Abstract

Research Article

Analysis and Comparison of Social Media Applications Using Forensic Software on Mobile Devices

Hüseyin Çakır* and Merve Hatice Karataş

Published: 22 October, 2024 | Volume 8 - Issue 1 | Pages: 058-063

With the integration of mobile systems into daily life, social media applications used especially on Android and iOS platforms contain a significant amount of sensitive information. Social media applications on mobile systems have huge personal and sensitive content. Therefore, it is important to design effective techniques for forensic analysis of social media applications and to detect personal data. In this research, three different paid mobile forensic software and 4 different brands and models of smartphones with different operating systems were used and analyzed. The study shows that private messages, e-mails, time information, shared data, location and time information, and other personal data can be obtained by a forensic expert who performs an examination, and it is seen that one software can access the deleted data, but another software cannot access it. In proportion to the technology used in today’s world, mobile forensics incidents are increasing day by day, and a competitive environment is created among the software used to illuminate these incidents. With this competition, software companies dealing with forensic informatics are trying to obtain different data to illuminate forensic events that may occur due to the active use of social media accounts with the developing technology, and software that does not meet the needs in the face of this situation remains in the background. The criminal elements in the investigation areas of mobile forensics differ daily, and the scope of crimes in the virtual environment is expanding with the developing technology. Therefore, mobile forensic analysis applications should be successful in social media applications other than standard data.

Read Full Article HTML DOI: 10.29328/journal.jfsr.1001065 Cite this Article Read Full Article PDF

Keywords:

