A forensics tool of Foxmail client

Computer forensics is an important part of the computer crime investigation. So a Forensics system aimed to Foxmail data analysis and investigation is proposed in this paper. The system can index the email data based on Lucene technology and the MMSeg participle algorithm, and provides the full text retrieval of the email content function. Subsequently, a visual communication graph would be generated according to the retrieval results. Based on the communication graph, an algorithm on graphic structure analysis is proposed, and by means of centrality and minimum traffic filtering method, multilevel analysis is carried out on the graph, which can detect the possible suspicious personnel and their relationships and provide strong support for the computer crime investigation.

[1]  Long Chun-min Research on the Web-based forensics of E-mail , 2012 .

[2]  George M. Mohay,et al.  Mining e-mail content for author identification forensics , 2001, SGMD.

[3]  Yuya Kajikawa,et al.  Email network analysis for leadership , 2011, 2011 IEEE International Conference on Industrial Engineering and Engineering Management.

[4]  Shunxiang Wu,et al.  Research of an E-mail forensic and analysis system based on visualization , 2009, 2009 Asia-Pacific Conference on Computational Intelligence and Industrial Applications (PACIIA).

[5]  M E J Newman,et al.  Finding and evaluating community structure in networks. , 2003, Physical review. E, Statistical, nonlinear, and soft matter physics.

[6]  Wu Sheng The Efficacity of Obtaining Evidence through E-mail on the Basis of Case Study , 2011 .

[7]  Hong Guo,et al.  Analysis of Email Header for Forensics Purpose , 2013, 2013 International Conference on Communication Systems and Network Technologies.

[8]  Gail-Joon Ahn,et al.  Towards comprehensive and collaborative forensics on email evidence , 2013, 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing.

[9]  Zhao Kuo Summary of Computer Forensics , 2010 .

[10]  U. Brandes A faster algorithm for betweenness centrality , 2001 .

[11]  Martin G. Everett,et al.  A Graph-theoretic perspective on centrality , 2006, Soc. Networks.

[12]  Luo Mei Analysis and application of Chinese word segmentation model which consist of dictionary and statistics method , 2012 .

[13]  Leonard M. Freeman,et al.  A set of measures of centrality based upon betweenness , 1977 .

[14]  WenQi Wang,et al.  The Research on Email Forensic Based Network , 2009, 2009 First International Conference on Information Science and Engineering.

[15]  Ali Tizghadam,et al.  Betweenness centrality and resistance distance in communication networks , 2010, IEEE Network.