SlideShare a Scribd company logo
1 of 26
MOBILE DEVICE FORENSICS USING NLP
Presented By:
Ankita Jadhao
Roll no. CSE15S2002
Supervised By:
Dr. A. J. Agrawal
Department of Computer Science & Engineering
Shri Ramdeobaba College of Engineering and Management
Nagpur
8/24/2015 1
Department of Computer Science and
Engineering
Contents
• Introduction
• Motivation
• Review of Literature
• Issues
• Methodology
• Existing System
• Advantages
• Bibliography
8/24/2015 Department of Computer Science and Engineering 2
Introduction
• Text mining also is known as Text Data Mining (TDM) and
Knowledge Discovery in Textual Database (KDT).
• Text Mining Tasks: 1. Exploratory Data Analysis
2. Information Extraction
3.Text Classification
Fig.1 Overview of Process
8/24/2015 Department of Computer Science and Engineering 3
Introduction
Where Text Mining Used
• Biomedical applications
- To the identification of biological such as protein and gene names as well as
chemical compounds and drugs.
• Software applications
- The mining and analysis processes, and by different firms to improve their results.
- Software for tracking and monitoring terrorist activities.
• Online media applications
- Provide readers with greater search experiences which in turn increases site
“stickiness” and revenue.
• Marketing applications
- In analytical customer relationship management.
8/24/2015 Department of Computer Science and Engineering 4
Introduction
• Sentiment analysis
-Analysis of movie reviews for estimating how favorable a review is for a movie
-Text has been used to detect emotions in the related area of affective computing.
• Security Application
-Monitoring and analysis of online plain text sources such as Internet news, blogs,
etc. for national security purposes.
- Criminal activity
8/24/2015 Department of Computer Science and Engineering 5
Introduction
8/24/2015 Department of Computer Science and Engineering 6
•Use of mobile phones to store and transmit personal and corporate
information
•Law enforcement, criminals and mobile phone devices
•There are limited corpora available
• A simple methodology is proposed for feature extraction
•What is corpora?
A text corpus is a large and structured set of texts.
Motivation
• Growth of mobile devices is rapid.
• The average cell phone user sends over 15,000 texts annually
• The average 18-24 year old sends almost 40,000 text messages
every year
• Most tools and methodologies merely acquire all supported data
and dump the output to a spreadsheet or HTML report
• Search hits must be manually examined and noted in a report.
• Problem 1.Simple keyword searches
2. Limited corpora
8/24/2015 7Department of Computer Science and Engineering
Literature Review
• Corpora: A corpus linguistics study of SMS text messaging[3]
-Tagg developed a text message corpus in British English, but an American English
corpus focusing on forensic application is desirable.
-Even for neutral text messages (non-drug-related), as the language is
significantly different which will skew results.
• Integrating Machine Learning into the Forensic Process
Approaches:-
1.The digital forensic process can be summarized as preservation, isolation,
correlation, and logging [4]
2. Begins with acquisition, then analysis, then concludes with presentation[5]
3. preservation, extraction, and then interpretation[1]
8/24/2015 Department of Computer Science and Engineering 8
Literature Review
• Natural Language Processing: Dela Rosa and Ellen
- Detect linguistic patterns is an invaluable tool when applied to text messaging
data
- NLTK machine learning algorithms can be applied to a training set and assessed
on a test set to create and train an experimental model
- Applying k nearest neighbor (kNN) and support vector machines (SVM)
machine-learning algorithms to micro-text classification
8/24/2015 Department of Computer Science and Engineering 9
Issues in Mobile Forensics
• Corpora is not available
• Accuracy Problem
• Feature Extraction
• Micro-Text Problem
8/24/2015 Department of Computer Science and Engineering 10
Overview
8/24/2015 Department of Computer Science and Engineering 11
•Mobile Device Forensic Extraction
•Text Message Corpus
•Feature Extraction
•Supervised Machine Learning
Mobile Device Forensic Extraction
• Text messages were extracted from mobile.
• Administrative access to the device was gained by utilizing the
redsn0w software to “jailbreak” the device.
• The text message database was accessed on the device by
navigating to the default location
• An MD5 hash value was computed for the text message
database file to mathematically verify that the file had not been
altered during the execution of the methodology
8/24/2015 Department of Computer Science and Engineering 12
Corpora
8/24/2015 Department of Computer Science and Engineering 13
1. First, collect the corpus data
2. Save the text in plain text format
3. Provide an identification of the text at the beginning of it.
4. Carry out any pre-processing of the text
