Abstract
Online social networks (OSNs) are immensely prevalent and have now become a ubiquitous and important part of the modern, developed society. However, online social networks pose significant problems to digital forensic investigators who have no experience online. Data will reside on multiples of servers in multiple countries, across multiple jurisdictions. Capturing it before it is overwritten or deleted is a known problem, mirrored in other cloud based services. In this article, a novel method has been developed for the extraction, analysis, visualization, and comparison of snapshotted user profile data from the online social network Twitter. The research follows a process of design, implementation, simulation, and experimentation. Source code of the tool that was developed to facilitate data extraction has been made available on the Internet.
Similar content being viewed by others
References
Streeter C L, Gillespie D F. Social network analysis. J Social Service Res, 1993, 16: 201–222
de Souza Z, Dick G N. Disclosure of information by children in social networking — not just a case of “you show me yours and I’ll show you mine”. Int J Inf Manage, 2009, 29: 255–261
van Eecke P, Truyens M. Privacy and social networks. Comput Law Secur Rev, 2010, 26: 535–546
Boyd D M, Ellison N B. Social network sites: definition, history, and scholarship. J Comput Mediated Commun, 2007, 13: 210–230
Acquisti A, Gross R. Imagined communities: awareness, information sharing, and privacy on the Facebook. In: Danezis G, Golle P, eds. Privacy Enhancing Technologies, 2006. 36–58
Gross R, Acquisti A. Information revelation and privacy in online social networks. In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society. Now York: ACM, 2005. 71–80
Otte E, Rousseau R. Social network analysis: a powerful strategy, also for the information sciences. J Inf Sci, 2002, 28: 441–453
Hoff P D, Raftery A E, Handcock M S. Latent space approaches to social network analysis. J Am Stat Assoc, 2002, 97: 1090–1098
Borgatti S P, Mehra A, Brass D J, et al. Network analysis in the social sciences. Science, 2009, 323: 892–895
Mizruchi M S. Social network analysis: recent achievements and current controversies. Acta Sociologica, 1994, 37: 329–343
Sabater J, Sierra C. Reputation and social network analysis in multi-agent systems. In: Proceedings of the First International Joint Conference on Autonomous Agents and Multiagent Systems: part 1. New York: ACM, 2002. 475–482
de Meo P, Ferrara E, Fiumara G, et al. Generalized louvain method for community detection in large networks. In: Proceedings of 2011 11th International Conference on Intelligent Systems Design and Applications. Piscataway: IEEE, 2011. 88–93
Wilson R E, Gosling S D, Graham L T. A review of Facebook research in the social sciences. Perspect Psycholog Sci, 2012, 7: 203–220
Tichy N M, Tushman M L, Fombrun C. Social network analysis for organizations. Acad Manage Rev, 1979, 4: 507–519
Kossinets G, Watts D J. Empirical analysis of an evolving social network. Science, 2006, 311: 88–90
McGloin J M, Kirk D S. Social network analysis. In: Piquero A R, Weisburd D, eds. Handbook of Quantitative Criminology. New York: Springer, 2010. 209–224
Leighton B. The community concept in criminology: toward a social network approach. J Res Crime Delinquency, 1988, 25: 351–374
Fraser M, Hawkins J D. Social network analysis and drug misuse. Social Service Rev, 1984: 81–97
Taylor M, Haggerty J, Gresty D, et al. Forensic investigation of peer-to-peer networks. Netw Secur, 2010, 2010: 12–15
Berners-Lee T. Long live the Web. Sci Am, 2010, 303: 80–85
Chard K, Bubendorfer K, Caton S, et al. Social cloud computing: a vision for socially motivated resource sharing. IEEE Trans Services Computing, 2012, 5: 551–563
Hew K F. Students’ and teachers’ use of Facebook. Comput Human Behav, 2011, 27: 662–676
Chrisofides E, Muise A, Desmaris S. Information disclosure and control on Facebook: are they two sides of the same coin or two different processes? Cyber Psychol Behav, 2009, 12: 341–345
Breslin J, Decker S. The future of social networks on the Internet: the need for semantics. Internet Comput, 2007, 11: 86–90
Lessig L. Code Version 2.0. New York: Basic Books, 2006
Cutillo L A, Molva R, Strufe T. Safebook: a privacy-preserving online social network leveraging on real-life trust. IEEE Commun Mag, 2009, 47: 94–101
Sigman A. Well connected? The biological implications of ‘social networking’. Biologist, 2008, 56: 14–20
Ahmed F, Abulaish M. An MCL-based approach for spam profile detection in online social networks. In: Proceedings of 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications. Piscataway: IEEE, 2012. 602–608
