Files

PDF

HOW TO CITE

Android Mobile Cybercrimes and its Forensic
Authors (Affiliation): Bandu Meshram (Jeman Educational Society), Manish Kumar Singh (NIMS University Rajasthan,)
Abstract:

Mobile Systems are developed each day with enhanced features such as cameras, personal digital assistants and the global positioning systems. Although these features have been tailored to meet user’s needs, they have simplified criminals' activities of committing crimes without physically being available at the crime scene. The statement of the problem about mobile forensic is defined and research methodology used in this experimentation is discussed. The mobile attack surface area is identified with attacks on mobile communication systems. The attacks on the smartphones are identified during the research and its categorization is made into mobile attacks using operating systems, mobile applications, internet browser based attacks, network based attacks, hardware based attacks. The researchers also investigate the types of attacks based on mobile surface namely network based attack, device based attack, data center based attack, operating systems based attack and browser based attacks and the OWASP top 10 mobile vulnerabilities and attacks. The list of attacking tool, mobile forensic tools which are used at each steps of mobile forensic are identified and evidence paths are also listed by experimentation. The deployment environment for android mobile forensic is set to carry out the research experimentation and diagnosis of attack to recover, preserve, analyses its data and related materials so that the investigation agency presents the evidence in a court of law. The practical experimentation shows the mobile forensic steps for initial response, data acquisition and duplication - recovering deleted files to extract the evidence. Secondly the mobile forensic software tool consisting of initialization, acquisition and investigation is proposed. The experimentation and proposed tool does the forensics of information like SMS, MMS, Contacts, Call Logs, Gmail Account, Hardware Details, network information related to Wi-Fi, Bluetooth and third party applications and social media.

Keywords: Mobile forensic attacks, Process model, Data extraction, Recovery, Initialization, Acquisition, Investigation, Evidence
Vol & Issue: VOL.2, ISSUE No.1, June 2023