5. The corpus was saved in extensible markup language XML
format.
Fig 3 Common Structures for Text Corpora
Corpora
8/24/2015 Department of Computer Science and Engineering 14
<?xml version="1.0" encoding="UTF-8"?>
<corpus_data>
<text_message>
<class>0</class>
<subscriber>1</subscriber>
<message_body>Text Message</message_body>
<timestamp>9/4/2012 2:40 PM</timestamp>
<type>Incoming</type>
</text_message>
• Class refers to whether or not each individual text message is drug-
related (1) or neutral (0).
• The data were modified and additional text messages were developed
Information Extraction System
8/24/2015 Department of Computer Science and Engineering 15
Fig 1 Simple Pipeline Architecture for an Information Extraction System
We first convert the unstructured data of natural language sentences into
the structured data.
Then getting meaning from text is called Information Extraction
Information Extraction System
Example:
String: We saw the yellow dog
8/24/2015 Department of Computer Science and Engineering 16
Fig 2 Segmentation and Labeling at both the Token and Chunk Levels
Feature Extraction
8/24/2015 Department of Computer Science and Engineering 17
Data Representation
– “Bag of words” most commonly used: either counts or binary
– Can also use “phrases” for commonly occurring combinations
of words
There are three aspects of feature extraction:
• Feature construction;
• Feature subset generation (or search strategy);
• Evaluation criterion estimation
Approach for Feature Extraction
8/24/2015 Department of Computer Science and Engineering 18
•Utilizing a count of known drug-related unigrams as a Feature
•NLTK was used to identify bigrams of interest
•The alternate approach
-Two-word pairs as features and to allow the algorithm to
determine which bigrams were most effective in classifying text
messages as drug-related or neutral.
Example:
1. “After school today let’s go smoke some weed at my house.”
2. “Hey pull that weed in my flower garden when you get
home.”
Approach for Feature Extraction
8/24/2015 Department of Computer Science and Engineering 19
•While the first text message was drug-related, the second
was neutral and would therefore be a false positive.
•The hypothesis was that drugrelated terms would exist in
frequented bigrams, such as “smoke weed,” “mary jane,” “hit
acid,” “pop pilz,” etc. and that these bigrams would increase
classification accuracy
Algorithm
8/24/2015 Department of Computer Science and Engineering 20
Supervised Machine Learning
8/24/2015 Department of Computer Science and Engineering 21
•Input- text message corpus.
•Bigrams were selected as features.
•System was trained utilizing NLTK’s implementation of the Naïve
Bayes classifier .
•It was hypothesized that a smaller training set might increase the
accuracy.
Application’s of Mobile Forensics
• Makes SMS analysis techniques highly applicable to Twitter
“tweet” analysis.
• It is useful for corporate investigation, criminal and civil
defense.
• Useful for law enforcement investigators to analyze Social
Media Profile for evidence of criminal activity
8/24/2015 Department of Computer Science and Engineering 22
Conclusion
8/24/2015 Department of Computer Science and Engineering 23
•Natural language processing and machine classification
have been applied to mobile device forensic analysis in a
unique way
•Text message classification and are free to develop a
better methodology using the text message corpus.
•Develop the more efficient corpora, it has been made
available to the research community
Future Work
8/24/2015 Department of Computer Science and Engineering 24
•We can overcome on the “micro-text” problem by using more
efficient feature extraction techniques
•Future research recommendations include determination of the
frequency of text messaging between criminal suspects
•Calculating the average time span between sent and received
messages in text message conversation threads.
References
8/24/2015 Department of Computer Science and Engineering 25
1. Daniel R. O’Day and Ricardo A. Calix“TEXT MESSAGE CORPUS: APPLYING NATURAL
LANGUAGE PROCESSING TO MOBILE DEVICE FORENSICS”, Purdue University
Calumet, 2200 169th Street, Hammond, IN, 46323, USA
2. D. Phuc and N.T.K. Phung, “Using Naïve Bayes model and natural language
processing for classifying messages on online forum,” 2007 IEEE International
Conference on Research, Innovation and Vision for the Future, pp. 247-252, March
2007
3. A.Smith. “Americans and Text Messaging”. 2011.[Online]. http://pewinternet.org
media/Files/Reports/2011/Americans %20and%20Text%20Messaging.pdf
4. B. Carrier, “File System Forensic Analysis”. Boston,MA: Addison-Wesley, 2005, p. 8.
5. C. Altheide and H. Carvey, “Digital Forensics With Open Source Tools”, Waltham,
MA: Syngress, 2011.
6. S. Bird, E. Klein, and E. Loper, Natural Language Processing with Python: Analyzing
Text with the Natural Language Toolkit. Sebastopol, CA: O’Reilly Media, 2009, pp.
221-255.
Thank you!
8/24/2015
Department of Computer Science and
Engineering
26

