Skip to main content
Log in

Virtual vignettes: the acquisition, analysis, and presentation of social network data

  • Research Paper
  • Special Focus on Adv. Sci. & Tech. for Future Cybermatics
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

Abstract

Online social networks (OSNs) are immensely prevalent and have now become a ubiquitous and important part of the modern, developed society. However, online social networks pose significant problems to digital forensic investigators who have no experience online. Data will reside on multiples of servers in multiple countries, across multiple jurisdictions. Capturing it before it is overwritten or deleted is a known problem, mirrored in other cloud based services. In this article, a novel method has been developed for the extraction, analysis, visualization, and comparison of snapshotted user profile data from the online social network Twitter. The research follows a process of design, implementation, simulation, and experimentation. Source code of the tool that was developed to facilitate data extraction has been made available on the Internet.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Streeter C L, Gillespie D F. Social network analysis. J Social Service Res, 1993, 16: 201–222

    Article  Google Scholar 

  2. de Souza Z, Dick G N. Disclosure of information by children in social networking — not just a case of “you show me yours and I’ll show you mine”. Int J Inf Manage, 2009, 29: 255–261

    Article  Google Scholar 

  3. van Eecke P, Truyens M. Privacy and social networks. Comput Law Secur Rev, 2010, 26: 535–546

    Article  Google Scholar 

  4. Boyd D M, Ellison N B. Social network sites: definition, history, and scholarship. J Comput Mediated Commun, 2007, 13: 210–230

    Article  Google Scholar 

  5. Acquisti A, Gross R. Imagined communities: awareness, information sharing, and privacy on the Facebook. In: Danezis G, Golle P, eds. Privacy Enhancing Technologies, 2006. 36–58

    Chapter  Google Scholar 

  6. Gross R, Acquisti A. Information revelation and privacy in online social networks. In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society. Now York: ACM, 2005. 71–80

    Chapter  Google Scholar 

  7. Otte E, Rousseau R. Social network analysis: a powerful strategy, also for the information sciences. J Inf Sci, 2002, 28: 441–453

    Article  Google Scholar 

  8. Hoff P D, Raftery A E, Handcock M S. Latent space approaches to social network analysis. J Am Stat Assoc, 2002, 97: 1090–1098

    Article  MATH  MathSciNet  Google Scholar 

  9. Borgatti S P, Mehra A, Brass D J, et al. Network analysis in the social sciences. Science, 2009, 323: 892–895

    Article  Google Scholar 

  10. Mizruchi M S. Social network analysis: recent achievements and current controversies. Acta Sociologica, 1994, 37: 329–343

    Article  Google Scholar 

  11. Sabater J, Sierra C. Reputation and social network analysis in multi-agent systems. In: Proceedings of the First International Joint Conference on Autonomous Agents and Multiagent Systems: part 1. New York: ACM, 2002. 475–482

    Chapter  Google Scholar 

  12. de Meo P, Ferrara E, Fiumara G, et al. Generalized louvain method for community detection in large networks. In: Proceedings of 2011 11th International Conference on Intelligent Systems Design and Applications. Piscataway: IEEE, 2011. 88–93

    Chapter  Google Scholar 

  13. Wilson R E, Gosling S D, Graham L T. A review of Facebook research in the social sciences. Perspect Psycholog Sci, 2012, 7: 203–220

    Article  Google Scholar 

  14. Tichy N M, Tushman M L, Fombrun C. Social network analysis for organizations. Acad Manage Rev, 1979, 4: 507–519

    Google Scholar 

  15. Kossinets G, Watts D J. Empirical analysis of an evolving social network. Science, 2006, 311: 88–90

    Article  MATH  MathSciNet  Google Scholar 

  16. McGloin J M, Kirk D S. Social network analysis. In: Piquero A R, Weisburd D, eds. Handbook of Quantitative Criminology. New York: Springer, 2010. 209–224

    Chapter  Google Scholar 

  17. Leighton B. The community concept in criminology: toward a social network approach. J Res Crime Delinquency, 1988, 25: 351–374

    Article  Google Scholar 

  18. Fraser M, Hawkins J D. Social network analysis and drug misuse. Social Service Rev, 1984: 81–97

    Google Scholar 

  19. Taylor M, Haggerty J, Gresty D, et al. Forensic investigation of peer-to-peer networks. Netw Secur, 2010, 2010: 12–15

