Deception Detection on the Internet

This chapter provides an overview of techniques and tools to detect deception on the Internet. A classification of state-of-the-art hypothesis testing and data mining based deception detection methods are presented. A psycho-linguistics based statistical model for deception detection is also described in detail. Passive and active methods for detecting deception at the application and network layer are discussed. Analysis of the pros and cons of the existing methods is presented. Finally, the inter-play between psychology, linguistics, statistical modeling, network layer information and Internet forensics is discussed along with open research challenges.

[1]  Robert E. Kraut,et al.  Verbal and nonverbal cues in the perception of lying. , 1978 .

[2]  P. Ekman,et al.  Who can catch a liar? , 1991, The American psychologist.

[3]  Judee K. Burgoon,et al.  Interpersonal deception: III. Effects of deceit on perceived communication and nonverbal behavior dynamics , 1994 .

[4]  James W. Pennebaker,et al.  Emotion, Disclosure, and Health , 1995 .

[5]  James W. Pennebaker,et al.  Emotion, disclosure, & health. , 1995 .

[6]  Hamish Cunningham,et al.  GATE-a General Architecture for Text Engineering , 1996, COLING.

[7]  J. Burgoon,et al.  Interpersonal Deception Theory , 1996 .

[8]  James J. Gross,et al.  Composure at Any Cost? The Cognitive Consequences of Emotion Suppression , 1999 .

[9]  R. Bull,et al.  Detecting Deceit via Analysis of Verbal and Nonverbal Behavior , 2000 .

[10]  J. Gross,et al.  PERSONALITY PROCESSES AND INDIVIDUAL DIFFERENCES Emotion Regulation and Memory: The Cognitive Costs of Keeping One's Cool , 2004 .

[11]  C. Lee Giles,et al.  Accessibility of information on the Web , 2000, INTL.

[12]  George M. Mohay,et al.  Mining e-mail content for author identification forensics , 2001, SGMD.

[13]  George M. Mohay,et al.  Identifying the authors of suspect email , 2001 .

[14]  Lakshminarayanan Subramanian,et al.  An investigation of geographic mapping techniques for internet hosts , 2001, SIGCOMM 2001.

[15]  Shlomo Argamon,et al.  Style mining of electronic messages for multiple authorship discrimination: first results , 2003, KDD '03.

[16]  Jay F. Nunamaker,et al.  Detecting Deception through Linguistic Analysis , 2003, ISI.

[17]  J. Pennebaker,et al.  Lying Words: Predicting Deception from Linguistic Styles , 2003, Personality & social psychology bulletin.

[18]  Judee K. Burgoon,et al.  A Longitudinal Analysis of Language Behavior of Deception in E-mail , 2003, ISI.

[19]  Therani Madhusudan,et al.  On a text-processing approach to facilitating autonomous deception detection , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.

[20]  Jay F. Nunamaker,et al.  An exploratory study into deception detection in text-based computer-mediated communication , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.

[21]  Moshe Koppel,et al.  Authorship verification as a one-class classification problem , 2004, ICML.

[22]  Jay F. Nunamaker,et al.  Language dominance in interpersonal deception in computer-mediated communication , 2004, Comput. Hum. Behav..

[23]  Jay F. Nunamaker,et al.  An exploratory study on promising cues in deception detection and application of decision tree , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.

[24]  John R. Carlson,et al.  Deception in Computer-Mediated Communication , 2004 .

[25]  J. Nunamaker,et al.  Automating Linguistics-Based Cues for Detecting Deception in Text-Based Asynchronous Computer-Mediated Communications , 2004 .

[26]  Dongsong Zhang,et al.  Can online behavior unveil deceivers? - an exploratory investigation of deception in instant messaging , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.

[27]  Jay F. Nunamaker,et al.  A Comparison of Classification Methods for Predicting Deception in Computer-Mediated Communication , 2004, J. Manag. Inf. Syst..

[28]  Jeffrey T. Hancock,et al.  Lies in Conversation: An Examination of Deception Using Automated Linguistic Analysis , 2004 .

[29]  Lina Zhou,et al.  Modeling and Handling Uncertainty in Deception Detection , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.

[30]  William H. Mangione-Smith,et al.  Fast reconfiguring deep packet filter for 1+ gigabit network , 2005, 13th Annual IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM'05).

[31]  Jeffrey T. Hancock,et al.  Automated Linguistic Analysis of Deceptive and Truthful Synchronous Computer-Mediated Communication , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.

[32]  L. Zhou An empirical investigation of deception behavior in instant messaging , 2005, IEEE Transactions on Professional Communication.

[33]  Jay F. Nunamaker,et al.  Modality Effects in Deception Detection and Applications in Automatic-Deception-Detection , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.

[34]  Hsinchun Chen,et al.  A framework for authorship identification of online messages: Writing-style features and classification techniques , 2006 .

[35]  David Wetherall,et al.  Towards IP geolocation using delay and topology measurements , 2006, IMC '06.

[36]  Patrick Brennan,et al.  A Prototype for Authorship Attribution Studies , 2006, Lit. Linguistic Comput..

[37]  Serge Fdida,et al.  Constraint-Based Geolocation of Internet Hosts , 2004, IEEE/ACM Transactions on Networking.

[38]  Elad Yom-Tov,et al.  Serial Sharers: Detecting Split Identities of Web Authors , 2007, PAN.

[39]  Norman M. Sadeh,et al.  Learning to detect phishing emails , 2007, WWW '07.

[40]  Robert Goodman,et al.  The Use of Stylometry for Email Author Identification: A Feasibility Study , 2007 .

[41]  Sos S. Agaian,et al.  On steganalysis and clean image estimation , 2008 .

[42]  Dongsong Zhang,et al.  A Statistical Language Modeling Approach to Online Deception Detection , 2008, IEEE Transactions on Knowledge and Data Engineering.

[43]  T. Holt,et al.  Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications , 2010 .

[44]  A. Daskalaki Digital Forensics for the Health Sciences: Applications in Practice and Research , 2011 .

[45]  Michael Bachmann,et al.  Deciphering the Hacker Underground: First Quantitative Insights , 2011 .

[46]  Lynn Margaret Batten,et al.  Hypothesis Generation and Testing in Event Profiling for Digital Forensic Investigations , 2012, Int. J. Digit. Crime Forensics.