Featured Research

from universities, journals, and other organizations

Identifying 'anonymous' email authors

Date:
March 8, 2011
Source:
Concordia University
Summary:
Researchers have developed an effective new technique to determine the authorship of anonymous emails. Tests showed their method has a high level of accuracy -- and unlike many other methods of ascertaining authorship, it can provide presentable evidence in courts of law.

Benjamin Fung, a professor of Information Systems Engineering at Concordia University, has developed an effective new technique to determine the authorship of anonymous emails.
Credit: Concordia University

A team of researchers from Concordia University has developed an effective new technique to determine the authorship of anonymous emails. Tests showed their method has a high level of accuracy -- and unlike many other methods of ascertaining authorship, it can provide presentable evidence in courts of law. Findings on the new technique are published in the journal Digital Investigation.

Related Articles


"In the past few years, we've seen an alarming increase in the number of cybercrimes involving anonymous emails," says study co-author Benjamin Fung, a professor of Information Systems Engineering at Concordia University and an expert in data mining -- extracting useful, previously unknown knowledge from a large volume of raw data. "These emails can transmit threats or child pornography, facilitate communications between criminals or carry viruses."

While police can often use the IP address to locate the house or apartment where an email originated, they may find many people at that address. They need a reliable, effective way to determine which of several suspects has written the emails under investigation.

Fung and his colleagues developed a novel method of authorship attribution to meet this need, based on techniques used in speech recognition and data mining. Their approach relies on the identification of frequent patterns -- unique combinations of features that recur in a suspect's emails.

To determine whether a suspect has authored the target email, they first identify the patterns found in emails written by the subject. Then, they filter out any of these patterns which are also found in the emails of other suspects.

The remaining frequent patterns are unique to the author of the emails being analyzed. They constitute the suspect's 'write-print,' a distinctive identifier like a fingerprint. "Let's say the anonymous email contains typos or grammatical mistakes, or is written entirely in lowercase letters," says Fung. "We use those special characteristics to create a write-print. Using this method, we can even determine with a high degree of accuracy who wrote a given email, and infer the gender, nationality and education level of the author."

To test the accuracy of their technique, Fung and his colleagues examined the Enron Email Dataset, a collection which contains over 200,000 real-life emails from 158 employees of the Enron Corporation. Using a sample of 10 emails written by each of 10 subjects -- 100 emails in all -- they were able to identify authorship with an accuracy of 80 percent to 90 percent.

"Our technique was designed to provide credible evidence that can be presented in a court of law," says Fung. "For evidence to be admissible, investigators need to explain how they have reached their conclusions. Our method allows them to do this."

The new authorship identification technique was developed in collaboration with Mourad Debbabi, a Concordia expert in cyber forensics, and PhD student Farkhund Iqbal. "Our different backgrounds allowed us to apply data mining techniques to real-life problems in cyber forensics," says Fung. "This is an excellent illustration of how effective interdisciplinary research can be."

This work was supported by the Natural Sciences and Engineering Research Council of Canada.


Story Source:

The above story is based on materials provided by Concordia University. Note: Materials may be edited for content and length.


Journal Reference:

  1. Farkhund Iqbal, Hamad Binsalleeh, Benjamin C.M. Fung, Mourad Debbabi. Mining writeprints from anonymous e-mails for forensic investigation. Digital Investigation, 2010; 7 (1-2): 56 DOI: 10.1016/j.diin.2010.03.003

Cite This Page:

Concordia University. "Identifying 'anonymous' email authors." ScienceDaily. ScienceDaily, 8 March 2011. <www.sciencedaily.com/releases/2011/03/110308124758.htm>.
Concordia University. (2011, March 8). Identifying 'anonymous' email authors. ScienceDaily. Retrieved November 25, 2014 from www.sciencedaily.com/releases/2011/03/110308124758.htm
Concordia University. "Identifying 'anonymous' email authors." ScienceDaily. www.sciencedaily.com/releases/2011/03/110308124758.htm (accessed November 25, 2014).

Share This


More From ScienceDaily



More Computers & Math News

Tuesday, November 25, 2014

Featured Research

from universities, journals, and other organizations


Featured Videos

from AP, Reuters, AFP, and other news services

FCC Forces T-Mobile To Alert Customers Of Data Throttling

FCC Forces T-Mobile To Alert Customers Of Data Throttling

Newsy (Nov. 25, 2014) T-Mobile and the FCC have reached an agreement requiring the company to alert customers when it throttles their data speeds. Video provided by Newsy
Powered by NewsLook.com
Symantec Uncovers Sophisticated Spying Malware Regin

Symantec Uncovers Sophisticated Spying Malware Regin

Newsy (Nov. 24, 2014) A Symantec white paper reveals details about Regin, a spying malware of unusual complexity which is believed to be state-sponsored. Video provided by Newsy
Powered by NewsLook.com
How to Keep Your Android Device Safe This Holiday Season

How to Keep Your Android Device Safe This Holiday Season

Howdini (Nov. 24, 2014) Protect yourself against malware and hackers, especially during the hectic online shopping season. Mobile device security makes a great holiday gift and protects your loved ones from cyber attacks and identity theft. Video provided by Howdini
Powered by NewsLook.com
How to Keep You and Your Family's Identitiy Safe Online This Holiday Season

How to Keep You and Your Family's Identitiy Safe Online This Holiday Season

Howdini (Nov. 24, 2014) The hectic holiday season is a prime time for online identity theft, so make sure you’re protected.Be cautious when shopping online Internet security software makes a great holiday gift and protects your loved ones from cyber attacks and identity theft. Video provided by Howdini
Powered by NewsLook.com

Search ScienceDaily

Number of stories in archives: 140,361

Find with keyword(s):
Enter a keyword or phrase to search ScienceDaily for related topics and research stories.

Save/Print:
Share:

Breaking News:

Strange & Offbeat Stories


Space & Time

Matter & Energy

Computers & Math

In Other News

... from NewsDaily.com

Science News

Health News

Environment News

Technology News



Save/Print:
Share:

Free Subscriptions


Get the latest science news with ScienceDaily's free email newsletters, updated daily and weekly. Or view hourly updated newsfeeds in your RSS reader:

Get Social & Mobile


Keep up to date with the latest news from ScienceDaily via social networks and mobile apps:

Have Feedback?


Tell us what you think of ScienceDaily -- we welcome both positive and negative comments. Have any problems using the site? Questions?
Mobile: iPhone Android Web
Follow: Facebook Twitter Google+
Subscribe: RSS Feeds Email Newsletters
Latest Headlines Health & Medicine Mind & Brain Space & Time Matter & Energy Computers & Math Plants & Animals Earth & Climate Fossils & Ruins