    Article  Google Scholar 

  20. Berners-Lee T. Long live the Web. Sci Am, 2010, 303: 80–85

    Article  Google Scholar 

  21. Chard K, Bubendorfer K, Caton S, et al. Social cloud computing: a vision for socially motivated resource sharing. IEEE Trans Services Computing, 2012, 5: 551–563

    Article  Google Scholar 

  22. Hew K F. Students’ and teachers’ use of Facebook. Comput Human Behav, 2011, 27: 662–676

    Article  Google Scholar 

  23. Chrisofides E, Muise A, Desmaris S. Information disclosure and control on Facebook: are they two sides of the same coin or two different processes? Cyber Psychol Behav, 2009, 12: 341–345

    Article  Google Scholar 

  24. Breslin J, Decker S. The future of social networks on the Internet: the need for semantics. Internet Comput, 2007, 11: 86–90

    Article  Google Scholar 

  25. Lessig L. Code Version 2.0. New York: Basic Books, 2006

    Google Scholar 

  26. Cutillo L A, Molva R, Strufe T. Safebook: a privacy-preserving online social network leveraging on real-life trust. IEEE Commun Mag, 2009, 47: 94–101

    Article  Google Scholar 

  27. Sigman A. Well connected? The biological implications of ‘social networking’. Biologist, 2008, 56: 14–20

    Google Scholar 

  28. Ahmed F, Abulaish M. An MCL-based approach for spam profile detection in online social networks. In: Proceedings of 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications. Piscataway: IEEE, 2012. 602–608

    Chapter  Google Scholar 

  29. Li S, Yun X, Hao Z, et al. A propagation model for social engineering botnets in social networks. In: Proceedings of 2011 12th International Conference on Parallel and Distributed Computing, Applications and Technologies. Piscataway: IEEE, 2011. 423–426

    Chapter  Google Scholar 

  30. Jagnere P. Vulnerabilities in social networking sites. In: Proceedings of 2012 2nd IEEE International Conference on Parallel Distributed and Grid Computing. Piscataway: IEEE, 2012. 463–468

    Chapter  Google Scholar 

  31. Bernard C, Debar H, Benayoune S. Cross-domain vulnerabilities over social networks. In: Proceedings of 2012 4th International Conference on Computational Aspects of Social Networks. Piscataway: IEEE, 2012. 8–13

    Google Scholar 

  32. Kontaxis G, Polakis I, Ioannidis S, et al. Detecting social network profile cloning. In: Proceedings of 2011 IEEE International Conference on Pervasive Computing and Communications Workshops. Piscataway: IEEE, 2011. 295–300

    Google Scholar 

  33. Zhang X, Zhu S, Liang W. Detecting spam and promoting campaigns in the Twitter social network. In: Proceedings of 2012 IEEE 12th International Conference on Data Mining. Piscataway: IEEE, 2012. 1194–1199

    Chapter  Google Scholar 

  34. Narayanan A, Shmatikov V. De-anonymizing social networks. In: Proceedings of 2009 30th IEEE Symposium on Security and Privacy. Piscataway: IEEE, 2009. 173–187

    Chapter  Google Scholar 

  35. Tufekci Z. Can you see me now? Audience and disclosure regulation in online social network sites. Bull Sci Technol Soc, 2008, 28: 20–36

    Article  Google Scholar 

  36. Granger S. Social engineering fundamentals, part I: hacker tactics. Secur Focus, 2001

    Google Scholar 

  37. Huber M, Kowalski S, Nohlberg M, et al. Towards automating social engineering using social networking sites. In: Proceedings of 2009 International Conference on Computational Science and Engineering (Volume 3). Piscataway: IEEE, 2009. 117–124

    Chapter  Google Scholar 

  38. Athanasopoulos E, Makridakis A, Antonatos S, et al. Antisocial networks: turning a social network into a botnet. In: Wu T C, Lei C L, Rijmen V, et al, eds. Information Security. Berlin: Springer, 2008. 146–160

    Chapter  Google Scholar 

  39. Weiss S. Privacy threat model for data portability in social network applications. Int J Inf Manag, 2009, 29: 249–254

    Article  Google Scholar 

  40. Kierkegaard S. Twitter thou doeth? Comput Law Secur Rev, 2010, 26: 577–594

    Article  Google Scholar 

  41. Bonneau J, Preibusch S. The privacy jungle: On the market for data protection in social networks. In: Moore T, Pym D, Ioannidis C, eds. Economics of Information Security and Privacy. Berlin: Springer, 2010. 121–167

    Chapter  Google Scholar 

  42. Nosko A, Wood E, Molema S. All about me: disclosure in online social networking profiles: the case of Facebook. Comput Human Behav, 2010, 26: 406–418

