Mobile Forensic Data Analysis: Suspicious Pattern Detection in Mobile Evidence

Culprits’ identification by the means of suspicious pattern detection techniques from mobile device data is one of the most important aims of the mobile forensic data analysis. When criminal activities are related to entirely automated procedures such as malware propagation, predicting the corresponding behavior is a rather achievable task. However, when human behavior is involved, such as in cases of traditional crimes, prediction and detection become more compelling. This paper introduces a combined criminal profiling and suspicious pattern detection methodology for two criminal activities with moderate to the heavy involvement of mobile devices, cyberbullying and low-level drug dealing. Neural and Neurofuzzy techniques are applied on a hybrid original and simulated dataset. The respective performance results are measured and presented, the optimal technique is selected, and the scenarios are re-run on an actual dataset for additional testing and verification.

[1]  A. R. Gupta,et al.  A Comparative Analysis of Cognitive Systems for the Prediction of Drillability of Rocks and Wear Factor , 2006 .

[2]  Jatiya Kabi,et al.  Performance Study of TDNN Training Algorithm for Speech Recognition , 2014 .

[3]  E. Lievens Bullying and sexting in social networks: Protecting minors from criminal acts or empowering minors to cope with risky behaviour? , 2014 .

[4]  K. Gnana Sheela,et al.  Review on Methods to Fix Number of Hidden Neurons in Neural Networks , 2013 .

[5]  Frank Breitinger,et al.  Availability of datasets for digital forensics - And what is missing , 2017, Digit. Investig..

[6]  Wayan Suparta,et al.  Adaptive Neuro-Fuzzy Interference System , 2016 .

[7]  Martin T. Hagan,et al.  Gauss-Newton approximation to Bayesian learning , 1997, Proceedings of International Conference on Neural Networks (ICNN'97).

[8]  Jyh-Shing Roger Jang,et al.  ANFIS: adaptive-network-based fuzzy inference system , 1993, IEEE Trans. Syst. Man Cybern..

[9]  Christoforos Ntantogian,et al.  Evaluating the privacy of Android mobile applications under forensic analysis , 2014, Comput. Secur..

[10]  S. Ferrari,et al.  Network models of criminal behavior , 2008, IEEE Control Systems.

[11]  Yaochu Jin,et al.  Advanced fuzzy systems design and applications , 2003, Studies in Fuzziness and Soft Computing.

[12]  Paulo J. G. Lisboa,et al.  Interpretability in Machine Learning - Principles and Practice , 2013, WILF.

[13]  José M. Alonso,et al.  Interpretability of Fuzzy Systems: Current Research Trends and Prospects , 2015, Handbook of Computational Intelligence.

[14]  Rhonda N. McEwen Tools of the trade: Drugs, law and mobile phones in Canada , 2011, New Media Soc..

[15]  Alan K. Goodboy,et al.  The personality profile of a cyberbully: Examining the Dark Triad , 2015, Comput. Hum. Behav..

[16]  Edmundo Monteiro,et al.  Fuzzy System-Based Suspicious Pattern Detection in Mobile Forensic Evidence , 2017, ICDF2C.

[17]  Jesus Mena,et al.  Investigative Data Mining for Security and Criminal Detection , 2002 .

[18]  J. Fleetwood Keeping out of trouble: Female crack cocaine dealers in England , 2014 .

[19]  Arka Ghosh,et al.  Hybrid Optimized Back propagation Learning Algorithm For Multi-layer Perceptron , 2012, ArXiv.

[20]  K. P. Sudheer,et al.  Artificial Neural Network Modeling for Groundwater Level Forecasting in a River Island of Eastern India , 2010 .

[21]  Jeff Heaton,et al.  Introduction to Neural Networks for C#, 2nd Edition , 2008 .

[22]  Marco Strano A Neural Network Applied to Criminal Psychological Profiling: An Italian Initiative , 2004, International journal of offender therapy and comparative criminology.

[23]  Marcus K. Rogers The role of criminal profiling in the computer forensics process , 2003, Comput. Secur..

[24]  Peter K. Smith,et al.  Cyberbullying: its nature and impact in secondary school pupils. , 2008, Journal of child psychology and psychiatry, and allied disciplines.

[25]  K. Gunavathi,et al.  Lung cancer classification using neural networks for CT images , 2014, Comput. Methods Programs Biomed..

[26]  Jilali Antari,et al.  Identification and Prediction of Internet Traffic Using Artificial Neural Networks , 2010, J. Intell. Learn. Syst. Appl..

