Analytical method for forensic investigation of social networking applications on smartphones
Social Networking has influenced the way people interact with each other. Many people use social networking applications for individual or commercial purposes to share information. However, the rapid growth of social networking and social networking applications on mobile devices has attracted cy...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2016
|
Subjects: | |
Online Access: | http://psasir.upm.edu.my/id/eprint/69358/1/FSKTM%202016%2022%20IR.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my-upm-ir.69358 |
---|---|
record_format |
uketd_dc |
spelling |
my-upm-ir.693582019-07-10T01:30:28Z Analytical method for forensic investigation of social networking applications on smartphones 2016-05 Dezfouli, Farhood Norouzizadeh Social Networking has influenced the way people interact with each other. Many people use social networking applications for individual or commercial purposes to share information. However, the rapid growth of social networking and social networking applications on mobile devices has attracted cyber criminals and has resulted in their use in many criminal activities such as identity theft, piracy, illegal trading, sexual harassment, cyber stalking and cyber terrorism. Mobile devices are a gold mine of evidences for forensic investigators as they store valuable social networking data. Previous researches on forensic investigation of social networking applications on smartphones were conducted using existing forensic analyzer tools and failed to identify important data remnants including passwords, GPS locations, uploaded files, posts and messages. Therefore, the result of previous researches indicate that the current mobile forensic analyzer tools and methods are not able to automatically acquire enough valuable data remnants from social networking applications on smartphones and only provide an interface to the data for the investigator. In this research, we propose an examination method for investigation of social networking applications on smartphones in order to detect all possible data remnants when undertaking the forensic investigation of social networking platforms. In this examination method, logical and physical images of smartphones are examined manually using a set of predefined keywords. This will allow the investigators to detect the data remnants and identify their patterns. The identified patterns are then used to design an algorithm for detecting social networking data remnants automatically. The outcome of this research resulted in detection of user‟s username, password, UID, personal information, pictures, workplace and organization, GPS locations, friend list, uploaded posts, uploaded messages, uploaded comments, uploaded files, interests and identification of the pattern for how and where each data remnant is stored in the internal memory and internal storage of the smartphone. Moreover, an algorithm was designed that automatically extracts social networking data remnants from smartphones using the identified patterns. We hope this research can be a stepping stone for identifying a common methodology for investigation of all types of smartphone applications and serve as the first step toward developing a consistent digital forensic framework for social networking such as the one proposed and evaluated in this research. Smartphones Social networks - Crime 2016-05 Thesis http://psasir.upm.edu.my/id/eprint/69358/ http://psasir.upm.edu.my/id/eprint/69358/1/FSKTM%202016%2022%20IR.pdf text en public masters Universiti Putra Malaysia Smartphones Social networks - Crime |
institution |
Universiti Putra Malaysia |
collection |
PSAS Institutional Repository |
language |
English |
topic |
Smartphones Social networks - Crime |
spellingShingle |
Smartphones Social networks - Crime Dezfouli, Farhood Norouzizadeh Analytical method for forensic investigation of social networking applications on smartphones |
description |
Social Networking has influenced the way people interact with each other. Many
people use social networking applications for individual or commercial purposes to
share information. However, the rapid growth of social networking and social
networking applications on mobile devices has attracted cyber criminals and has
resulted in their use in many criminal activities such as identity theft, piracy, illegal
trading, sexual harassment, cyber stalking and cyber terrorism. Mobile devices are a
gold mine of evidences for forensic investigators as they store valuable social
networking data.
Previous researches on forensic investigation of social networking applications on
smartphones were conducted using existing forensic analyzer tools and failed to
identify important data remnants including passwords, GPS locations, uploaded files,
posts and messages. Therefore, the result of previous researches indicate that the
current mobile forensic analyzer tools and methods are not able to automatically
acquire enough valuable data remnants from social networking applications on
smartphones and only provide an interface to the data for the investigator.
In this research, we propose an examination method for investigation of social
networking applications on smartphones in order to detect all possible data remnants
when undertaking the forensic investigation of social networking platforms. In this
examination method, logical and physical images of smartphones are examined
manually using a set of predefined keywords. This will allow the investigators to detect
the data remnants and identify their patterns. The identified patterns are then used to
design an algorithm for detecting social networking data remnants automatically.
The outcome of this research resulted in detection of user‟s username, password, UID,
personal information, pictures, workplace and organization, GPS locations, friend list,
uploaded posts, uploaded messages, uploaded comments, uploaded files, interests and
identification of the pattern for how and where each data remnant is stored in the internal memory and internal storage of the smartphone. Moreover, an algorithm was
designed that automatically extracts social networking data remnants from smartphones
using the identified patterns.
We hope this research can be a stepping stone for identifying a common methodology
for investigation of all types of smartphone applications and serve as the first step
toward developing a consistent digital forensic framework for social networking such
as the one proposed and evaluated in this research. |
format |
Thesis |
qualification_level |
Master's degree |
author |
Dezfouli, Farhood Norouzizadeh |
author_facet |
Dezfouli, Farhood Norouzizadeh |
author_sort |
Dezfouli, Farhood Norouzizadeh |
title |
Analytical method for forensic investigation of social networking applications on smartphones |
title_short |
Analytical method for forensic investigation of social networking applications on smartphones |
title_full |
Analytical method for forensic investigation of social networking applications on smartphones |
title_fullStr |
Analytical method for forensic investigation of social networking applications on smartphones |
title_full_unstemmed |
Analytical method for forensic investigation of social networking applications on smartphones |
title_sort |
analytical method for forensic investigation of social networking applications on smartphones |
granting_institution |
Universiti Putra Malaysia |
publishDate |
2016 |
url |
http://psasir.upm.edu.my/id/eprint/69358/1/FSKTM%202016%2022%20IR.pdf |
_version_ |
1747812687698460672 |