More Related Content

What's hot

A Comparison Study of Android Mobile Forensics for Retrieving Files System
A Comparison Study of Android Mobile Forensics for Retrieving Files SystemA Comparison Study of Android Mobile Forensics for Retrieving Files System
A Comparison Study of Android Mobile Forensics for Retrieving Files SystemCSCJournals
 
Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...
Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...
Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...IJECEIAES
 
Mobile forensics
Mobile forensicsMobile forensics
Mobile forensicsnoorashams
 
Best Cyber Crime Investigation Service Provider | Fornsec Solutions
Best Cyber Crime Investigation Service Provider | Fornsec SolutionsBest Cyber Crime Investigation Service Provider | Fornsec Solutions
Best Cyber Crime Investigation Service Provider | Fornsec SolutionsFORnSECSolutions
 
Evidence Gathering and Identification of LINE Messenger on Android Device
Evidence Gathering and Identification of LINE Messenger on Android DeviceEvidence Gathering and Identification of LINE Messenger on Android Device
Evidence Gathering and Identification of LINE Messenger on Android DeviceIJCSIS Research Publications
 
To get round to the heart of fortress
To get round to the heart of fortressTo get round to the heart of fortress
To get round to the heart of fortressSTO STRATEGY
 
Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedurenewbie2019
 
Mobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniMobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniDr Raghu Khimani
 
Digital forensics research: The next 10 years
Digital forensics research: The next 10 yearsDigital forensics research: The next 10 years
Digital forensics research: The next 10 yearsMehedi Hasan
 
Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...
Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...
Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...Facultad de Informática UCM
 
Fundamental digital forensik
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensiknewbie2019
 
The protect mobile user data in Russia
The protect mobile user data in Russia The protect mobile user data in Russia
The protect mobile user data in Russia IJECEIAES
 
Computer Forensic Softwares
Computer Forensic SoftwaresComputer Forensic Softwares
Computer Forensic SoftwaresDhruv Seth
 
Comparative Analysis of Digital Forensic Extraction Tools
Comparative Analysis of Digital Forensic Extraction ToolsComparative Analysis of Digital Forensic Extraction Tools
Comparative Analysis of Digital Forensic Extraction Toolsijtsrd
 
01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20world01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20worldAqib Memon
 

What's hot (20)

A Comparison Study of Android Mobile Forensics for Retrieving Files System
A Comparison Study of Android Mobile Forensics for Retrieving Files SystemA Comparison Study of Android Mobile Forensics for Retrieving Files System
A Comparison Study of Android Mobile Forensics for Retrieving Files System
 
Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...
Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...
Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...
 
Mobile forensics
Mobile forensicsMobile forensics
Mobile forensics
 
Mobile Forensics
Mobile Forensics Mobile Forensics
Mobile Forensics
 
Best Cyber Crime Investigation Service Provider | Fornsec Solutions
Best Cyber Crime Investigation Service Provider | Fornsec SolutionsBest Cyber Crime Investigation Service Provider | Fornsec Solutions
Best Cyber Crime Investigation Service Provider | Fornsec Solutions
 
Evidence Gathering and Identification of LINE Messenger on Android Device
Evidence Gathering and Identification of LINE Messenger on Android DeviceEvidence Gathering and Identification of LINE Messenger on Android Device
Evidence Gathering and Identification of LINE Messenger on Android Device
 
To get round to the heart of fortress
To get round to the heart of fortressTo get round to the heart of fortress
To get round to the heart of fortress
 
Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedure
 
Mobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniMobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu Khimani
 