[27]  Paulo Simões,et al.  From Fuzziness to Criminal Investigation: An Inference System for Mobile Forensics , 2017 .

[28]  Gaurang Panchal,et al.  Behaviour Analysis of Multilayer Perceptrons with Multiple Hidden Neurons and Hidden Layers , 2011 .

[29]  Marcus K. Rogers Psychological profiling as an investigative tool for digital forensics , 2016 .

[30]  Steven Furnell,et al.  Challenges to digital forensics: A survey of researchers & practitioners attitudes and opinions , 2013, 2013 Information Security for South Africa.

[31]  Aziz Mohaisen,et al.  Andro-AutoPsy: Anti-malware system based on similarity matching of malware and malware creator-centric information , 2015, Digit. Investig..

[32]  Roberto Battiti,et al.  First- and Second-Order Methods for Learning: Between Steepest Descent and Newton's Method , 1992, Neural Computation.

[33]  Benjamin Turnbull,et al.  Digital Evidence on Mobile Devices , 2011 .

[34]  J. Maguire,et al.  Sexting: Youth Practices and Legal Implications , 2010 .

[35]  Matthew W. Savage,et al.  Prevalence and Predictors of Cyberbullying Perpetration by High School Seniors , 2014 .

[36]  Mike Hough,et al.  Drug markets and distribution systems , 2004 .

[37]  Orkhan Baghirli,et al.  Comparison of Lavenberg-Marquardt, Scaled Conjugate Gradient and Bayesian Regularization Backpropagation Algorithms for Multistep Ahead Wind Speed Forecasting Using Multilayer Perceptron Feedforward Neural Network , 2015 .

[38]  Georgios Kambourakis,et al.  A critical review of 7 years of Mobile Device Forensics , 2013, Digit. Investig..

[39]  Rusli,et al.  Feedforward Neural Network Trained by BFGS Algorithm for Modeling Plasma Etching of Silicon Carbide , 2010, IEEE Transactions on Plasma Science.

[40]  Paulo Simões,et al.  Current and Future Trends in Mobile Device Forensics , 2018, ACM Computing Surveys.

[41]  Jonathan L. Ticknor A Bayesian regularized artificial neural network for stock market forecasting , 2013, Expert Syst. Appl..

[42]  Hao Yu,et al.  Improved Computation for Levenberg–Marquardt Training , 2010, IEEE Transactions on Neural Networks.

[43]  Martin A. Riedmiller,et al.  Advanced supervised learning in multi-layer perceptrons — From backpropagation to adaptive learning algorithms , 1994 .

[44]  B. Pradhan,et al.  Landslide susceptibility assessment in the Hoa Binh province of Vietnam: A comparison of the Levenberg–Marquardt and Bayesian regularized neural networks , 2012 .

[45]  James Martin,et al.  Lost on the Silk Road: Online drug distribution and the ‘cryptomarket’ , 2014 .

[46]  T. S. Letia,et al.  Training neural networks for construction of informatics offender profile , 2010, 2010 IEEE International Conference on Automation, Quality and Testing, Robotics (AQTR).

[47]  Alastair R. Beresford,et al.  Device Analyzer: Understanding Smartphone Usage , 2013, MobiQuitous.

[48]  Dave Winkler,et al.  Bayesian Regularization of Neural Networks , 2009, Artificial Neural Networks.

[49]  Kim-Kwang Raymond Choo,et al.  Pervasive social networking forensics: Intelligence and evidence from mobile device extracts , 2017, J. Netw. Comput. Appl..

[50]  Dimitrios Kasiaras,et al.  Android forensics: Correlation analysis , 2014, The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014).

[51]  T. Kathirvalavakumar,et al.  Pruning algorithms of neural networks — a comparative study , 2013, Central European Journal of Computer Science.

[52]  M. Natarajan Understanding the Structure of a Large Heroin Distribution Network: A Quantitative Analysis of Qualitative Data , 2006 .

[53]  K. P. Chow,et al.  An Empirical Study Profiling Internet Pirates , 2013, IFIP Int. Conf. Digital Forensics.

[54]  R. Fletcher Practical Methods of Optimization , 1988 .

[55]  N. K. Treadgold THE SARPROP ALGORITHM: A SIMULATED ANNEALING ENHANCEMENT TO RESILIENT BACK PROPAGATION , 1996 .

[56]  Larry S. Miller,et al.  The Electronic Crime Scene , 2014 .