    Article  Google Scholar 

  43. Tene O. Privacy: the new generations. Int Data Privacy Law, 2011, 1: 15–27

    Article  Google Scholar 

  44. Lee J, Hong D. Pervasive Forensic Analysis Based on Mobile Cloud Computing. In: Proceedings of 2011 3rd International Conference on Multimedia Information Networking and Security. Piscataway: IEEE, 2011. 572–576

    Chapter  Google Scholar 

  45. Pollitt M M. An ad hoc review of digital forensic models. In: Proceedings of 2007 2nd International Workshop on Systematic Approaches to Digital Forensic Engineering. Piscataway: IEEE, 2007. 43–54

    Google Scholar 

  46. Yusoff Y, Ismail R, Hassan Z. Common phases of computer forensics investigation models. Int J Adv Comput Sci Inf Technol, 2011, 3: 17–31

    Google Scholar 

  47. Ieong R S C. FORZA — digital forensics investigation framework that incorporate legal issues. Digital Invest, 2006, 3: 29–36

    Article  Google Scholar 

  48. Mulazzani M, Huber M, Weippl E R. Social network forensics: tapping the data pool of social networks. In: Proceedings of 8th Annual IFIP WG 11. 9 International Conference on Digital Forensics, Pretoria, 2012

    Google Scholar 

  49. Biggs S, Vidalis S. Cloud computing: the impact on digital forensic investigations. In: Proceedings of 2009 International Conference for Internet Technology and Secured Transactions. Piscataway: IEEE, 2009. 1–6

    Google Scholar 

  50. Pollitt M. Computer forensics: an approach to evidence in cyberspace. In: Proceedings of the National Information Systems Security Conference, Baltimore, 1995. 487–491

    Google Scholar 

  51. ACPO. Good Practice Guide for Computer-Based Electronic Evidence, 2007

    Google Scholar 

  52. Pollitt M M. Report on digital evidence. In: Proceedings of 13th INTERPOL Forensic Science Symposium, Lyon, 2001

    Google Scholar 

  53. Reilly D, Wren C, Berry T. Cloud computing: forensic challenges for law enforcement. In: Proceedings of 2010 International Conference for Internet Technology and Secured Transactions. Piscataway: IEEE, 2010. 1–7

    Google Scholar 

  54. Armbrust M, Fox A, Griffith R, et al. A view of cloud computing. Commun ACM, 2010, 53: 50–58

    Article  Google Scholar 

  55. Pallis G. Cloud computing: the new frontier of internet computing. IEEE Internet Comput, 2010, 14: 70–73

    Article  Google Scholar 

  56. Mell P, Grance T. The NIST definition of cloud computing. NIST Special Publication 800-145. 2011

    Google Scholar 

  57. Dikaiakos M D, Katsaros D, Mehra P, et al. Cloud computing: distributed internet computing for IT and scientific research. IEEE Internet Comput, 2009, 13: 10–13

    Article  Google Scholar 

  58. Yan C. Cybercrime forensic system in cloud computing. In: Proceedings of 2011 International Conference on Image Analysis and Signal Processing. Piscataway: IEEE, 2011. 612–615

    Google Scholar 

  59. Birk D, Wegener C. Technical issues of forensic investigations in cloud computing environments. In: Proceedings of 2011 IEEE 6th International Workshop on Systematic Approaches to Digital Forensic Engineering. Piscataway: IEEE, 2011. 1–10

    Chapter  Google Scholar 

  60. Martini B, Choo K K R. An integrated conceptual digital forensic framework for cloud computing. Digital Invest, 2012, 9: 71–80

    Article  Google Scholar 

  61. Sang T. A Log Based Approach to Make Digital Forensics Easier on Cloud Computing. In: Proceedings of 2013 3rd International Conference on Intelligent System Design and Engineering Applications. Piscataway: IEEE, 2013. 91–94

    Chapter  Google Scholar 

  62. Birk D, Wegener C. Technical issues of forensic investigations in cloud computing environments. In: Proceedings of 2011 IEEE 6th International Workshop on Systematic Approaches to Digital Forensic Engineering. Piscataway: IEEE, 2011. 1–10

    Chapter  Google Scholar 

  63. Sibiya G, Venter H S, Ngobeni S, et al. Guidelines for procedures of a harmonised digital forensic process in network forensics. In: Proceedings of 2012 Information Security for South Africa Conference. Piscataway: IEEE, 2012: 1–7