Mobile forensic
Mobile forensicMobile forensic
Mobile forensic
 
Digital forensics research: The next 10 years
Digital forensics research: The next 10 yearsDigital forensics research: The next 10 years
Digital forensics research: The next 10 years
 
Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...
Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...
Privacidad: La Tensión entre las Capacidades Tecnológicas y las Expectativas ...
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Fundamental digital forensik
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensik
 
The protect mobile user data in Russia
The protect mobile user data in Russia The protect mobile user data in Russia
The protect mobile user data in Russia
 
Computer Forensic Softwares
Computer Forensic SoftwaresComputer Forensic Softwares
Computer Forensic Softwares
 
Comparative Analysis of Digital Forensic Extraction Tools
Comparative Analysis of Digital Forensic Extraction ToolsComparative Analysis of Digital Forensic Extraction Tools
Comparative Analysis of Digital Forensic Extraction Tools
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20world01 computer%20 forensics%20in%20todays%20world
01 computer%20 forensics%20in%20todays%20world
 

Viewers also liked

Visual-Semantic Embeddings: some thoughts on Language
Visual-Semantic Embeddings: some thoughts on LanguageVisual-Semantic Embeddings: some thoughts on Language
Visual-Semantic Embeddings: some thoughts on LanguageRoelof Pieters
 
Machine Learning for Threat Detection
Machine Learning for Threat DetectionMachine Learning for Threat Detection
Machine Learning for Threat DetectionNapier University
 
Word2Vec: Learning of word representations in a vector space - Di Mitri & Her...
Word2Vec: Learning of word representations in a vector space - Di Mitri & Her...Word2Vec: Learning of word representations in a vector space - Di Mitri & Her...
Word2Vec: Learning of word representations in a vector space - Di Mitri & Her...Daniele Di Mitri
 
Representation Learning of Vectors of Words and Phrases
Representation Learning of Vectors of Words and PhrasesRepresentation Learning of Vectors of Words and Phrases
Representation Learning of Vectors of Words and PhrasesFelipe Moraes
 
A Simple Introduction to Word Embeddings
A Simple Introduction to Word EmbeddingsA Simple Introduction to Word Embeddings
A Simple Introduction to Word EmbeddingsBhaskar Mitra
 
Artificial Intelligence and Machine Learning for Cybersecurity
Artificial Intelligence and Machine Learning for CybersecurityArtificial Intelligence and Machine Learning for Cybersecurity
Artificial Intelligence and Machine Learning for CybersecurityDr David Probert
 
Introduction to Text Mining
Introduction to Text MiningIntroduction to Text Mining
Introduction to Text MiningMinha Hwang
 
Convolutional Neural Networks (CNN)
Convolutional Neural Networks (CNN)Convolutional Neural Networks (CNN)
Convolutional Neural Networks (CNN)Gaurav Mittal
 
Introduction to Machine Learning
Introduction to Machine LearningIntroduction to Machine Learning
Introduction to Machine LearningLior Rokach
 

Viewers also liked (9)

Visual-Semantic Embeddings: some thoughts on Language
Visual-Semantic Embeddings: some thoughts on LanguageVisual-Semantic Embeddings: some thoughts on Language
Visual-Semantic Embeddings: some thoughts on Language
 
Machine Learning for Threat Detection
Machine Learning for Threat DetectionMachine Learning for Threat Detection
Machine Learning for Threat Detection
 
Word2Vec: Learning of word representations in a vector space - Di Mitri & Her...
Word2Vec: Learning of word representations in a vector space - Di Mitri & Her...Word2Vec: Learning of word representations in a vector space - Di Mitri & Her...
Word2Vec: Learning of word representations in a vector space - Di Mitri & Her...
 
Representation Learning of Vectors of Words and Phrases
Representation Learning of Vectors of Words and PhrasesRepresentation Learning of Vectors of Words and Phrases
Representation Learning of Vectors of Words and Phrases
 
A Simple Introduction to Word Embeddings
A Simple Introduction to Word EmbeddingsA Simple Introduction to Word Embeddings
A Simple Introduction to Word Embeddings
 
Artificial Intelligence and Machine Learning for Cybersecurity
Artificial Intelligence and Machine Learning for CybersecurityArtificial Intelligence and Machine Learning for Cybersecurity
Artificial Intelligence and Machine Learning for Cybersecurity
 
