATION, 2007, 8 (03): : 52 - 65
  • [6] Social Snapshots: Digital Forensics for Online Social Networks
    Huber, Markus
    Mulazzani, Martin
    Leithner, Manuel
    Schrittwieser, Sebastian
    Wondracek, Gilbert
    Weippl, Edgar
    [J]. 27TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2011), 2011, : 113 - 122
  • [7] Knowledge based Community Detection in Online Social Network
    Dey, Paramita
    Chatterjee, Agneet
    Roy, Sarbani
    [J]. 2018 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS (COMSNETS), 2018, : 637 - 642
  • [8] Online Network Forensics for Automatic Repair Validation
    Locasto, Michael E.
    Burnside, Matthew
    Keromytis, Angelos D.
    [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2008, 5312 : 136 - +
  • [9] A TWO-STAGE MODEL FOR SOCIAL NETWORK INVESTIGATIONS IN DIGITAL FORENSICS
    David, Anne
    Morris, Sarah
    Appleby-Thomas, Gareth
    [J]. JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, 2020, 15
  • [10] DATA VISUALIZATION FOR SOCIAL NETWORK FORENSICS
    Mulazzani, Martin
    Huber, Markus
    Weippl, Edgar
    [J]. ADVANCES IN DIGITAL FORENSICS VIII, 2012, 383 : 112 - 123