Skip to main content
Erschienen in: Electronic Commerce Research 3/2014

01.11.2014

Correlating messages from multiple IM networks to identify digital forensic artifacts

verfasst von: Muhammmad Yasin, Firdous Kausar, Eisa Aleisa, Jongsung Kim

Erschienen in: Electronic Commerce Research | Ausgabe 3/2014

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In recent years the usage of instant messaging (IM) has increased manifold. Recent reports show that law enforcement organizations are making requests for instant messaging information as a result of involvement in criminal activity. There can be multiple reasons for investigation of instant messenger histories. Among all issues, renown are involvement in fraudulent activities, social engineering, identity theft, spread of malicious software (worm) to circumvent innocent users or critical security devices, revealing IP address of correspondent for launching further attacks, IM spam and offensive material, in general for communicating with group members regarding corruption, target killing, gambling, kidnapping, theft, robbery, etc. In this paper, we focus on a unique case in which two group members of criminal network are communicating through IM aggregator (like Digsby) and using multiple IM protocols to complete a single conversation session instead of following a traditional single IM client such as Yahoo Messenger for whole conversation. We propose a method to identify that multiple IM protocols are used for single conversation session and describe how to establish a sequence of collected messages. An analysis of volatile memory is performed to collect the remnants of whole or partial conversation, as supportive or actual evidence.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Antoniou, G., & Batten, L. (2011). E-commerce: Protecting purchaser privacy to enforce trust. Electronic Commerce Research, 11(4), 421–456.CrossRef Antoniou, G., & Batten, L. (2011). E-commerce: Protecting purchaser privacy to enforce trust. Electronic Commerce Research, 11(4), 421–456.CrossRef
4.
Zurück zum Zitat Carvey, H. (2004). Instant messaging investigations on a live Windows XP system. Digital Investigation, 1(4), 256–260.CrossRef Carvey, H. (2004). Instant messaging investigations on a live Windows XP system. Digital Investigation, 1(4), 256–260.CrossRef
5.
Zurück zum Zitat Castañeda, J. A., & Montoro, F. J. (2007). The effect of Internet general privacy concern on customer behavior. Electronic Commerce Research, 7(2), 117–141.CrossRef Castañeda, J. A., & Montoro, F. J. (2007). The effect of Internet general privacy concern on customer behavior. Electronic Commerce Research, 7(2), 117–141.CrossRef
6.
Zurück zum Zitat Dankner, S., Rogers, M., & Kiley, M. (2010). Forensic analysis of volatile instant messaging. International Federation for Information Processing Digital Library, 285(1), 129–138. Dankner, S., Rogers, M., & Kiley, M. (2010). Forensic analysis of volatile instant messaging. International Federation for Information Processing Digital Library, 285(1), 129–138.
7.
Zurück zum Zitat Dewes, C., Wichmann, A., Feldmann, A. (2003). An analysis of Internet chat systems. In Proceedings of the 3rd ACM SIGCOMM conference on Internet measurement (pp. 51–64). Dewes, C., Wichmann, A., Feldmann, A. (2003). An analysis of Internet chat systems. In Proceedings of the 3rd ACM SIGCOMM conference on Internet measurement (pp. 51–64).
8.
Zurück zum Zitat Dickson, M. (2006). An examination into AOL Instant Messenger 5.5 contact identification. Digital Investigation, 3(4), 227–237.CrossRef Dickson, M. (2006). An examination into AOL Instant Messenger 5.5 contact identification. Digital Investigation, 3(4), 227–237.CrossRef
9.
Zurück zum Zitat Dickson, M. (2006). An examination into MSN Messenger 7.5 contact identification. Digital Investigation, 3(2), 79–83.CrossRef Dickson, M. (2006). An examination into MSN Messenger 7.5 contact identification. Digital Investigation, 3(2), 79–83.CrossRef
10.
Zurück zum Zitat Dickson, M. (2007). An examination into Trillian basic 3. x contact identification. Digital Investigation, 4(1), 36–45.CrossRef Dickson, M. (2007). An examination into Trillian basic 3. x contact identification. Digital Investigation, 4(1), 36–45.CrossRef
11.
Zurück zum Zitat Dickson, M. (2006). An examination into Yahoo Messenger 7.0 contact identification. Digital Investigation, 3(3), 159–165.CrossRef Dickson, M. (2006). An examination into Yahoo Messenger 7.0 contact identification. Digital Investigation, 3(3), 159–165.CrossRef
12.
