Using authorship analysis techniques in forensic analysis of electronic mails

As a result of rapid advances in information technology electronic mail has become one of today's most important communication tool. Electronic mail which provides conveniences to its user in many cases, is also an attractive environment for criminals. Malicious electronic mail whose actual owner is uncertain, is taking place in cyber crimes and authorship analysis has become necessary for determining the actual owner of this electronic mail. In this study 43 textual features were extracted from dataset of electronic mails which is obtained for 5 writers. These extracted textual features were processed with Artifical Neural Network (ANN), Support Vector Machines (SVM) and Decission Trees Method that are method of data mining classfication techniques in WEKA. As a result of the application. Decision Trees Method has been observed to be most succesful with F-measure rate of 83% in average for available dataset.

[1]  Donn B. Parker Computer Crime: Criminal Justice Resource Manual (Second Edition). , 1989 .

[2]  F. Mosteller,et al.  Inference and Disputed Authorship: The Federalist , 1966 .

[3]  Fang Wang,et al.  Sequential Pattern Mining for Chinese E-mail Authorship Identification , 2008, 2008 3rd International Conference on Innovative Computing Information and Control.

[4]  Hsinchun Chen,et al.  Applying authorship analysis to extremist-group Web forum messages , 2005, IEEE Intelligent Systems.

[5]  Ethem Gelir,et al.  Yapay Sinir Ağları , 1994 .

[6]  Olivier de Vel,et al.  Mining E-mail Authorship , 2000 .

[7]  Vinton G. Cerf,et al.  The past and future history of the Internet , 1997, CACM.

[8]  Petra Perner,et al.  Data Mining - Concepts and Techniques , 2002, Künstliche Intell..

[9]  Moshe Koppel,et al.  Exploiting Stylistic Idiosyncrasies for Authorship Attribution , 2003 .

[10]  Dan Hu Exploratory Study on Computer Forensics Technology , 2009, 2009 Second International Conference on Computer and Electrical Engineering.

[11]  Rong Zheng,et al.  A framework for authorship identification of online messages: Writing-style features and classification techniques , 2006, J. Assoc. Inf. Sci. Technol..

[12]  George M. Mohay,et al.  Multi-Topic E-mail Authorship Attribution Forensics , 2001 .

[13]  Benjamin C. M. Fung,et al.  A novel approach of mining write-prints for authorship attribution in e-mail forensics , 2008, Digit. Investig..

[14]  Shlomo Argamon,et al.  Computational methods in authorship attribution , 2009, J. Assoc. Inf. Sci. Technol..

[15]  H. T. Eddy The characteristic curves of composition. , 1887, Science.

[16]  Gang Wang,et al.  Crime data mining: a general framework and some examples , 2004, Computer.

[17]  George M. Mohay,et al.  Identifying the authors of suspect email , 2001 .

[18]  Vinton G. Cerf,et al.  A brief history of the internet , 1999, CCRV.

[19]  R. H. Baayen,et al.  An experiment in authorship attribution , 2002 .