Social Network Forensic By Xing Liu CSC153 Spring 2009.

Slides:



Advertisements
Similar presentations
Testing Web Applications. Applications Architecture Client Server Architecture.
Advertisements

Our Digital World Second Edition
Social Media.
Effective Discovery Techniques In Computer Crime Cases.
Web 2.0: Concepts and Applications 5 Connecting People.
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems The Internet, the Web, and Electronic Commerce Chapter 2.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
COS/PSA 413 Day 17. Agenda Lab 8 write-up grades –3 B’s, 1 C and 1 F –Answer the Questions!!! Capstone progress report 2 overdue Today we will be discussing.
Lecture The Client/Server Database Environment
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems The Internet, the Web, and Electronic Commerce Chapter 2.
Proxy servers By Akshit Y10. What is a proxy server O A proxy server is a computer that offers a computer network service to allow clients to make indirect.
Hands-on: Capturing an Image with AccessData FTK Imager
Guide to Computer Forensics and Investigations Fourth Edition Chapter 12 Investigations.
1 Introduction to Web Development. Web Basics The Web consists of computers on the Internet connected to each other in a specific way Used in all levels.
Internet Standard Grade Computing. Internet a wide area network spanning the globe. consists of many smaller networks linked together. Service a way of.
Land Trusts & Web Technology Damon Hearne Connecticut Forest & Park Association.
1 Network Statistic and Monitoring System Wayne State University Division of Computing and Information Technology Information Technology.
CHAPTER 2 Communications, Networks, the Internet, and the World Wide Web.
Social Networking Positives of Social Networking
Item Web 2.0 application relevant to teacher’s work.
Guide to Computer Forensics and Investigations, Second Edition Chapter 13 Investigations.
Use of IT Resources for Evidence Gathering & Analysis Use of IT Resources for Evidence Gathering & Analysis Raymond SO Wing-keung Assistant Director Independent.
16-1 The World Wide Web The Web An infrastructure of distributed information combined with software that uses networks as a vehicle to exchange that information.
Web Mastering Module Internet Fundamentals. What is the Internet? –Global network of networks –Communicating using same set of rules (protocols/languages)
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Copyright © Allyn & Bacon 2008 POWER PRACTICE Chapter 8 Using the Web for Teaching and Learning START This multimedia product and its contents are protected.
Internet Basics A management-level overview of the Internet, its architecture, capabilities, and protocols. Copyright 2011 SPMI / Online Development.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Twelfth Edition.
Dr Richard Overill Department of Informatics King’s College London Cyber Sleuthing or the Art of the Digital Detective.
Keyloggers At Work Jason Clark. History Believed to have been first used by the government Believed that they were used in the early 1990’s Software key.
2009© Ineffable Solutions, LLC., All rights reserved. 1 Mockup Revision #2.
How did the internet develop?. What is Internet? The internet is a network of computers linking many different types of computers all over the world.
Web Page Design I Basic Computer Terms “How the Internet & the World Wide Web (www) Works”
 Facebook  Twitter  MySpace  Windows LiveSpace.
A Proxy-based Real-time Protection Mechanism for Social Networking Sites Presented by Omar Alzahrani A Proxy-based Real-Time Protection Omar Alzahrani.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. WEB.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
Here you are at your computer, but you don’t have internet connections. Your ISP becomes your link to the internet. In order to get access you need to.
Objective Understand concepts used to web-based digital media. Course Weight : 5%
The Internet The internet is simply a worldwide computer network that uses standardised communication protocols to transmit and exchange data.
DIGITAL WORLDWIDE Ashish. s  107 trillion – The number of s sent on the Internet in  294 billion – Average number of messages.
Internet Safety 101.  Potential Dangers  Social Networks  Online Gaming  Sexting  Pornography  Texting & Driving.
Communication Systems The Internet The largest wide area network in the world. It is made up of thousands of linked networks. What.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
The Birth & Growth of Web 2.0 COM 415-Fall II Ashley Velasco (Prince)
Technology Social Media Unit 1. What is Social Media? Social media is the interaction among people in which they create, share or exchange information.
Social Networking in Education YouTube Flickr Blogs Facebook Twitter TeacherTube.
© Young Scot 2008 Creating Your Own Social Network
Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid.
FriendFinder Location-aware social networking on mobile phones.
Social Networking By: Ning Year 10 HC. Different types of networks  There’s so many ways people can be connected together. In person, s and social.
The Internet Technological Background. Topic Objectives At the end of this topic, you should be able to do the following: Able to define the Internet.
Victor PTSA Fall Forum Don’t Lose Touch With Your Teen Tuesday, October 22, 2013 – 7PM Social media is now an integral part of our every day lives. For.
 Project Team: Suzana Vaserman David Fleish Moran Zafir Tzvika Stein  Academic adviser: Dr. Mayer Goldberg  Technical adviser: Mr. Guy Wiener.
 Computer hardware refers to the physical parts of a computer and related devices. Internal hardware devices include motherboards, hard drives,
HOW THE INTERNET WORKS. Introduction : The internet has brought revolutionary changes Has become a medium for interaction and information Can access to.
18-1 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein.
Investigations 2016 First semester [ 12 week ]-Forensic Analysis of the Windows 7 Registry.
Debra Mann Reference Librarian Innisfil Public Library
Facebook privacy policy
Automated ad placement
Backdoor Attacks.
WWW Basics.
Web Development & Design Chapter 1, Sections 4, 5 & 6
Unit# 5: Internet and Worldwide Web
Part of Chapter 1 Key Concepts Networks
Facebook’s New Photo Uploader
COMPUTER NETWORKS AND THE INTERNET Chapter 6
The Internet and Electronic mail
Presentation transcript:

