skip to main content
10.1145/2076732.2076748acmotherconferencesArticle/Chapter ViewAbstractPublication PagesacsacConference Proceedingsconference-collections
research-article

Social snapshots: digital forensics for online social networks

Published:05 December 2011Publication History

ABSTRACT

Recently, academia and law enforcement alike have shown a strong demand for data that is collected from online social networks. In this work, we present a novel method for harvesting such data from social networking websites. Our approach uses a hybrid system that is based on a custom add-on for social networks in combination with a web crawling component. The datasets that our tool collects contain profile information (user data, private messages, photos, etc.) and associated meta-data (internal timestamps and unique identifiers). These social snapshots are significant for security research and in the field of digital forensics. We implemented a prototype for Facebook and evaluated our system on a number of human volunteers. We show the feasibility and efficiency of our approach and its advantages in contrast to traditional techniques that rely on application-specific web crawling and parsing. Furthermore, we investigate different use-cases of our tool that include consensual application and the use of sniffed authentication cookies. Finally, we contribute to the research community by publishing our implementation as an open-source project.

References

  1. L. Bilge, T. Strufe, D. Balzarotti, and E. Kirda. All your contacts are belong to us: automated identity theft attacks on social networks. In Proceedings of the 18th international conference on World wide web, pages 551--560. ACM, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. D. Birk and C. Wegener. Technical issues of forensic investigatinos in cloud computing environments. In Systematic Approaches to Digital Forensic Engineering, 2011. SADFE 2011. Sixth International Workshop on. IEEE. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. E. Butler. Firesheep. Online at http://codebutler.com/firesheep, oct 2010.Google ScholarGoogle Scholar
  4. M. Caloyannides, N. Memon, and W. Venema. Digital forensics. Security & Privacy, IEEE, 7(2):16--17, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. B. Carrier. File system forensic analysis. Addison-Wesley Professional, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. E. Chan, S. Venkataraman, F. David, A. Chaugule, and R. Campbell. Forenscope: A framework for live forensics. In Proceedings of the 26th Annual Computer Security Applications Conference, pages 307--316. ACM, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. CNN. Facebook status update provides alibi. Online at http://cnn.com/2009/CRIME/11/12/facebook.alibi/index.html, nov 2009.Google ScholarGoogle Scholar
  8. M. Cohen. PyFlag-An advanced network forensic framework. digital investigation, 5:S112--S120, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. EFF. Social Media and Law Enforcement: Who Gets What Data and When? Online at https://www.eff.org/deeplinks/2011/01/social-media-and-law-enforcement-who-gets-what.Google ScholarGoogle Scholar
  10. Facebook. Graph API. Online at https://developers.facebook.com/docs/reference/api/.Google ScholarGoogle Scholar
  11. Facebook. Statistics of Facebook. Online at http://www.facebook.com/press/info.php?statistics. Accessed April 20th, 2011.Google ScholarGoogle Scholar
  12. Facebook. The Facebook Blog: Giving You More Control. Online at https://blog.facebook.com/blog.php?post=434691727130, oct 2010.Google ScholarGoogle Scholar
  13. K. Fowler. SQL Server forensic analysis. Addison-Wesley Professional, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. FSF. Ocrad - The GNU OCR. Online at http://www.gnu.org/software/ocrad/.Google ScholarGoogle Scholar
  15. H. Gao, J. Hu, C. Wilson, Z. Li, Y. Chen, and B. Zhao. Detecting and characterizing social spam campaigns. In Proceedings of the 10th annual conference on Internet measurement, pages 35--47. ACM, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. B. Hay, K. Nance, and M. Bishop. Live analysis: Progress and challenges. Security & Privacy, IEEE, 7(2):30--37, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. M. Huber, M. Mulazzani, E. Weippl, G. Kitzler, and S. Goluch. Friend-in-the-middle attacks: Exploiting social networking sites for spam. Internet Computing, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. T. Jagatic, N. Johnson, M. Jakobsson, and F. Menczer. Social phishing. Communications of the ACM, 50(10):94--100, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. E. Kee and H. Farid. Digital image authentication from thumbnails. Proceedings of the SPIE, Electronic Imaging, Media Forensics and Security XII, 2010.Google ScholarGoogle Scholar
  20. R. Lu, X. Lin, X. Liang, and X. Shen. Secure provenance: the essential of bread and butter of data forensics in cloud computing. In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, pages 282--292. ACM, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Microsoft. PhotoDNA. Online at http://www.microsoftphotodna.com/.Google ScholarGoogle Scholar
  22. OpenQA. Selenium wep application testing system. Online at http://seleniumhq.org/.Google ScholarGoogle Scholar
  23. M. Perry. CookieMonster: Cookie Hijacking. Online at http://fscked.org/projects/cookiemonster, aug 2008.Google ScholarGoogle Scholar
  24. B. Ponurkiewicz. Faceniff. Online at http://faceniff.ponury.net/, jun 2011.Google ScholarGoogle Scholar
  25. N. A. Rahman. Scraping facebook email addresses. Online at http://www.kudanai.com/2008/10/scraping-facebook-email-addresses.html, aug 2008.Google ScholarGoogle Scholar
  26. M. Taylor, J. Haggerty, D. Gresty, and D. Lamb. Forensic investigation of cloud computing systems. Network Security, 2011(3):4--10, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. The New York Criminal Law Blog. Criminal found via Facebook. Online at http://newyorkcriminallawyersblog.com/2010/03/assault-criminal-who-was-found-via-facebook-is-back-in-ny.html, mar 2009.Google ScholarGoogle Scholar
  28. The Washington Post. Facebook: a place to meet, gossip, share photos of stolen goods. Online at http://www.washingtonpost.com/wp-dyn/content/article/2010/12/14/AR2010121407423_pf.html, dec 2010.Google ScholarGoogle Scholar
  29. G. Wondracek, T. Holz, E. Kirda, and C. Kruegel. A Practical Attack to De-Anonymize Social Network Users. In Proceedings of the IEEE Symposium on Security and Privacy, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Xplico. Xplico - Network Forensic Analysis Tool. Online at http://www.xplico.org/.Google ScholarGoogle Scholar

Index Terms

  1. Social snapshots: digital forensics for online social networks

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Other conferences
              ACSAC '11: Proceedings of the 27th Annual Computer Security Applications Conference
              December 2011
              432 pages
              ISBN:9781450306720
              DOI:10.1145/2076732

              Copyright © 2011 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 5 December 2011

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article

              Acceptance Rates

              Overall Acceptance Rate104of497submissions,21%

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader