Skip to main content
Top
Published in: Electronic Commerce Research 3/2014

01-11-2014

Correlating messages from multiple IM networks to identify digital forensic artifacts

Authors: Muhammmad Yasin, Firdous Kausar, Eisa Aleisa, Jongsung Kim

Published in: Electronic Commerce Research | Issue 3/2014

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In recent years the usage of instant messaging (IM) has increased manifold. Recent reports show that law enforcement organizations are making requests for instant messaging information as a result of involvement in criminal activity. There can be multiple reasons for investigation of instant messenger histories. Among all issues, renown are involvement in fraudulent activities, social engineering, identity theft, spread of malicious software (worm) to circumvent innocent users or critical security devices, revealing IP address of correspondent for launching further attacks, IM spam and offensive material, in general for communicating with group members regarding corruption, target killing, gambling, kidnapping, theft, robbery, etc. In this paper, we focus on a unique case in which two group members of criminal network are communicating through IM aggregator (like Digsby) and using multiple IM protocols to complete a single conversation session instead of following a traditional single IM client such as Yahoo Messenger for whole conversation. We propose a method to identify that multiple IM protocols are used for single conversation session and describe how to establish a sequence of collected messages. An analysis of volatile memory is performed to collect the remnants of whole or partial conversation, as supportive or actual evidence.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Antoniou, G., & Batten, L. (2011). E-commerce: Protecting purchaser privacy to enforce trust. Electronic Commerce Research, 11(4), 421–456.CrossRef Antoniou, G., & Batten, L. (2011). E-commerce: Protecting purchaser privacy to enforce trust. Electronic Commerce Research, 11(4), 421–456.CrossRef
4.
go back to reference Carvey, H. (2004). Instant messaging investigations on a live Windows XP system. Digital Investigation, 1(4), 256–260.CrossRef Carvey, H. (2004). Instant messaging investigations on a live Windows XP system. Digital Investigation, 1(4), 256–260.CrossRef
5.
go back to reference Castañeda, J. A., & Montoro, F. J. (2007). The effect of Internet general privacy concern on customer behavior. Electronic Commerce Research, 7(2), 117–141.CrossRef Castañeda, J. A., & Montoro, F. J. (2007). The effect of Internet general privacy concern on customer behavior. Electronic Commerce Research, 7(2), 117–141.CrossRef
6.
go back to reference Dankner, S., Rogers, M., & Kiley, M. (2010). Forensic analysis of volatile instant messaging. International Federation for Information Processing Digital Library, 285(1), 129–138. Dankner, S., Rogers, M., & Kiley, M. (2010). Forensic analysis of volatile instant messaging. International Federation for Information Processing Digital Library, 285(1), 129–138.
7.
go back to reference Dewes, C., Wichmann, A., Feldmann, A. (2003). An analysis of Internet chat systems. In Proceedings of the 3rd ACM SIGCOMM conference on Internet measurement (pp. 51–64). Dewes, C., Wichmann, A., Feldmann, A. (2003). An analysis of Internet chat systems. In Proceedings of the 3rd ACM SIGCOMM conference on Internet measurement (pp. 51–64).
8.
go back to reference Dickson, M. (2006). An examination into AOL Instant Messenger 5.5 contact identification. Digital Investigation, 3(4), 227–237.CrossRef Dickson, M. (2006). An examination into AOL Instant Messenger 5.5 contact identification. Digital Investigation, 3(4), 227–237.CrossRef
9.
go back to reference Dickson, M. (2006). An examination into MSN Messenger 7.5 contact identification. Digital Investigation, 3(2), 79–83.CrossRef Dickson, M. (2006). An examination into MSN Messenger 7.5 contact identification. Digital Investigation, 3(2), 79–83.CrossRef
10.
go back to reference Dickson, M. (2007). An examination into Trillian basic 3. x contact identification. Digital Investigation, 4(1), 36–45.CrossRef Dickson, M. (2007). An examination into Trillian basic 3. x contact identification. Digital Investigation, 4(1), 36–45.CrossRef
11.
go back to reference Dickson, M. (2006). An examination into Yahoo Messenger 7.0 contact identification. Digital Investigation, 3(3), 159–165.CrossRef Dickson, M. (2006). An examination into Yahoo Messenger 7.0 contact identification. Digital Investigation, 3(3), 159–165.CrossRef
12.
