Skip to main content
Log in

Social cyber forensics: leveraging open source information and social network analysis to advance cyber security informatics

  • Manuscript
  • Published:
Computational and Mathematical Organization Theory Aims and scope Submit manuscript

Abstract

In this paper, we introduce the concept of social cyber forensics and its usability. Then, we introduce a tool, i.e., Maltego that can be used to study the cross-media affiliation and uncover hidden relations among various online groups. We also provide three stepwise methodologies that leverage Maltego and various open source information to uncover the hidden relationship among (1) Twitter accounts and a set of websites/blogs; (2) websites/blogs and other websites/blogs; or (3) infer the ownership of a set of websites/blogs. These methodologies have been tested during many cyber propaganda campaigns that were projected against NATO forces. A high-level view of these case studies that leveraged the concepts and methodologies provided in this paper are briefly highlighted here while the details of each case were published in various venues which are pointed out for interested readers.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Notes

  1. Google Analytics: https://analytics.google.com/.

  2. PeekYou: http://www.peekyou.com/.

  3. Metagoofil: http://www.edge-security.com/metagoofil.php.

  4. Shodan: https://www.shodan.io/.

  5. Paterva Ltd: https://www.paterva.com/.

  6. Trident Juncture 2015 exercise: https://jfcbs.nato.int/trident-juncture.

  7. Exercise Anakonda 2016: http://www.eur.army.mil/anakonda/.

  8. Brilliant Jump 2016 exercise: http://www.jfcbs.nato.int/page5735825/brilliant-jump-2016.

  9. S. M. Research Foundation. Nodexl: Network overview, discovery and exploration for excel. http://nodexl.codeplex.com/wikipage?tit.

  10. D. M. A. DoD News: Operation atlantic resolve exercises begin in eastern europe. http://www.defense.gov/news/newsarticle.aspx?id=128441.

  11. RT: ‘Tanks? no thanks!’: Czechs unhappy about us military convoy crossing country. http://www.rt.com/news/243073-czech-protest-us-tanks/.

  12. Sindelar D: U.S. convoy: In Czech republic, real-life supporters outnumber virtual opponents. http://www.rferl.org/content/us-convoy-czech-republic-supporters-virtual-opponents/26928346.html.

  13. Sputnik: Czechs plan multiple protests of U.S. army’s operation dragoon ride. http://sputniknews.com/europe/20150328/1020135278.html.

References

Download references

Acknowledgements

This research is funded in part by the U.S. National Science Foundation (IIS-1636933, ACI-1429160, and IIS-1110868), U.S. Office of Naval Research (N00014-10-1-0091, N00014-14-1-0489, N00014-15-P-1187, N00014-16-1-2016, N00014-16-1-2412, N00014-17-1-2605, N00014-17-1-2675, N00014-19-1-2336), U.S. Air Force Research Lab, U.S. Army Research Office (W911NF-16-1-0189), U.S. Defense Advanced Research Projects Agency (W31P4Q-17-C-0059), Arkansas Research Alliance, the Jerry L. Maulden/Entergy Fund at the University of Arkansas at Little Rock, and Creighton University’s College of Arts and Sciences. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the funding organizations. The researchers gratefully acknowledge the support.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nitin Agarwal.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Al-khateeb, S., Agarwal, N. Social cyber forensics: leveraging open source information and social network analysis to advance cyber security informatics. Comput Math Organ Theory 26, 412–430 (2020). https://doi.org/10.1007/s10588-019-09296-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10588-019-09296-3

Keywords

Navigation