Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2022 Feb 1;22(3):1115.
doi: 10.3390/s22031115.

A Multi-Layer Semantic Approach for Digital Forensics Automation for Online Social Networks

Affiliations

A Multi-Layer Semantic Approach for Digital Forensics Automation for Online Social Networks

Humaira Arshad et al. Sensors (Basel). .

Abstract

Currently, law enforcement and legal consultants are heavily utilizing social media platforms to easily access data associated with the preparators of illegitimate events. However, accessing this publicly available information for legal use is technically challenging and legally intricate due to heterogeneous and unstructured data and privacy laws, thus generating massive workloads of cognitively demanding cases for investigators. Therefore, it is critical to develop solutions and tools that can assist investigators in their work and decision making. Automating digital forensics is not exclusively a technical problem; the technical issues are always coupled with privacy and legal matters. Here, we introduce a multi-layer automation approach that addresses the automation issues from collection to evidence analysis in online social network forensics. Finally, we propose a set of analysis operators based on domain correlations. These operators can be embedded in software tools to help the investigators draw realistic conclusions. These operators are implemented using Twitter ontology and tested through a case study. This study describes a proof-of-concept approach for forensic automation on online social networks.

Keywords: automation tools; evidence analysis; experimental visualization; forensic applications; forensic automation; semantic data presentation; social network forensics.

PubMed Disclaimer

Conflict of interest statement

The authors declare no conflict of interest.

Figures

Figure 1
Figure 1
The multi-layered conceptual model.
Figure 2
Figure 2
The architecture of the multi-layered model.
Figure 3
Figure 3
Implementation details of the multi-layered model.
Figure 4
Figure 4
Raw data downloaded by Twitter scraper.
Figure 5
Figure 5
PHP codes for Facebook API data retrieval.
Figure 6
Figure 6
PHP codes for Twitter API data retrieval.
Figure 7
Figure 7
Interaction graph (a) from the subject to her contacts; (b) from contacts to subject.
Figure 8
Figure 8
(a) Temporal activity graph for the subject. (b) Temporal activity graph for one of the users.
Figure 9
Figure 9
Tweet cloud generated from the tweets of a cyber-bullying suspect.
Figure 10
Figure 10
(a) The objects of the subject re-shared by her contacts. (b) The objects of other users re-shared by the subject.
Figure 11
Figure 11
(a) Timeline of places visited by subjects. (b) Raw geographic data.
Figure 12
Figure 12
Links from evidence to the objects.

Similar articles

Cited by

References

    1. Mulazzani M., Huber M., Weippl E. Social network forensics: Tapping the data pool of social networks. Eighth Annu. IFIP WG. 2012;11:20.
    1. Li S., Sun Q., Xu X. Forensic analysis of digital images over smart devices and online social networks; Proceedings of the 2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC/SmartCity/DSS); Exeter, UK. 28–30 June 2018; pp. 1015–1021.
    1. Al-Khateeb S., Hussain M.N., Agarwal N. In: Leveraging Social Network Analysis and Cyber Forensics Approaches to Study Cyber Propaganda Campaigns. Özyer T., Bakshi S., Alhajj R., editors. Springer; Cham, Switzerland: 2019. pp. 19–42. - DOI
    1. Stoyanova M., Nikoloudakis Y., Panagiotakis S., Pallis E., Markakis E.K. A survey on the internet of things (IoT) forensics: Challenges, approaches, and open issues. IEEE Commun. Surv. Tutor. 2020;22:1191–1221. doi: 10.1109/COMST.2019.2962586. - DOI
    1. Billingsley J. Beyond Keywords: Is Keyword Search Becoming Obsolete In The New Age Of Forensic Digital Investigation? | Forensic Focus—Articles. 2016. [(accessed on 6 February 2021)]. Available online: https://articles.forensicfocus.com/2016/03/11/beyond-keywords-is-keyword...

LinkOut - more resources