Li S, Yun X, Hao Z, et al. A propagation model for social engineering botnets in social networks. In: Proceedings of 2011 12th International Conference on Parallel and Distributed Computing, Applications and Technologies. Piscataway: IEEE, 2011. 423–426
Jagnere P. Vulnerabilities in social networking sites. In: Proceedings of 2012 2nd IEEE International Conference on Parallel Distributed and Grid Computing. Piscataway: IEEE, 2012. 463–468
Bernard C, Debar H, Benayoune S. Cross-domain vulnerabilities over social networks. In: Proceedings of 2012 4th International Conference on Computational Aspects of Social Networks. Piscataway: IEEE, 2012. 8–13
Kontaxis G, Polakis I, Ioannidis S, et al. Detecting social network profile cloning. In: Proceedings of 2011 IEEE International Conference on Pervasive Computing and Communications Workshops. Piscataway: IEEE, 2011. 295–300
Zhang X, Zhu S, Liang W. Detecting spam and promoting campaigns in the Twitter social network. In: Proceedings of 2012 IEEE 12th International Conference on Data Mining. Piscataway: IEEE, 2012. 1194–1199
Narayanan A, Shmatikov V. De-anonymizing social networks. In: Proceedings of 2009 30th IEEE Symposium on Security and Privacy. Piscataway: IEEE, 2009. 173–187
Tufekci Z. Can you see me now? Audience and disclosure regulation in online social network sites. Bull Sci Technol Soc, 2008, 28: 20–36
Granger S. Social engineering fundamentals, part I: hacker tactics. Secur Focus, 2001
Huber M, Kowalski S, Nohlberg M, et al. Towards automating social engineering using social networking sites. In: Proceedings of 2009 International Conference on Computational Science and Engineering (Volume 3). Piscataway: IEEE, 2009. 117–124
Athanasopoulos E, Makridakis A, Antonatos S, et al. Antisocial networks: turning a social network into a botnet. In: Wu T C, Lei C L, Rijmen V, et al, eds. Information Security. Berlin: Springer, 2008. 146–160
Weiss S. Privacy threat model for data portability in social network applications. Int J Inf Manag, 2009, 29: 249–254
Kierkegaard S. Twitter thou doeth? Comput Law Secur Rev, 2010, 26: 577–594
Bonneau J, Preibusch S. The privacy jungle: On the market for data protection in social networks. In: Moore T, Pym D, Ioannidis C, eds. Economics of Information Security and Privacy. Berlin: Springer, 2010. 121–167
Nosko A, Wood E, Molema S. All about me: disclosure in online social networking profiles: the case of Facebook. Comput Human Behav, 2010, 26: 406–418
Tene O. Privacy: the new generations. Int Data Privacy Law, 2011, 1: 15–27
Lee J, Hong D. Pervasive Forensic Analysis Based on Mobile Cloud Computing. In: Proceedings of 2011 3rd International Conference on Multimedia Information Networking and Security. Piscataway: IEEE, 2011. 572–576
Pollitt M M. An ad hoc review of digital forensic models. In: Proceedings of 2007 2nd International Workshop on Systematic Approaches to Digital Forensic Engineering. Piscataway: IEEE, 2007. 43–54
Yusoff Y, Ismail R, Hassan Z. Common phases of computer forensics investigation models. Int J Adv Comput Sci Inf Technol, 2011, 3: 17–31
Ieong R S C. FORZA — digital forensics investigation framework that incorporate legal issues. Digital Invest, 2006, 3: 29–36
Mulazzani M, Huber M, Weippl E R. Social network forensics: tapping the data pool of social networks. In: Proceedings of 8th Annual IFIP WG 11. 9 International Conference on Digital Forensics, Pretoria, 2012
Biggs S, Vidalis S. Cloud computing: the impact on digital forensic investigations. In: Proceedings of 2009 International Conference for Internet Technology and Secured Transactions. Piscataway: IEEE, 2009. 1–6
Pollitt M. Computer forensics: an approach to evidence in cyberspace. In: Proceedings of the National Information Systems Security Conference, Baltimore, 1995. 487–491
ACPO. Good Practice Guide for Computer-Based Electronic Evidence, 2007
Pollitt M M. Report on digital evidence. In: Proceedings of 13th INTERPOL Forensic Science Symposium, Lyon, 2001
Reilly D, Wren C, Berry T. Cloud computing: forensic challenges for law enforcement. In: Proceedings of 2010 International Conference for Internet Technology and Secured Transactions. Piscataway: IEEE, 2010. 1–7
Armbrust M, Fox A, Griffith R, et al. A view of cloud computing. Commun ACM, 2010, 53: 50–58
Pallis G. Cloud computing: the new frontier of internet computing. IEEE Internet Comput, 2010, 14: 70–73
Mell P, Grance T. The NIST definition of cloud computing. NIST Special Publication 800-145. 2011
Dikaiakos M D, Katsaros D, Mehra P, et al. Cloud computing: distributed internet computing for IT and scientific research. IEEE Internet Comput, 2009, 13: 10–13
Yan C. Cybercrime forensic system in cloud computing. In: Proceedings of 2011 International Conference on Image Analysis and Signal Processing. Piscataway: IEEE, 2011. 612–615