Social Network Forensic By Xing Liu CSC153 Spring 2009

Background of Social Network Bring people with special interests together. Classmates.com(1995) sixDegrees.com(1997) on indirect ties. Myspace(2003) Facebook(2003) Flickr(2004) - Photos Ning(2005) - Own Social Network twitter(2006)-text-based posts

Background of Social Network con't Huge amount of people related in social network. 75% of software developers belong to at least one social network. Social networking among US broadband users has grown 93% since Twitter - From Feb '08 to Feb '09, it clocked in at a whopping 1,382% growth rate. Source: al_networking_statistics/

Technical Details of Social Networks Mostly web-based systems. Web servers and databases in the backend. Have its own API services and application languages. Facebook – FBML(Facebook Markup Language). MySpace Developer Platform – based on the OpenSocial model from Google Code.

Issues with Social Networking Privacy – easy accesses to personal information such as birthday or personal images. Potential misuse – fake identities. Child safety – online sexual predators.

Social Networking Cases October 2005, pictures from Facebook were used to cite violators at North Carolina State University for under age drinking. In November 2005, student used the message board of a Facebook group to share class information without authorization of professor at Kansas State University. February 2007, following the fatal hit-and-run death of freshman in University of Connecticut, police was able to link to the suspect driver by identifying suspect's girlfriend with the help of Facebook. Sources:

Forensic Methods for Social Networking Cases Client Side – seize victims' or suspects' computers. Server Side – contact social network service providers to grab information from their servers. Real Time – intercept the message sent in real time.

Forensic Methods – Client Side Use forensic tools such as FTK to look for any deleted browser history or messages in the hard drive. Check the registry for device connection information. If a case is involved in photo evidence, we can do a FTK keyword search for related photo information. Steganography Tools for hidden message within photos.

Forensic Methods – Server Side Contact service providers to give out server information. Log files in the web servers, such as Access Log in Apache web server – get IP address of clients. FTP log for uploaded images' information. Live system imaging using dd & Netcat. (Discussed in Chapter 6)

Forensic Methods – Real Time Contact ISP provider to monitor information sent between the client and server machines. Monitor suspect's router for live traffic data stream. Install Keylogger in the suspect's machine.

Social Networking Forensic – obstacles The the impact of social network is getting bigger and bigger. From acquiring evidence standpoint, it's getting harder to acquire because of more servers involved. Computer forensic experts need to be more familiar to different web and database server settings. Learn different web services application languages such as FBML and OpenSocial.

Social Networking Forensic – advantages Information in social network can be easily searched by investigators. Photos posted in the social network profiles may be used as evidence. Because of the social network links of degrees, investigators can learn important information by identifying related personnels in the network.

Questions?

The End Thank You