Introduction to Text Mining
Introduction to Text MiningIntroduction to Text Mining
Introduction to Text Mining
 
Convolutional Neural Networks (CNN)
Convolutional Neural Networks (CNN)Convolutional Neural Networks (CNN)
Convolutional Neural Networks (CNN)
 
Introduction to Machine Learning
Introduction to Machine LearningIntroduction to Machine Learning
Introduction to Machine Learning
 

Similar to MOBILE DEVICE FORENSICS USING NLP

fakenews_DBDA_Mar23.pptx
fakenews_DBDA_Mar23.pptxfakenews_DBDA_Mar23.pptx
fakenews_DBDA_Mar23.pptxdeepmitra8
 
Databases, Web Services and Tools For Systems Immunology
Databases, Web Services and Tools For Systems ImmunologyDatabases, Web Services and Tools For Systems Immunology
Databases, Web Services and Tools For Systems ImmunologyYannick Pouliot
 
Mik Black bioinformatics symposium
Mik Black bioinformatics symposiumMik Black bioinformatics symposium
Mik Black bioinformatics symposiumguest5e6f31
 
OpenAIRE and Eudat services and tools to support FAIR DMP implementation
OpenAIRE and Eudat services and tools to support FAIR DMP implementation OpenAIRE and Eudat services and tools to support FAIR DMP implementation
OpenAIRE and Eudat services and tools to support FAIR DMP implementation Research Data Alliance
 
OpenAIRE and Eudat services and tools to support FAIR DMP implementation
OpenAIRE and Eudat services and tools to support FAIR DMP implementation OpenAIRE and Eudat services and tools to support FAIR DMP implementation
OpenAIRE and Eudat services and tools to support FAIR DMP implementation Research Data Alliance
 
Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)AltheimPrivacy
 
On chemical structures, substances, nanomaterials and measurements
On chemical structures, substances, nanomaterials and measurementsOn chemical structures, substances, nanomaterials and measurements
On chemical structures, substances, nanomaterials and measurementsNina Jeliazkova
 
20140410 ifla digitization workshop [idlc kuala lumpur]
20140410 ifla digitization workshop [idlc kuala lumpur]20140410 ifla digitization workshop [idlc kuala lumpur]
20140410 ifla digitization workshop [idlc kuala lumpur]Frederick Zarndt
 
II-SDV 2015, 20 - 21 April, in Nice
II-SDV 2015, 20 - 21 April, in NiceII-SDV 2015, 20 - 21 April, in Nice
II-SDV 2015, 20 - 21 April, in NiceDr. Haxel Consult
 
Turning data into knowledge the impacts of bioinformatics
Turning data into knowledge  the impacts of bioinformaticsTurning data into knowledge  the impacts of bioinformatics
Turning data into knowledge the impacts of bioinformaticsICRISAT
 
Review on Computer Forensic
Review on Computer ForensicReview on Computer Forensic
Review on Computer ForensicEditor IJCTER
 
Omics Logic - Bioinformatics 2.0
Omics Logic - Bioinformatics 2.0Omics Logic - Bioinformatics 2.0
Omics Logic - Bioinformatics 2.0Elia Brodsky
 
Automatic summarization of medical literature
Automatic summarization of medical literatureAutomatic summarization of medical literature
Automatic summarization of medical literatureharinithiyagarajan4
 
Research in Intelligent Systems and Data Science at the Knowledge Media Insti...
Research in Intelligent Systems and Data Science at the Knowledge Media Insti...Research in Intelligent Systems and Data Science at the Knowledge Media Insti...
Research in Intelligent Systems and Data Science at the Knowledge Media Insti...Enrico Motta
 
An Improved Mining Of Biomedical Data From Web Documents Using Clustering
An Improved Mining Of Biomedical Data From Web Documents Using ClusteringAn Improved Mining Of Biomedical Data From Web Documents Using Clustering
An Improved Mining Of Biomedical Data From Web Documents Using ClusteringKelly Lipiec
 

Similar to MOBILE DEVICE FORENSICS USING NLP (20)

fakenews_DBDA_Mar23.pptx
fakenews_DBDA_Mar23.pptxfakenews_DBDA_Mar23.pptx
fakenews_DBDA_Mar23.pptx
 
Computer application
Computer application   Computer application
Computer application
 
