Mobile Device and Social Media Forensic Analysis: Impacts on Cyber-Crime

被引:0
作者
Saha, Debanjana [1 ]
Karmakar, Sajal [2 ]
Nur, Fernaz Narin [3 ]
Mariam, Asma [1 ]
Moon, Nazmun Nessa [1 ]
Ahmed, Akash [1 ]
机构
[1] Daffodil Int Univ, Dept Comp Sci & Engn, Dhaka, Bangladesh
[2] Noakhali Sci & Technol Engn, Dept Econ, Noakhali, Bangladesh
[3] Notre Dame Univ, Dept Comp Sci & Engn, Dhaka, Bangladesh
来源
2021 1ST INTERNATIONAL CONFERENCE ON EMERGING SMART TECHNOLOGIES AND APPLICATIONS, ESMARTA 2021 | 2021年
关键词
Cybercrime; Forensic analysis; Logical image; Mobile device; Timestamps;
D O I
10.1109/ESMARTA52612.2021.9515742
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This research work has focused on a digital forensic analysis of social media through mobile devices to determine the primary criminal. This proposed system considered the mobile device used by the prime suspect as the main evidence of cybercrime and tried to find out the degree of criminal involvement in terms of probability likelihood. At first, the most critical data elements were obtained, e.g., deleted files and keywords, through the forensic analysis of the mobile device. This will also help in the identification of the main culprits in the investigation of cybercrime. Next, the system classified the criminals in one of three zones based on the analysis of the keywords to determine the level of crime. The system also takes into account the most probable timeframe for the crime. Thus, the proposed system helps to identify the main culprits in investigating cybercrime more efficiently than the traditional approaches. The system is also looking into the most probable timeframe for the crime, for example, it has been observed that most cybercrime happens on the weekends. The proposed system investigates using cookies and the logical image of the device that cyber criminals left behind.
引用
收藏
页码:195 / 202
页数:8
相关论文
共 41 条
[1]   Forensic analysis of social networking applications on mobile devices [J].
Al Mutawa, Noora ;
Baggili, Ibrahim ;
Marrington, Andrew .
DIGITAL INVESTIGATION, 2012, 9 :S24-S33
[2]  
Alazab M., 2009, Ubiquitous Computing and Communication Journal, V4, P551
[3]   Analyzing multiple logs for forensic evidence [J].
Arasteh, Ali Reza ;
Debbabi, Mourad ;
Sakha, Assaad ;
Saleh, Mohamed .
DIGITAL INVESTIGATION, 2007, 4 (82-91) :S82-S91
[4]   Formal knowledge model for online social network forensics [J].
Arshad, Humaira ;
Jantan, Aman ;
Hoon, Gan Keng ;
Abiodun, Isaac Oludare .
COMPUTERS & SECURITY, 2020, 89
[5]  
Carroll O.L., 2008, United States Attorneys Bulletin, V56, P1
[6]  
De Luca Fiscone G., 2020, Advanced Information Networking and Applications. AINA 2020., V1151, DOI [10.1007/978-3-030- 44041-1_69, DOI 10.1007/978-3-030-44041-1_69]
[7]  
Durjoy Saif Mahmud Khan, 2020, 1 INT C ADV DISTR CO
[8]  
Hasan Mahadi, 2019, 2019 Third International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), P243, DOI 10.1109/I-SMAC47947.2019.9032699
[9]  
Hasan M. M., 2020, 2020 11 INT C COMP C, P1, DOI [10.1109/ICCCNT49239.2020.9225468, DOI 10.1109/ICCCNT49239.2020.9225468]
[10]   Prediction of Pneumonia Disease of Newborn Baby Based on Statistical Analysis of Maternal Condition Using Machine Learning Approach [J].
Hasan, Md. Mehedi ;
Faruk, Md. Omar ;
Biki, Bidesh Biswas ;
Riajuliislatn, Md ;
Alam, Khairul ;
Shetu, Sysda Farjana .
2021 11TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE & ENGINEERING (CONFLUENCE 2021), 2021, :919-924