Digital Forensics Based Analysis of Mobile Phones
Total Page:16
File Type:pdf, Size:1020Kb
Journal of Android and IOS Applications and Testing Volume 4 Issue 3 Digital Forensics Based Analysis of Mobile Phones Pooja V Chavan PG Student, Department of Computer Engineering, K. J. Somaiya College of Engineering, Mumbai, Maharashtra, India Email: [email protected] DOI: Abstract Now-a-day’s ratio of mobile phone is increasing day by day. Digital forensics methodology is use to recover and investigate data that found in a digital devices. Mobile phone usage is more that’s why not only judicial events occurred but also mobile forensics and subdivision of digital forensics are emerged. Some hardware and software are used for mobile phone investigations. Keywords: Digital forensics, digital devices, mobile phone INTRODUCTION because electronic device have a variety of Forensic science’s subdivision is a digital different operating system, technology, forensic, is a one type of process. The storage structure, Features. First identify main objective of this process to find the crime after that digital forensic work evidence in digital devices [1]. Digital on four important steps (Figure 1): forensics are used for the analysis of data, such as audio, video, pictures, etc. After • Collection: The collected of evidence the analysis of electronic devices data that like fingerprints, broken fingernails help for legal process. The usage of blood and body fluids. advanced technology is increasing rapidly. • Examination: The examination of Electronic device have a variety of product process is depending on evidence. like tablet, flash memory, memory card, • Analysis: The crime scenes obtain SD card, etc. When forensic analysis is different digital evidence, analysis is performed at that time data should be done on storage evidence this secure. The achieved results can be used in information required by judicial judicial process with some condition. authorities. • Reporting: what is the crime? What is Digital forensics is divided into sub- the different evidence? Make a disciplines as given below: document on investigation and • Computer Forensics submitted to the judicial authorities. • Mobile Forensics • Memory Forensics People are using n number of different • Network Forensics digital devices, according to research • Malware Forensics usage ratio of mobile phone is increases • OS Forensics day by day because compact in size, easy to carry, low cast, many features like Digital forensics has become examine a photo, video and audio, communication. data in detail based on sub-disciplines Transformation of a data over internet. 5 Page 5-8 © MAT Journals 2019. All Rights Reserved Journal of Android and IOS Applications and Testing Volume 4 Issue 3 Figure 1: Flowchart of digital forensics. MOBILE FORENSICS used to examining a mobile phone. It’s a Mobile devices have the ability to store a small step by step process (Figure 2 and data, sending a messages, internet services, 3). etc. examination of mobile devices done by Mobile forensics, is a challenging area Tools for the judicial process because so many • Cellebrite brands available in market like apple, • Paraben’s Device Seizure blackberry, oneplus. Operating system is • XRY depend on hardware like android, iPhone • EnCase Neutrino OS [2]. Each model has specific structure. • Oxygen Forensic Every device investigation in the light of • MOBILedit digital forensics. There are some software • Faraday and hardware tools (list is given below) are • Tarantula 6 Page 5-8 © MAT Journals 2019. All Rights Reserved Journal of Android and IOS Applications and Testing Volume 4 Issue 3 Figure 2: The processing steps for mobile phone examination. Figure 3: Social Media Data. FINDING AND RESULTS android operating system examined on the The purpose of investigation on mobile computer with the features and analysed with phone to find evidence. If phone having Oxygen Forensic and MOBIL edit programs. Software examination tools: Figure 4: Screenshot for oxygen forensic. 7 Page 5-8 © MAT Journals 2019. All Rights Reserved Journal of Android and IOS Applications and Testing Volume 4 Issue 3 How to examine a mobile phone the list is CONCLUSION given below (Figure 4): Everyone is use mobile phone. Earlier • Device Information days of mobile phone have only some • Retail Name : Retail name of device features like voice communication but now • Manufacturer: company, date, time. a day’s n number of features are in built • Software Revision : device software mobile phone like messages, data • Platform: cross is a platform for transferring, data storing. Mobile phone mobile phone. usage are more that’s why not only judicial • IMEI: Network Information, Device events occurred but also mobile forensics Information, etc. and subdivision of digital forensics are • Sim card information emerged. Mobile phone investigations is done by using some hardware and • IMSI:- Identification of user done by software. The analysis of data obtained International Mobile Subscriber from the investigation of mobile phones Identity is used to are evaluated. The results of analysis of a • PIN:- Personal Identification Number data can be acquired from a mobile device is use to find, person is bellowing by in terms of forensic data of the user's which city. criminal data. • PUK:- when your sim card is blocked then required, with the help of this REFERENCES number user can recess same sim card. 1. Sengul Dogan, Erhan Akbal (22−26 May, • ICCID:- A SIM card contains its 2017), “Analysis of Mobile Phones in unique serial number, with the help of Digital Forensics”, MIPRO Opatija, this number recognised the user. Croatia. • LAI:- LAI use to find a last location of 2. Min-Jen Tsai, “Camera/Mobile Phone user. etc. Source Identification for Digital • Contacts Forensics”, Republic of China, under Grant NSC 94- 2416-H009-018 and • Phonebook: see the last call, repeated NSC95-2416-H009-027. calls on particular number. 3. Appiah Kwame Kubi, Shahzad Saleem • Event Log: Incoming, call duration, (2011), “Evaluation of Some Tools for missed call, outgoing. Extracting e-Evidence from Mobile • Messages: check message box Devices”, IEEE, 978-1-61284-832- • Applications: E-mail 7/11/$26.00. • Groups: list of groups 4. Radhika Padmanabhan (2016), “Comparative Analysis of Commercial • Timeline of events made during phone and Open Source Mobile Device Forensic use. Tools”, IEEE, 978-1-5090-3251- • History of web browsers. 8/16/$31.00. • The available files on the phone. 5. Mohammad Wazid, Avita Katal (2013), • Passwords stored on the phone. “Hacktivism Trends, Digital Forensic • Deleted data form mobile phone. Tools and Challenges: A Survey”, IEEE, • Last Location of mobile phone. 978-1-4673-5758-6/13/$31.00. • Wi-Fi connection logs. Cite this article as: The above list is a helpful for legal process, live analysis is not allowed in judicial process because it damage the evidence. Each coin has two side some advantage and disadvantage also, accuracy and variety of the findings must be revealed by using different programs [3−5]. 8 Page 5-8 © MAT Journals 2019. All Rights Reserved .