Databases, Web Services and Tools For Systems Immunology
Databases, Web Services and Tools For Systems ImmunologyDatabases, Web Services and Tools For Systems Immunology
Databases, Web Services and Tools For Systems Immunology
 
Text Mining
Text MiningText Mining
Text Mining
 
Mik Black bioinformatics symposium
Mik Black bioinformatics symposiumMik Black bioinformatics symposium
Mik Black bioinformatics symposium
 
Mik Black bioinformatics symposium
Mik Black bioinformatics symposiumMik Black bioinformatics symposium
Mik Black bioinformatics symposium
 
Integrating Semantic Systems
Integrating Semantic SystemsIntegrating Semantic Systems
Integrating Semantic Systems
 
OpenAIRE and Eudat services and tools to support FAIR DMP implementation
OpenAIRE and Eudat services and tools to support FAIR DMP implementation OpenAIRE and Eudat services and tools to support FAIR DMP implementation
OpenAIRE and Eudat services and tools to support FAIR DMP implementation
 
OpenAIRE and Eudat services and tools to support FAIR DMP implementation
OpenAIRE and Eudat services and tools to support FAIR DMP implementation OpenAIRE and Eudat services and tools to support FAIR DMP implementation
OpenAIRE and Eudat services and tools to support FAIR DMP implementation
 
Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)
 
On chemical structures, substances, nanomaterials and measurements
On chemical structures, substances, nanomaterials and measurementsOn chemical structures, substances, nanomaterials and measurements
On chemical structures, substances, nanomaterials and measurements
 
20140410 ifla digitization workshop [idlc kuala lumpur]
20140410 ifla digitization workshop [idlc kuala lumpur]20140410 ifla digitization workshop [idlc kuala lumpur]
20140410 ifla digitization workshop [idlc kuala lumpur]
 
II-SDV 2015, 20 - 21 April, in Nice
II-SDV 2015, 20 - 21 April, in NiceII-SDV 2015, 20 - 21 April, in Nice
II-SDV 2015, 20 - 21 April, in Nice
 
Turning data into knowledge the impacts of bioinformatics
Turning data into knowledge  the impacts of bioinformaticsTurning data into knowledge  the impacts of bioinformatics
Turning data into knowledge the impacts of bioinformatics
 
Review on Computer Forensic
Review on Computer ForensicReview on Computer Forensic
Review on Computer Forensic
 
Omics Logic - Bioinformatics 2.0
Omics Logic - Bioinformatics 2.0Omics Logic - Bioinformatics 2.0
Omics Logic - Bioinformatics 2.0
 
Automatic summarization of medical literature
Automatic summarization of medical literatureAutomatic summarization of medical literature
Automatic summarization of medical literature
 
Research in Intelligent Systems and Data Science at the Knowledge Media Insti...
Research in Intelligent Systems and Data Science at the Knowledge Media Insti...Research in Intelligent Systems and Data Science at the Knowledge Media Insti...
Research in Intelligent Systems and Data Science at the Knowledge Media Insti...
 
Introduction to Cheminformatics: Accessing data through the CompTox Chemicals...
Introduction to Cheminformatics: Accessing data through the CompTox Chemicals...Introduction to Cheminformatics: Accessing data through the CompTox Chemicals...
Introduction to Cheminformatics: Accessing data through the CompTox Chemicals...
 
An Improved Mining Of Biomedical Data From Web Documents Using Clustering
An Improved Mining Of Biomedical Data From Web Documents Using ClusteringAn Improved Mining Of Biomedical Data From Web Documents Using Clustering
An Improved Mining Of Biomedical Data From Web Documents Using Clustering
 

Recently uploaded

Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGSIVASHANKAR N
 

Recently uploaded (20)

Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 

MOBILE DEVICE FORENSICS USING NLP

  • 1. MOBILE DEVICE FORENSICS USING NLP Presented By: Ankita Jadhao Roll no. CSE15S2002 Supervised By: Dr. A. J. Agrawal Department of Computer Science & Engineering Shri Ramdeobaba College of Engineering and Management Nagpur 8/24/2015 1 Department of Computer Science and Engineering
  • 2. Contents • Introduction • Motivation • Review of Literature • Issues • Methodology • Existing System • Advantages • Bibliography 8/24/2015 Department of Computer Science and Engineering 2
  • 3. Introduction • Text mining also is known as Text Data Mining (TDM) and Knowledge Discovery in Textual Database (KDT). • Text Mining Tasks: 1. Exploratory Data Analysis 2. Information Extraction 3.Text Classification Fig.1 Overview of Process 8/24/2015 Department of Computer Science and Engineering 3
  • 4. Introduction Where Text Mining Used • Biomedical applications - To the identification of biological such as protein and gene names as well as chemical compounds and drugs. • Software applications - The mining and analysis processes, and by different firms to improve their results. - Software for tracking and monitoring terrorist activities. • Online media applications - Provide readers with greater search experiences which in turn increases site “stickiness” and revenue. • Marketing applications - In analytical customer relationship management. 8/24/2015 Department of Computer Science and Engineering 4
  • 5. Introduction • Sentiment analysis -Analysis of movie reviews for estimating how favorable a review is for a movie -Text has been used to detect emotions in the related area of affective computing. • Security Application -Monitoring and analysis of online plain text sources such as Internet news, blogs, etc. for national security purposes. - Criminal activity 8/24/2015 Department of Computer Science and Engineering 5
  • 6. Introduction 8/24/2015 Department of Computer Science and Engineering 6 •Use of mobile phones to store and transmit personal and corporate information •Law enforcement, criminals and mobile phone devices •There are limited corpora available • A simple methodology is proposed for feature extraction •What is corpora? A text corpus is a large and structured set of texts.
  • 7. Motivation • Growth of mobile devices is rapid. • The average cell phone user sends over 15,000 texts annually • The average 18-24 year old sends almost 40,000 text messages every year • Most tools and methodologies merely acquire all supported data and dump the output to a spreadsheet or HTML report • Search hits must be manually examined and noted in a report. • Problem 1.Simple keyword searches 2. Limited corpora 8/24/2015 7Department of Computer Science and Engineering
  • 8. Literature Review • Corpora: A corpus linguistics study of SMS text messaging[3] -Tagg developed a text message corpus in British English, but an American English corpus focusing on forensic application is desirable. -Even for neutral text messages (non-drug-related), as the language is significantly different which will skew results. • Integrating Machine Learning into the Forensic Process Approaches:- 1.The digital forensic process can be summarized as preservation, isolation, correlation, and logging [4] 2. Begins with acquisition, then analysis, then concludes with presentation[5] 3. preservation, extraction, and then interpretation[1] 8/24/2015 Department of Computer Science and Engineering 8
  • 9. Literature Review • Natural Language Processing: Dela Rosa and Ellen - Detect linguistic patterns is an invaluable tool when applied to text messaging data - NLTK machine learning algorithms can be applied to a training set and assessed on a test set to create and train an experimental model - Applying k nearest neighbor (kNN) and support vector machines (SVM) machine-learning algorithms to micro-text classification 8/24/2015 Department of Computer Science and Engineering 9
  • 10. Issues in Mobile Forensics • Corpora is not available • Accuracy Problem • Feature Extraction • Micro-Text Problem 8/24/2015 Department of Computer Science and Engineering 10
  • 11. Overview 8/24/2015 Department of Computer Science and Engineering 11 •Mobile Device Forensic Extraction •Text Message Corpus •Feature Extraction •Supervised Machine Learning
  • 12. Mobile Device Forensic Extraction • Text messages were extracted from mobile. • Administrative access to the device was gained by utilizing the redsn0w software to “jailbreak” the device. • The text message database was accessed on the device by navigating to the default location • An MD5 hash value was computed for the text message database file to mathematically verify that the file had not been altered during the execution of the methodology 8/24/2015 Department of Computer Science and Engineering 12
  • 13. Corpora 8/24/2015 Department of Computer Science and Engineering 13 1. First, collect the corpus data 2. Save the text in plain text format 3. Provide an identification of the text at the beginning of it. 4. Carry out any pre-processing of the text 5. The corpus was saved in extensible markup language XML format. Fig 3 Common Structures for Text Corpora
