Skip to main content

Capabilities of Email Forensic Tools

  • Conference paper
  • First Online:
Intelligent Computing (CompCom 2019)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 998))

Included in the following conference series:

Abstract

In many digital forensic investigations, the analysis of email data may be necessary. However, this may violate the privacy of the person whose emails are being analyzed. To avoid this violation, investigators generally run keyword searches to reveal only those emails that contain at least some of the keywords. Forensics investigators need to choose an email forensics tool that supports comprehensive keyword search and reporting. Selection of an appropriate tool requires knowledge of the capabilities of the tool. In this research, our aim is to help the investigators in the tool selection process by experimentally examining four different email forensics tools and evaluating their keyword search and report generation capabilities as well as some other features. The other features include but not limited to email format they support, size of the file they accept, format of the reports, etc. We use Enron email dataset as input to the tools.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Aid4Mail: Email Forensic. http://www.aid4mail.com/

  2. Armknecht, F., Dewald, A.: Digital Invest. 14, 127–136 (2015)

    Article  Google Scholar 

  3. Banday, M.T.: Techniques and tools for forensics investigation of emails. Int. J. Netw. Secur. Appl. (IJNSA) 3(6), 227–241 (2011)

    Google Scholar 

  4. Chhabra, G.S., Bajwa, D.S.: Review of e-mail system, security protocols and email forensics. Int. J. Comput. Sci. Commun. Netw. 5(3), 201–211 (2015)

    Google Scholar 

  5. Cohen, F.: Bulk email forensics. In: IFIP International Conference on Digital Forensics. Springer, Chapter 4, pp. 51–67 (2009)

    Google Scholar 

  6. Devendran, V.K., Shahriar, H., Clincy, V.: A comparative study of email forensic tools. J. Inf. Secur. 6(2), 111–117 (2015)

    Google Scholar 

  7. EMailTrackerPro. http://www.emailtrackerpro.com/

  8. Enron Email Dataset. https://www.cs.cmu.edu/~enron/

  9. Hadjidj, R., Debbabi, M., Lounis, H., Iqbal, F., Szporer, A., Benredjem, D.: Towards an integrated e-mail forensic analysis framework. Digital Invest. 5, 124–137 (2009)

    Article  Google Scholar 

  10. Hatole, P.P., Bawiskar, S.K.: Literature review of email forensics. Imperial J. Interdiscip. Res. (IJIR). 3(4), 1436–1439 (2017)

    Google Scholar 

  11. Khan, S.R., Nirkhi, S.M., Dharaskar, R.V.: E-mail data analysis for application to cyber forensic investigation using data mining. Int. J. Appl. Inf. Syst. 1–4 (2013)

    Google Scholar 

  12. MailXaminer. http://www.mailxaminer.com/

  13. Meghanathan, N., Allam, S.R., Moore, L.A.: Tools and techniques for network forensics. Int. J. Netw. Secur. Appl. (IJNSA) 1(1), 14–25 (2009)

    Google Scholar 

  14. Paglierani, J., Mabey, M., Ahn, G.-J.: Towards comprehensive and collaborative forensics on email evidence. In: 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, pp. 11–20 (2013)

    Google Scholar 

  15. Paraben (Network) E-mail Examiner. http://www.paraben.com/email-examiner.html

  16. Stolfo, S.J., Hershkop, S.: Email mining toolkit supporting law enforcement forensic analyses. In: National Conference on Digital Government Research, Atlanta, Georgia, USA (2005)

    Google Scholar 

Download references

Acknowledgment

The MCCB funding for professional development supported this research. The author would like to thank my department head, Dr. Ash Mady and the dean of the college, Dr. Dona Mayo for their support.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ahmad Ghafarian .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ghafarian, A. (2019). Capabilities of Email Forensic Tools. In: Arai, K., Bhatia, R., Kapoor, S. (eds) Intelligent Computing. CompCom 2019. Advances in Intelligent Systems and Computing, vol 998. Springer, Cham. https://doi.org/10.1007/978-3-030-22868-2_38

Download citation

Publish with us

Policies and ethics