Zurück zum Zitat Gao, Y., & Cao, T. (2010). Memory forensics for QQ from a live system. Journal of Computers, 5(4), 541–548.CrossRef Gao, Y., & Cao, T. (2010). Memory forensics for QQ from a live system. Journal of Computers, 5(4), 541–548.CrossRef
13.
Zurück zum Zitat Gavish, B., & Tucci, C. L. (2006). Fraudulent auctions on the Internet. Electronic Commerce Research, 6(2), 127–140.CrossRef Gavish, B., & Tucci, C. L. (2006). Fraudulent auctions on the Internet. Electronic Commerce Research, 6(2), 127–140.CrossRef
14.
Zurück zum Zitat Goel, L., & Prokopec, S. (2009). If you build it will they come?–An empirical investigation of consumer perceptions and strategy in virtual worlds. Electronic Commerce Research, 9(1–2), 115–134.CrossRef Goel, L., & Prokopec, S. (2009). If you build it will they come?–An empirical investigation of consumer perceptions and strategy in virtual worlds. Electronic Commerce Research, 9(1–2), 115–134.CrossRef
15.
Zurück zum Zitat Husain, M. I., & Sridhar, R. (2010). iForensics: forensic analysis of instant messaging on smart phones. Digital Forensics and Cyber Crime, 31, 9–18.CrossRef Husain, M. I., & Sridhar, R. (2010). iForensics: forensic analysis of instant messaging on smart phones. Digital Forensics and Cyber Crime, 31, 9–18.CrossRef
16.
Zurück zum Zitat Levendoski, M., Rogers, M., & Huff, P. (2011). Yahoo messenger forensics for Windows Vista and Windows 7. CERIAS: Purdue University. Levendoski, M., Rogers, M., & Huff, P. (2011). Yahoo messenger forensics for Windows Vista and Windows 7. CERIAS: Purdue University.
17.
Zurück zum Zitat Lim, K. S., Savoldi, A., Lee, C., & Lee, S. (2012). On-the-spot digital investigation by means of LDFS: Live data forensic system. Mathematical and Computer Modelling, 55(1), 223–240.CrossRef Lim, K. S., Savoldi, A., Lee, C., & Lee, S. (2012). On-the-spot digital investigation by means of LDFS: Live data forensic system. Mathematical and Computer Modelling, 55(1), 223–240.CrossRef
18.
Zurück zum Zitat Meehan, A., Manes, G., Davis, L., Hale, J., & Shenoi, S. (2001). Packet sniffing for automated chat room monitoring and evidence preservation. Workshop on Information Assurance and Security, 2, 1045. Meehan, A., Manes, G., Davis, L., Hale, J., & Shenoi, S. (2001). Packet sniffing for automated chat room monitoring and evidence preservation. Workshop on Information Assurance and Security, 2, 1045.
20.
Zurück zum Zitat Patton, M., & Jøsang, A. (2004). Technologies for trust in electronic commerce. Electronic Commerce Research, 4(1–2), 9–21.CrossRef Patton, M., & Jøsang, A. (2004). Technologies for trust in electronic commerce. Electronic Commerce Research, 4(1–2), 9–21.CrossRef
21.
Zurück zum Zitat Reust, J. (2006). Case study: AOL instant messenger trace evidence. Digital Investigation, 3(4), 238–243.CrossRef Reust, J. (2006). Case study: AOL instant messenger trace evidence. Digital Investigation, 3(4), 238–243.CrossRef
22.
Zurück zum Zitat Smith, R., & Shao, J. (2007). Privacy and e-commerce: A consumer-centric perspective. Electronic Commerce Research, 7(2), 89–116.CrossRef Smith, R., & Shao, J. (2007). Privacy and e-commerce: A consumer-centric perspective. Electronic Commerce Research, 7(2), 89–116.CrossRef
23.
Zurück zum Zitat Valvi, A. C., & Fragkos, K. C. (2012). Critical review of the e-loyalty literature: A purchase-centred framework. Electronic Commerce Research, 12(3), 331–378.CrossRef Valvi, A. C., & Fragkos, K. C. (2012). Critical review of the e-loyalty literature: A purchase-centred framework. Electronic Commerce Research, 12(3), 331–378.CrossRef
24.
Zurück zum Zitat Van Dongen, W. S. (2007). Forensic artefacts left by Pidgin Messenger 2.0. Digital Investigation, 4(3), 138–145.CrossRef Van Dongen, W. S. (2007). Forensic artefacts left by Pidgin Messenger 2.0. Digital Investigation, 4(3), 138–145.CrossRef
25.
Zurück zum Zitat Van Dongen, W. S. (2007). Forensic artefacts left by Windows Live Messenger 8.0. Digital Investigation, 4(2), 73–87.CrossRef Van Dongen, W. S. (2007). Forensic artefacts left by Windows Live Messenger 8.0. Digital Investigation, 4(2), 73–87.CrossRef
Metadaten
Titel
Correlating messages from multiple IM networks to identify digital forensic artifacts
verfasst von
Muhammmad Yasin
Firdous Kausar
Eisa Aleisa
Jongsung Kim
Publikationsdatum
01.11.2014
Verlag
Springer US
Erschienen in
Electronic Commerce Research / Ausgabe 3/2014
Print ISSN: 1389-5753
Elektronische ISSN: 1572-9362
DOI
https://doi.org/10.1007/s10660-014-9145-4

Weitere Artikel der Ausgabe 3/2014

Electronic Commerce Research 3/2014 Zur Ausgabe