  • 14. Corpora 8/24/2015 Department of Computer Science and Engineering 14 <?xml version="1.0" encoding="UTF-8"?> <corpus_data> <text_message> <class>0</class> <subscriber>1</subscriber> <message_body>Text Message</message_body> <timestamp>9/4/2012 2:40 PM</timestamp> <type>Incoming</type> </text_message> • Class refers to whether or not each individual text message is drug- related (1) or neutral (0). • The data were modified and additional text messages were developed
  • 15. Information Extraction System 8/24/2015 Department of Computer Science and Engineering 15 Fig 1 Simple Pipeline Architecture for an Information Extraction System We first convert the unstructured data of natural language sentences into the structured data. Then getting meaning from text is called Information Extraction
  • 16. Information Extraction System Example: String: We saw the yellow dog 8/24/2015 Department of Computer Science and Engineering 16 Fig 2 Segmentation and Labeling at both the Token and Chunk Levels
  • 17. Feature Extraction 8/24/2015 Department of Computer Science and Engineering 17 Data Representation – “Bag of words” most commonly used: either counts or binary – Can also use “phrases” for commonly occurring combinations of words There are three aspects of feature extraction: • Feature construction; • Feature subset generation (or search strategy); • Evaluation criterion estimation
  • 18. Approach for Feature Extraction 8/24/2015 Department of Computer Science and Engineering 18 •Utilizing a count of known drug-related unigrams as a Feature •NLTK was used to identify bigrams of interest •The alternate approach -Two-word pairs as features and to allow the algorithm to determine which bigrams were most effective in classifying text messages as drug-related or neutral. Example: 1. “After school today let’s go smoke some weed at my house.” 2. “Hey pull that weed in my flower garden when you get home.”
  • 19. Approach for Feature Extraction 8/24/2015 Department of Computer Science and Engineering 19 •While the first text message was drug-related, the second was neutral and would therefore be a false positive. •The hypothesis was that drugrelated terms would exist in frequented bigrams, such as “smoke weed,” “mary jane,” “hit acid,” “pop pilz,” etc. and that these bigrams would increase classification accuracy
  • 20. Algorithm 8/24/2015 Department of Computer Science and Engineering 20
  • 21. Supervised Machine Learning 8/24/2015 Department of Computer Science and Engineering 21 •Input- text message corpus. •Bigrams were selected as features. •System was trained utilizing NLTK’s implementation of the Naïve Bayes classifier . •It was hypothesized that a smaller training set might increase the accuracy.
  • 22. Application’s of Mobile Forensics • Makes SMS analysis techniques highly applicable to Twitter “tweet” analysis. • It is useful for corporate investigation, criminal and civil defense. • Useful for law enforcement investigators to analyze Social Media Profile for evidence of criminal activity 8/24/2015 Department of Computer Science and Engineering 22
  • 23. Conclusion 8/24/2015 Department of Computer Science and Engineering 23 •Natural language processing and machine classification have been applied to mobile device forensic analysis in a unique way •Text message classification and are free to develop a better methodology using the text message corpus. •Develop the more efficient corpora, it has been made available to the research community
  • 24. Future Work 8/24/2015 Department of Computer Science and Engineering 24 •We can overcome on the “micro-text” problem by using more efficient feature extraction techniques •Future research recommendations include determination of the frequency of text messaging between criminal suspects •Calculating the average time span between sent and received messages in text message conversation threads.
  • 25. References 8/24/2015 Department of Computer Science and Engineering 25 1. Daniel R. O’Day and Ricardo A. Calix“TEXT MESSAGE CORPUS: APPLYING NATURAL LANGUAGE PROCESSING TO MOBILE DEVICE FORENSICS”, Purdue University Calumet, 2200 169th Street, Hammond, IN, 46323, USA 2. D. Phuc and N.T.K. Phung, “Using Naïve Bayes model and natural language processing for classifying messages on online forum,” 2007 IEEE International Conference on Research, Innovation and Vision for the Future, pp. 247-252, March 2007 3. A.Smith. “Americans and Text Messaging”. 2011.[Online]. http://pewinternet.org media/Files/Reports/2011/Americans %20and%20Text%20Messaging.pdf 4. B. Carrier, “File System Forensic Analysis”. Boston,MA: Addison-Wesley, 2005, p. 8. 5. C. Altheide and H. Carvey, “Digital Forensics With Open Source Tools”, Waltham, MA: Syngress, 2011. 6. S. Bird, E. Klein, and E. Loper, Natural Language Processing with Python: Analyzing Text with the Natural Language Toolkit. Sebastopol, CA: O’Reilly Media, 2009, pp. 221-255.
  • 26. Thank you! 8/24/2015 Department of Computer Science and Engineering 26