Show simple item record

AuthorHadjidj, Rachid
Available date2022-04-13T06:55:12Z
Publication Date2014
Publication NameQatar Foundation Annual Research Conference Proceedings
Resourceqscience
CitationHadjidj, Rachid. (2014) Email Authorship Attribution In Cyber Forensics. Qatar Foundation Annual Research Conference Proceedings 2014: ITPP0641 https://doi.org/10.5339/qfarc.2014.ITPP0641
ISSN2226-9649
URIhttps://doi.org/10.5339/qfarc.2014.ITPP0641
URIhttp://hdl.handle.net/10576/29651
AbstractEmail is one of the most widely used forms of written communication over the Internet, and its use has increased tremendously for both personal and professional purposes. The increase in email traffic comes also with an increase in the use of emails for illegitimate purposes to commit all sort of crimes. Phishing, spamming, email bombing, threatening, cyber bullying, racial vilification, child pornography, viruses and malware propagation, and sexual harassments are common examples of email abuses. Terrorist groups and criminal gangs are also using email systems as a safe channel for their communication. The alarming increase in the number of cybercrime incidents using email is mostly due to the fact that email can be easily anonymized. The problem of email authorship attribution is to identify the most plausible author of an anonymous email from a group of potential suspects. Most previous contributions employed a traditional classification approach, such as decision tree and Support Vector Machine (SVM), to identify the author and studied the effects of different writing style features on the classification accuracy. However, little attention has been given on ensuring the quality of the evidence. In this work, we introduce an innovative data mining method to capture the write-print of every suspect and model it as combinations of features that occur frequently in the suspect's emails. This notion is called frequent pattern, which has proven to be effective in many data mining applications, but has not been applied to the problem of authorship attribution. Unlike traditional approaches, the extracted write-print by our method is unique among the suspects and, therefore, provides convincing and credible evidence for presenting it in a court of law. Experiments on real-life emails suggest that the proposed method can effectively identify the author and the results are supported by a strong evidence.
Languageen
PublisherHamad bin Khalifa University Press (HBKU Press)
SubjectEmail Authorship
Attribution In Cyber Forensics
TitleEmail Authorship Attribution In Cyber Forensics
TypeConference Paper
Issue Number1
Volume Number2014
dc.accessType Open Access


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record