Birk D, Wegener C. Technical issues of forensic investigations in cloud computing environments. In: Proceedings of 2011 IEEE 6th International Workshop on Systematic Approaches to Digital Forensic Engineering. Piscataway: IEEE, 2011. 1–10
Martini B, Choo K K R. An integrated conceptual digital forensic framework for cloud computing. Digital Invest, 2012, 9: 71–80
Sang T. A Log Based Approach to Make Digital Forensics Easier on Cloud Computing. In: Proceedings of 2013 3rd International Conference on Intelligent System Design and Engineering Applications. Piscataway: IEEE, 2013. 91–94
Birk D, Wegener C. Technical issues of forensic investigations in cloud computing environments. In: Proceedings of 2011 IEEE 6th International Workshop on Systematic Approaches to Digital Forensic Engineering. Piscataway: IEEE, 2011. 1–10
Sibiya G, Venter H S, Ngobeni S, et al. Guidelines for procedures of a harmonised digital forensic process in network forensics. In: Proceedings of 2012 Information Security for South Africa Conference. Piscataway: IEEE, 2012: 1–7
Sharma H, Sabharwal N. Investigating the implications of virtual forensics. In: Proceedings of 2012 International Conference on Advances in Engineering, Science and Management. Piscataway: IEEE, 2012. 617–620
Thorpe S, Ray I, Grandison T, et al. Cloud log forensics metadata analysis. In: Proceedings of 2012 IEEE 36th Annual Computer Software and Applications Conference Workshops. Piscataway: IEEE, 2012. 194–199
Yang B W, Tsai W C, Chen A P, et al. Cloud computing architecture for social comuting — a comparison study of Facebook and Google. In: Proceedings of 2011 International Conference on Advances in Social Networks Analysis and Mining, Kaohsiung, 2011. 741–745
Hou S, Uehara T, Yiu S M, et al. Privacy preserving confidential forensic investigation for shared or remote servers. In: Proceedings of 2011 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing. Piscataway: IEEE, 2011. 378–383
de Paula A M G. Security aspects and future trends of social networks. In: Proceedings of the 4th International Conference on Forensic Computer Science, Natal, 2009. 66–74
Zainudin N M, Merabti M, Llewellyn-Jones D. A digital forensic investigation model for online social networking. In: Proceedings of the 11th Annual Conference on the Convergence of Telecommunications, Networking & Broadcasting, Liverpool, 2010. 21–22
Cheng J, Hoffman J, Lamarche T, et al. Forensics tools for social network security solutions. In: Proceedings of Student-Faculty Research Day. New York: Pace University, 2009. A4.1–A4.8
Garfinkel S L. Digital forensics research: the next 10 years. Digital Invest, 2010, 7: S64–S73
Chu H C, Deng D J, Park J H. Live data mining concerning social networking forensics based on a Facebook session through aggregation of social data. IEEE J Sel Areas Commun, 2011, 29: 1368–1376
Simon M, Slay J. Recovery of skype application activity data from physical memory. In: Proceedings of 2010 International Conference on Availability, Reliability, and Security. Piscataway: IEEE, 2010. 283–288
Cusack B, Son J. Evidence examination tools for social networks. In: Proceedings of the 10th Australian Digital Forensics Conference, Perth, 2012. 33–40
Al Mutawa N, Al Awadhi I, Baggili I, et al. Forensic artifacts of Facebook’s instant messaging service. In: Proceedings of 2011 International Conference for Internet Technology and Secured Transactions. Piscataway: IEEE, 2011. 771–776
Castiglione A, Cattaneo G, de Santis A. A forensic analysis of images on online social networks. In: Proceedings of 2011 3rd International Conference on Intelligent Networking and Collaborative Systems. Piscataway: IEEE, 2011. 679–684
Zainudin N M, Merabti M, Llewellyn-Jones D. Online social networks as supporting evidence: a digital forensic investigation model and its application design. In: Proceedings of 2011 International Conference on Research and Innovation in Information Systems. Piscataway: IEEE, 2011. 1–6
Burde M R, Khan M T. Tracebility in digital forensic investigation process. Int J Adv Res Comput Sci Softw Eng, 2012, 2: 45–47
Haggerty J, Karran A J, Lamb D J, et al. A framework for the forensic investigation of unstructured email relationship data. Int J Digital Crime Forensics, 2011, 3: 1–18
Roussev V, Chen Y, Bourg T, et al. Forensic filesystem hashing revisited. Digital Invest, 2006, 3: 82–90
Roussev V. Hashing and data fingerprinting in digital forensics. IEEE Secur Privacy, 2009, 7: 49–55
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Howden, C., Liu, L., Li, Z. et al. Virtual vignettes: the acquisition, analysis, and presentation of social network data. Sci. China Inf. Sci. 57, 1–20 (2014). https://doi.org/10.1007/s11432-014-5069-9
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11432-014-5069-9