Highlighting Relationships of a Smartphone’s Social Ecosystem in Potentially Large Investigations

Social media networks are becoming increasingly popular because they can satisfy diverse needs of individuals (both personal and professional). Modern mobile devices are empowered with increased capabilities, taking advantage of the technological progress that makes them smarter than their predecessors. Thus, a smartphone user is not only the phone owner, but also an entity that may have different facets and roles in various social media networks. We believe that these roles can be aggregated in a single social ecosystem, which can be derived by the smartphone. In this paper, we present our concept of the social ecosystem in contemporary devices and we attempt to distinguish the different communities that occur from the integration of social networking in our lives. In addition, we propose techniques to highlight major actors within the ecosystem. Moreover, we demonstrate our suggested visualization scheme, which illustrates the linking of entities that live in separate communities using data taken from the smartphone. Finally, we extend our concept to include various parallel ecosystems during potentially large investigations and we link influential entities in a vertical fashion. We particularly examine cases where data aggregation is performed by specific applications, producing volumes of textual data that can be analyzed with text mining methods. Our analysis demonstrates the risks of the rising “bring your own device” trend in enterprise environments.

[1]  Mathieu Bastian,et al.  Gephi: An Open Source Software for Exploring and Manipulating Networks , 2009, ICWSM.

[2]  Theodore Tryfonas,et al.  Forensic analysis of wireless networking evidence of Android smartphones , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[3]  Edgar R. Weippl,et al.  Social snapshots: digital forensics for online social networks , 2011, ACSAC '11.

[4]  Martin Boldt,et al.  Computer forensic timeline visualization tool , 2009 .

[5]  Gary C. Kessler,et al.  Android forensics: Simplifying cell phone examinations , 2010 .

[6]  Domenico Rosaci,et al.  Trust and Compactness in Social Network Groups , 2015, IEEE Transactions on Cybernetics.

[7]  Amr M. Youssef,et al.  Mining criminal networks from unstructured text documents , 2012, Digit. Investig..

[8]  Edgar R. Weippl,et al.  Data Visualization for Social Network Forensics , 2012, IFIP Int. Conf. Digital Forensics.

[9]  Desheng Dash Wu,et al.  Computational simulation and risk analysis: An introduction of state of the art research , 2013, Math. Comput. Model..

[10]  Marc Lemercier,et al.  A smartphone-based online social network trust evaluation system , 2013, Social Network Analysis and Mining.

[11]  Efthimios Tambouris,et al.  Understanding the Predictive Power of Social Media This is a pre-print version of the following article : , 2013 .

[12]  Chen Wang,et al.  A behavior-based SMS antispam system , 2010, IBM J. Res. Dev..

[13]  Ian H. Witten,et al.  The WEKA data mining software: an update , 2009, SKDD.

[14]  Lillian Lee,et al.  Opinion Mining and Sentiment Analysis , 2008, Found. Trends Inf. Retr..

[15]  Gordon Thomson BYOD: enabling the chaos , 2012, Netw. Secur..

[16]  Yifan Hu,et al.  Efficient, High-Quality Force-Directed Graph Drawing , 2006 .

[17]  Emilio Ferrara,et al.  Forensic analysis of phone call networks , 2012, Social Network Analysis and Mining.

[18]  Desheng Dash Wu,et al.  Business intelligence in risk management: Some recent progresses , 2014, Inf. Sci..

[19]  Akebo Yamakami,et al.  Contributions to the study of SMS spam filtering: new collection and results , 2011, DocEng '11.

[20]  Lilian Mitrou,et al.  Smartphone Forensics: A Proactive Investigation Scheme for Evidence Acquisition , 2012, SEC.

[21]  Paul Steiner Going beyond mobile device management , 2014 .

[22]  Saif Mohammad,et al.  NRC-Canada: Building the State-of-the-Art in Sentiment Analysis of Tweets , 2013, *SEMEVAL.

[23]  Atsuhiro Takasu,et al.  Smartphone Message Sentiment Analysis , 2014, IFIP Int. Conf. Digital Forensics.

[24]  Adam Michael Edwards,et al.  Digital social research, social media and the sociological imagination: surrogacy, augmentation and re-orientation , 2013 .

[25]  Christopher Hargreaves,et al.  An automated timeline reconstruction approach for digital forensic investigations , 2012 .

[26]  Mark E. J. Newman,et al.  The Structure and Function of Complex Networks , 2003, SIAM Rev..

[27]  Sotiris Ioannidis,et al.  Multilevel Visualization Using Enhanced Social Network Analysis with Smartphone Data , 2013, Int. J. Digit. Crime Forensics.

[28]  Preslav Nakov,et al.  SemEval-2014 Task 9: Sentiment Analysis in Twitter , 2014, *SEMEVAL.

[29]  Luis Alfonso Ureña López,et al.  Sentiment analysis in Twitter , 2012, Natural Language Engineering.

[30]  Andrew Blyth,et al.  A Unified Approach to Network Traffic and Network Security Visualisation , 2009, 2009 IEEE International Conference on Communications.

[31]  Malcolm K. Sparrow,et al.  The application of network analysis to criminal intelligence: An assessment of the prospects , 1991 .

[32]  Ibrahim Baggili,et al.  Forensic analysis of social networking applications on mobile devices , 2012, Digit. Investig..

[33]  Desheng Dash Wu,et al.  A Decision Support Approach for Online Stock Forum Sentiment Analysis , 2014, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[34]  Simson L. Garfinkel,et al.  Digital forensics research: The next 10 years , 2010, Digit. Investig..

[35]  Mark Newman,et al.  Detecting community structure in networks , 2004 .

[36]  Eugénio C. Oliveira,et al.  Tokenizing micro-blogging messages using a text classification approach , 2010, AND '10.

[37]  John Zimmerman,et al.  Mining smartphone data to classify life-facets of social relationships , 2013, CSCW.

[38]  Pierre Dragicevic,et al.  GraphDice: A System for Exploring Multivariate Social Networks , 2010, Comput. Graph. Forum.

[39]  Jennifer Jie Xu,et al.  Mining communities and their relationships in blogs: A study of online hate groups , 2007, Int. J. Hum. Comput. Stud..

[40]  William A. Arbaugh,et al.  FATKit: A framework for the extraction and analysis of digital forensic data from volatile system memory , 2006, Digit. Investig..

[41]  Nicolas Christin,et al.  Toward a general collection methodology for Android devices , 2011, Digit. Investig..

[42]  Anis Yazidi,et al.  Learning-Automaton-Based Online Discovery and Tracking of Spatiotemporal Event Patterns , 2013, IEEE Transactions on Cybernetics.

[43]  Uta K. Bindl,et al.  Fuel of the self-starter: how mood relates to proactive goal regulation. , 2012, The Journal of applied psychology.