Social media; Mobile devices; Forensic software

References

  1. Hornyak T. Android grabs record 85 percent smartphone share. 2014. Available from: http://www.pcworld.com/article/2460020/android-grabs-record-85-percent-smartphone-share.html
  2. Ukşal M. Mobile forensics. Istanbul Bilgi University Institute of Social Sciences; 2015.
  3. Ashraf RA. Performance analysis of video call application on tablet using 3G network. Melaka: UTEM; 2013.
  4. Emekci A, Kuğu E. Computer forensics and agent-based systems. In: Proceedings of the 7th International Information Security and Cryptology Conference; 2014; 17-18.
  5. Özen M, Özocak G. Legal regime of search and seizure measures in computer forensics, electronic evidence and computers (CMK Art. 134). Ankara Bar Association Magazine. 2015;1.
  6. Mohtasebi S, Dehghantanha A. Defusing the hazards of social network services. Int J Digit Inf Wirel Commun. 2011;1:504–516.
  7. Taylor M, Hughes G, Haggerty J, Gresty D, Almond P. Digital evidence from mobile telephone applications. Comput Law Secur Rev. 2012;28:335–339. Available from: http://dx.doi.org/10.1016/j.clsr.2012.03.006
  8. Dezfouli FN, Dehghantanha A, Eterovic-Soric B, Choo KR. Investigating social networking applications on smartphones: detecting Facebook, Twitter, LinkedIn and Google+ artefacts on Android and iOS platforms. Aust J Forensic Sci. 2016;46(4):469–488. Available from: http://dx.doi.org/10.1080/00450618.2015.1066854
  9. Dezfouli FN, Dehghantanha A, Mahmod R, Mohd Sani NF, Shamsuddin S. A data-centric model for smartphone security. Int J Adv Comput Technol. 2013;5:9–17. Available from: http://dx.doi.org/10.4156/ijact.vol5.issue9.2
  10. Damshenas M, Dehghantanha A, Mahmoud R. A survey on digital forensics trends. Int J Cyber-Security Digit Forensics. 2014;3(4):209–235. https://www.semanticscholar.org/paper/A-Survey-on-Digital-Forensics-Trends-Dehghantanha-Damshenas/d3dcb45bbdbb440186a926b7541870d6c3844c72
  11. Mohtasebi S, Dehghantanha A. Towards a unified forensic investigation framework of smartphones. Int J Comput Theory Eng. 2013;5:351–355. Available from: http://dx.doi.org/10.7763/IJCTE.2013.V5.708
  12. Mohtasebi S, Dehghantanha A, Broujerdi HG. Smartphone forensics: a case study with Nokia E5-00 mobile phone. Int J Digit Inf Wirel Commun. 2012;1:651–655. http://www.ijcte.org/index.php?m=content&c=index&a=show&catid=48&id=821
  13. Jung J, Jeong C, Byun K, Lee S. Sensitive privacy data acquisition in the iPhone for digital forensic analysis. In: Park JJ, Lopez J, Yeo SS, Shon T, Taniar D, editors. Secure and trust computing, data management and applications. Communications in Computer and Information Science. 2011;186: Springer; 172-186. Available from: http://dx.doi.org/10.1007/978-3-642-22339-6_21
  14. Tso YC, Wang SJ, Huang CT, Wang WJ. iPhone social networking for evidence investigations: using iTunes forensics. In: Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication - ICUIMC’12. New York, NY: ACM Press; 2012; 1. Available from: http://dx.doi.org/10.1145/2184751.2184827
  15. Anglano C. Forensic analysis of WhatsApp Messenger on Android smartphones. Digit Investig. 2014;11:1–13. Available from: http://dx.doi.org/10.1016/j.diin.2014.04.003
  16. Karpisek F, Baggili I, Breitinger F. WhatsApp network forensics: decrypting and understanding the WhatsApp call signaling messages. Digit Investig. 2015;11:1–9. Available from: http://dx.doi.org/10.1016/j.diin.2015.09.002
  17. Walnycky D, Baggili I, Marrington A, Moore J, Breitinger F. Network and device forensic analysis of Android social-messaging applications. Digit Investig. 2015;14–S84. Available from: http://dx.doi.org/10.1016/j.diin.2015.05.009
  18. Said H, Yousif A, Humaid H. iPhone forensics techniques and crime investigation. In: Proceedings of the International Conference and Workshop on Current Trends in Information Technology (CTIT 11). IEEE; 2011; 120–125. Available from: http://dx.doi.org/10.1109/CTIT.2011.6107946
  19. Iqbal A, Marrington A, Baggili I. Forensic artifacts of the ChatON instant messaging application. In: Proceedings of the International Workshop on Systematic Approaches to Digital Forensic Engineering; 2014. Available from: http://dx.doi.org/10.1109/SADFE.2013.6911538
  20. Al Mutawa N, Baggili I, Marrington A. Forensic analysis of social networking applications on mobile devices. Digit Investig. 2012;9–S33. Available from: https://doi.org/10.1016/j.diin.2012.05.007
  21. Norouzi F, Dehghantanha A, Eterovic-Soric B, Choo KR. Investigating social networking applications on smartphones: detecting Facebook, Twitter, LinkedIn, and Google+ artifacts on Android and iOS platforms. Aust J Forensic Sci. 2015;48(4):469–488. Available from: http://dx.doi.org/10.1080/00450618.2015.1066854
  22. Eriş FG, Akbal E. Forensic analysis of popular social media applications on Android smartphones. Balkan J Electr Comput Eng. 2021;9(4):386–397. Available from: https://doi.org/10.17694/bajece.761271
  23. Millatina D, Gunawan EH, Sugiantoro B. Forensic analysis of WhatsApp, Instagram, and Telegram on virtual Android device. In: Proceedings of the 12th International Symposium on Digital Forensics and Security (ISDFS); 2024; 1–4. IEEE. Available from: http://dx.doi.org/10.1109/ISDFS60797.2024.10527308
  24. Awan FA. Forensic examination of social networking applications on smartphones. In: Proceedings of the 2015 Conference on Information Assurance and Cyber Security (CIACS); 2015; 36–43. IEEE. Available from: https://doi.org/10.1109/CIACS.2015.7395564
  25. Alblooshi A, Aljneibi N, Iqbal F, Ikuesan R, Badra M, Khalid Z. Smartphone forensics: a comparative study of common mobile phone models. In: Proceedings of the 12th International Symposium on Digital Forensics and Security (ISDFS); 2024; 1–6. IEEE. Available from: http://dx.doi.org/10.1109/ISDFS60797.2024.10527262
  26. Al Mushcab R, Gladyshev P. The significance of different backup applications in retrieving social networking forensic artifacts from Android-based mobile devices. In: Proceedings of the 2nd International Conference on Information Security and Cyber Forensics (InfoSec); 2015; 66–71. IEEE. Available from: http://dx.doi.org/10.1155/2021/5567592
  27. Almuqren A, Alsuwaelim H, Rahman MH, Ibrahim AA. A systematic literature review on digital forensic investigation on Android devices. Procedia Comput Sci. 2024;235:1332–1352. Available from: http://irep.iium.edu.my/112663/1/112663_A%20systematic%20literature%20review%20on%20digital%20forensic%20investigation.pdf
  28. Johnson H, Volk K, Serafin R, Grajeda C, Baggili I. Alt-tech social forensics: forensic analysis of alternative social networking applications. Forensic Sci Int Digit Investig. 2022;42:301406. Available from: http://dx.doi.org/10.1016/j.fsidi.2022.301406

Figures:

Similar Articles

Recently Viewed

Read More

Most Viewed

Read More

Help ?