go back to reference Gao, Y., & Cao, T. (2010). Memory forensics for QQ from a live system. Journal of Computers, 5(4), 541–548.CrossRef Gao, Y., & Cao, T. (2010). Memory forensics for QQ from a live system. Journal of Computers, 5(4), 541–548.CrossRef
13.
go back to reference Gavish, B., & Tucci, C. L. (2006). Fraudulent auctions on the Internet. Electronic Commerce Research, 6(2), 127–140.CrossRef Gavish, B., & Tucci, C. L. (2006). Fraudulent auctions on the Internet. Electronic Commerce Research, 6(2), 127–140.CrossRef
14.
go back to reference Goel, L., & Prokopec, S. (2009). If you build it will they come?–An empirical investigation of consumer perceptions and strategy in virtual worlds. Electronic Commerce Research, 9(1–2), 115–134.CrossRef Goel, L., & Prokopec, S. (2009). If you build it will they come?–An empirical investigation of consumer perceptions and strategy in virtual worlds. Electronic Commerce Research, 9(1–2), 115–134.CrossRef
15.
go back to reference Husain, M. I., & Sridhar, R. (2010). iForensics: forensic analysis of instant messaging on smart phones. Digital Forensics and Cyber Crime, 31, 9–18.CrossRef Husain, M. I., & Sridhar, R. (2010). iForensics: forensic analysis of instant messaging on smart phones. Digital Forensics and Cyber Crime, 31, 9–18.CrossRef
16.
go back to reference Levendoski, M., Rogers, M., & Huff, P. (2011). Yahoo messenger forensics for Windows Vista and Windows 7. CERIAS: Purdue University. Levendoski, M., Rogers, M., & Huff, P. (2011). Yahoo messenger forensics for Windows Vista and Windows 7. CERIAS: Purdue University.
17.
go back to reference Lim, K. S., Savoldi, A., Lee, C., & Lee, S. (2012). On-the-spot digital investigation by means of LDFS: Live data forensic system. Mathematical and Computer Modelling, 55(1), 223–240.CrossRef Lim, K. S., Savoldi, A., Lee, C., & Lee, S. (2012). On-the-spot digital investigation by means of LDFS: Live data forensic system. Mathematical and Computer Modelling, 55(1), 223–240.CrossRef
18.
go back to reference Meehan, A., Manes, G., Davis, L., Hale, J., & Shenoi, S. (2001). Packet sniffing for automated chat room monitoring and evidence preservation. Workshop on Information Assurance and Security, 2, 1045. Meehan, A., Manes, G., Davis, L., Hale, J., & Shenoi, S. (2001). Packet sniffing for automated chat room monitoring and evidence preservation. Workshop on Information Assurance and Security, 2, 1045.
20.
go back to reference Patton, M., & Jøsang, A. (2004). Technologies for trust in electronic commerce. Electronic Commerce Research, 4(1–2), 9–21.CrossRef Patton, M., & Jøsang, A. (2004). Technologies for trust in electronic commerce. Electronic Commerce Research, 4(1–2), 9–21.CrossRef
21.
go back to reference Reust, J. (2006). Case study: AOL instant messenger trace evidence. Digital Investigation, 3(4), 238–243.CrossRef Reust, J. (2006). Case study: AOL instant messenger trace evidence. Digital Investigation, 3(4), 238–243.CrossRef
22.
go back to reference Smith, R., & Shao, J. (2007). Privacy and e-commerce: A consumer-centric perspective. Electronic Commerce Research, 7(2), 89–116.CrossRef Smith, R., & Shao, J. (2007). Privacy and e-commerce: A consumer-centric perspective. Electronic Commerce Research, 7(2), 89–116.CrossRef
23.
go back to reference Valvi, A. C., & Fragkos, K. C. (2012). Critical review of the e-loyalty literature: A purchase-centred framework. Electronic Commerce Research, 12(3), 331–378.CrossRef Valvi, A. C., & Fragkos, K. C. (2012). Critical review of the e-loyalty literature: A purchase-centred framework. Electronic Commerce Research, 12(3), 331–378.CrossRef
24.
go back to reference Van Dongen, W. S. (2007). Forensic artefacts left by Pidgin Messenger 2.0. Digital Investigation, 4(3), 138–145.CrossRef Van Dongen, W. S. (2007). Forensic artefacts left by Pidgin Messenger 2.0. Digital Investigation, 4(3), 138–145.CrossRef
25.
go back to reference Van Dongen, W. S. (2007). Forensic artefacts left by Windows Live Messenger 8.0. Digital Investigation, 4(2), 73–87.CrossRef Van Dongen, W. S. (2007). Forensic artefacts left by Windows Live Messenger 8.0. Digital Investigation, 4(2), 73–87.CrossRef
Metadata
Title
Correlating messages from multiple IM networks to identify digital forensic artifacts
Authors
Muhammmad Yasin
Firdous Kausar
Eisa Aleisa
Jongsung Kim
Publication date
01-11-2014
Publisher
Springer US
Published in
Electronic Commerce Research / Issue 3/2014
Print ISSN: 1389-5753
Electronic ISSN: 1572-9362
DOI
https://doi.org/10.1007/s10660-014-9145-4

Other articles of this Issue 3/2014

Electronic Commerce Research 3/2014 Go to the issue