    Chapter  Google Scholar 

  64. Sharma H, Sabharwal N. Investigating the implications of virtual forensics. In: Proceedings of 2012 International Conference on Advances in Engineering, Science and Management. Piscataway: IEEE, 2012. 617–620

    Google Scholar 

  65. Thorpe S, Ray I, Grandison T, et al. Cloud log forensics metadata analysis. In: Proceedings of 2012 IEEE 36th Annual Computer Software and Applications Conference Workshops. Piscataway: IEEE, 2012. 194–199

    Chapter  Google Scholar 

  66. Yang B W, Tsai W C, Chen A P, et al. Cloud computing architecture for social comuting — a comparison study of Facebook and Google. In: Proceedings of 2011 International Conference on Advances in Social Networks Analysis and Mining, Kaohsiung, 2011. 741–745

    Chapter  Google Scholar 

  67. Hou S, Uehara T, Yiu S M, et al. Privacy preserving confidential forensic investigation for shared or remote servers. In: Proceedings of 2011 7th International Conference on Intelligent Information Hiding and Multimedia Signal Processing. Piscataway: IEEE, 2011. 378–383

    Chapter  Google Scholar 

  68. de Paula A M G. Security aspects and future trends of social networks. In: Proceedings of the 4th International Conference on Forensic Computer Science, Natal, 2009. 66–74

    Google Scholar 

  69. Zainudin N M, Merabti M, Llewellyn-Jones D. A digital forensic investigation model for online social networking. In: Proceedings of the 11th Annual Conference on the Convergence of Telecommunications, Networking & Broadcasting, Liverpool, 2010. 21–22

    Google Scholar 

  70. Cheng J, Hoffman J, Lamarche T, et al. Forensics tools for social network security solutions. In: Proceedings of Student-Faculty Research Day. New York: Pace University, 2009. A4.1–A4.8

    Google Scholar 

  71. Garfinkel S L. Digital forensics research: the next 10 years. Digital Invest, 2010, 7: S64–S73

    Article  Google Scholar 

  72. Chu H C, Deng D J, Park J H. Live data mining concerning social networking forensics based on a Facebook session through aggregation of social data. IEEE J Sel Areas Commun, 2011, 29: 1368–1376

    Article  Google Scholar 

  73. Simon M, Slay J. Recovery of skype application activity data from physical memory. In: Proceedings of 2010 International Conference on Availability, Reliability, and Security. Piscataway: IEEE, 2010. 283–288

    Chapter  Google Scholar 

  74. Cusack B, Son J. Evidence examination tools for social networks. In: Proceedings of the 10th Australian Digital Forensics Conference, Perth, 2012. 33–40

    Google Scholar 

  75. Al Mutawa N, Al Awadhi I, Baggili I, et al. Forensic artifacts of Facebook’s instant messaging service. In: Proceedings of 2011 International Conference for Internet Technology and Secured Transactions. Piscataway: IEEE, 2011. 771–776

    Google Scholar 

  76. Castiglione A, Cattaneo G, de Santis A. A forensic analysis of images on online social networks. In: Proceedings of 2011 3rd International Conference on Intelligent Networking and Collaborative Systems. Piscataway: IEEE, 2011. 679–684

    Chapter  Google Scholar 

  77. Zainudin N M, Merabti M, Llewellyn-Jones D. Online social networks as supporting evidence: a digital forensic investigation model and its application design. In: Proceedings of 2011 International Conference on Research and Innovation in Information Systems. Piscataway: IEEE, 2011. 1–6

    Google Scholar 

  78. Burde M R, Khan M T. Tracebility in digital forensic investigation process. Int J Adv Res Comput Sci Softw Eng, 2012, 2: 45–47

    Article  Google Scholar 

  79. Haggerty J, Karran A J, Lamb D J, et al. A framework for the forensic investigation of unstructured email relationship data. Int J Digital Crime Forensics, 2011, 3: 1–18

    Article  Google Scholar 

  80. Roussev V, Chen Y, Bourg T, et al. Forensic filesystem hashing revisited. Digital Invest, 2006, 3: 82–90

    Article  Google Scholar 

  81. Roussev V. Hashing and data fingerprinting in digital forensics. IEEE Secur Privacy, 2009, 7: 49–55

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lu Liu.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Howden, C., Liu, L., Li, Z. et al. Virtual vignettes: the acquisition, analysis, and presentation of social network data. Sci. China Inf. Sci. 57, 1–20 (2014). https://doi.org/10.1007/s11432-014-5069-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11432-014-5069-9

Keywords

Navigation