Abstract
In many digital forensic investigations, the analysis of email data may be necessary. However, this may violate the privacy of the person whose emails are being analyzed. To avoid this violation, investigators generally run keyword searches to reveal only those emails that contain at least some of the keywords. Forensics investigators need to choose an email forensics tool that supports comprehensive keyword search and reporting. Selection of an appropriate tool requires knowledge of the capabilities of the tool. In this research, our aim is to help the investigators in the tool selection process by experimentally examining four different email forensics tools and evaluating their keyword search and report generation capabilities as well as some other features. The other features include but not limited to email format they support, size of the file they accept, format of the reports, etc. We use Enron email dataset as input to the tools.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Aid4Mail: Email Forensic. http://www.aid4mail.com/
Armknecht, F., Dewald, A.: Digital Invest. 14, 127–136 (2015)
Banday, M.T.: Techniques and tools for forensics investigation of emails. Int. J. Netw. Secur. Appl. (IJNSA) 3(6), 227–241 (2011)
Chhabra, G.S., Bajwa, D.S.: Review of e-mail system, security protocols and email forensics. Int. J. Comput. Sci. Commun. Netw. 5(3), 201–211 (2015)
Cohen, F.: Bulk email forensics. In: IFIP International Conference on Digital Forensics. Springer, Chapter 4, pp. 51–67 (2009)
Devendran, V.K., Shahriar, H., Clincy, V.: A comparative study of email forensic tools. J. Inf. Secur. 6(2), 111–117 (2015)
EMailTrackerPro. http://www.emailtrackerpro.com/
Enron Email Dataset. https://www.cs.cmu.edu/~enron/
Hadjidj, R., Debbabi, M., Lounis, H., Iqbal, F., Szporer, A., Benredjem, D.: Towards an integrated e-mail forensic analysis framework. Digital Invest. 5, 124–137 (2009)
Hatole, P.P., Bawiskar, S.K.: Literature review of email forensics. Imperial J. Interdiscip. Res. (IJIR). 3(4), 1436–1439 (2017)
Khan, S.R., Nirkhi, S.M., Dharaskar, R.V.: E-mail data analysis for application to cyber forensic investigation using data mining. Int. J. Appl. Inf. Syst. 1–4 (2013)
MailXaminer. http://www.mailxaminer.com/
Meghanathan, N., Allam, S.R., Moore, L.A.: Tools and techniques for network forensics. Int. J. Netw. Secur. Appl. (IJNSA) 1(1), 14–25 (2009)
Paglierani, J., Mabey, M., Ahn, G.-J.: Towards comprehensive and collaborative forensics on email evidence. In: 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, pp. 11–20 (2013)
Paraben (Network) E-mail Examiner. http://www.paraben.com/email-examiner.html
Stolfo, S.J., Hershkop, S.: Email mining toolkit supporting law enforcement forensic analyses. In: National Conference on Digital Government Research, Atlanta, Georgia, USA (2005)
Acknowledgment
The MCCB funding for professional development supported this research. The author would like to thank my department head, Dr. Ash Mady and the dean of the college, Dr. Dona Mayo for their support.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Ghafarian, A. (2019). Capabilities of Email Forensic Tools. In: Arai, K., Bhatia, R., Kapoor, S. (eds) Intelligent Computing. CompCom 2019. Advances in Intelligent Systems and Computing, vol 998. Springer, Cham. https://doi.org/10.1007/978-3-030-22868-2_38
Download citation
DOI: https://doi.org/10.1007/978-3-030-22868-2_38
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-22867-5
Online ISBN: 978-3-030-22868-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)