Online Social Networks as Supporting Evidence for Digital Forensic Investigation: A Revised Model

  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract

    The growth of online social networks has encouraged new ways of communicating and sharing information and is used regularly by millions of people; it has also resulted in an increase in its use for significant criminal activities and perpetrators are becoming increasingly sophisticated in their attempt to use technology in order to evade detection and perform criminal acts. Hence a systematic model for forensic investigation of online social networks is required in order to obtain optimum results from the networks’ investigation. We have reviewed the existing literature of digital forensic investigation models and frameworks, most have quite similar approaches, and some of the models are generic which do not focus on the purpose of the investigation. In addition, there is no standard and consistent model, only sets of procedures and tools, thus many digital crime investigations are performed without proper guidelines. Moreover, there is no model built specifically for online social networks but in contrast digital crimes related to them are growing rapidly. To address these challenges, previously, we have developed a standard model of digital forensic investigation for online social networks in this research. This model incorporates the existing traditional frameworks, allowing us to compile a comprehensive digital forensic investigation model specifically for the networks. This model has been revised and we have come out with more comprehensive activities for better result in digital forensic investigation specifically for online social networks.




  • Keywords

    computer security; digital forensic; online social networks.

  • References

      [1] G. Pallis, D. Zeinalipour-yazti, and M. D. Dikaiakos, “Online Social Networks: Status and Trends,” in A. Vakali and L.C. Jain (Eds.), New Directions in Web Data Management 1. Berlin: Springer, pp. 213–234, 2011.

      [2] S. M. Nirkhi, R. V. Dharaskar, and V. M. Thakre, “Analysis of online messages for identity tracing in cybercrime investigation,” Proceedings of the Int. Conf. Cyber Secur. Cyber Warf. Digit. Forensic, pp. 300–305, 2012.

      [3] S. L. Garfinkel, “Digital forensics research: The next 10 years,” Digit. Investig., 7, S64–S73, 2010.

      [4] danah m. boyd and N. B. Ellison, “Social Network Sites: Definition, History, and Scholarship,” J. Comput. Commun., 13(1), 210–230, 2007.

      [5] Z. Wu and C. Chen, “The Study of One Online Social Network Based on Structure and Evolution,” Proceedings of the Int. Conf. Comput. Manag., pp. 1–4, 2011.

      [6] A. Al-Mahrouqi, S. Abdalla, and T. Kechadi, “Efficiency of network event logs as admissible digital evidence,” Proceedings of the Sci. Inf. Conf., pp. 1257–1265, 2015.

      [7] D. Lillis, B. Becker, T. O’Sullivan, and M. Scanlon, “Current Challenges and Future Research Areas for Digital Forensic Investigation,” Proceedings of the 11th ADFSL Conference on Digital Forensics, Security and Law, pp. 1-11, 2016.

      [8] J. Robbins, “An Explanation of Computer Forensics,” National Forensics Center, 2002.

      [9] R. McKemmish, “What is forensic computing?,” Trends Issues Crime Crim. Justice, 118(118), 1–6, 1999.

      [10] P. D. Dixon, “An overview of computer forensics,” IEEE Potentials, 24(5), 7–10, 2005.

      [11] M. Rogers, “The role of criminal profiling in the computer forensics process,” Comput. Secur., 22(4), 292–298, 2003.

      [12] M. R. Clint, M. Reith, C. Carr, and G. Gunsch, “An Examination of Digital Forensic Models,” Int. J. Digit. Evid., 1(3), 1–12, 2002.

      [13] S. Ballou, “Electronic Crime Scene Investigation: A Guide for First Responders,” Diane Publishing, 2010.

      [14] B. Carrier and E. Spafford, “Getting physical with the digital investigation process,” Int. J. Digit. Evid., 2(2), 1–20, 2003.

      [15] J. Reno, D. Marcus, L. Robinson, N. Brennan, and J. Travis, “Crime Scene Investigation: A Guide For Law Enforcement,” US Department of Justice-Office, 2000.

      [16] B. Hitchcock, N. A. Le-Khac, and M. Scanlon, “Tiered forensic methodology model for Digital Field Triage by non-digital evidence specialists,” Digit. Investig., 16, S75–S85, 2016.

      [17] H. I. Bulbul, H. G. Yavuzcan, and M. Ozel, “Digital forensics: An analytical crime scene procedure model (ACSPM),” Forensic Sci. Int., 233(1–3), 244–256, 2013.

      [18] H. Lee, T. Palmbach, and M. Miller, Henry Lee’s Crime Scene Handbook. Academic Press, 2001.

      [19] E. Casey, “Practical approaches to recovering encrypted digital evidence,” Int. J. Digit. Evid., 1(3), 1–27, 2002.

      [20] R. S. C. Ieong, “FORZA - Digital forensics investigation framework that incorporate legal issues,” Digit. Investig., 3, 29–36, 2006.

      [21] M. D. Kohn, M. M. Eloff, and J. H. P. Eloff, “Integrated digital forensic process model,” Comput. Secur., 38, 103–115, 2013.

      [22] S. Ó. Ciardhuáin, “An Extended Model of Cybercrime Investigations,” Int. J. Digit. Evid., 3(1), 1-22, 2004.

      [23] M. Kohn, J. H. P. Eloff, and M. S. Olivier, “Framework for a Digital Forensic Investigation,” Proceedings of the ISSA, pp. 1–7, 2006.

      [24] B. Carrier and E. Spafford, “An event-based digital forensic investigation framework,” Proceedings of the Digit. forensic Res. Work., pp. 1–12, 2004.

      [25] D. Boyd and J. Heer, “Vizster: Visualizing Online Social Networks,” Proceedings of the Int. Symp. Inf. Vis., pp. 33–40, 2005.




Article ID: 26097
DOI: 10.14419/ijet.v7i4.33.26097

Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.