Network forensic analysis of Twitter application on Android OS

Loading...
Thumbnail Image
Date
2023-02-17
Authors
Umrani, Alia
Javed, Yousra
Iftikhar, Muhammad
Journal Title
Journal ISSN
Volume Title
Publisher
Institute of Electrical and Electronics Engineers (IEEE)
Research Projects
Organizational Units
Journal Issue
Abstract
The increased use of secure social media apps on smartphones has attracted the interest of criminals looking to engage in illegal activities. The additional user confidentiality requirements, as well as the security features of these applications, complicate forensic investigations. The extensive analysis of encrypted traffic sessions, on the other hand, has the potential of identifying involved parties and their activities. In this paper, we conduct a network traffic analysis of Twitter, a popular social media application that uses encryption to protect information transmitted over the network. We concentrate on the Android platform to generate Twitter traffic, analyze fixed patterns, and extract artifacts based on various user actions. A firewall is also used to investigate Twitter's hidden design flexibilities and alternate connectivity options. Through our analysis, we were able to correctly identify the flow of Twitter traffic, user-related information, and fixed patterns to classify different user activities on Twitter.
Description
Keywords
Android , Encryption , Network Forensics , Traffic analysis , Twitter
Citation
Umrani, A., Javed, Y. and Iftikhar, M. (2023) 'Network forensic analysis of Twitter application on Android OS', 2022 International Conference on Frontiers of Information Technology (FIT), Islamabad, Pakistan, 2022, pp. 249-254. doi: 10.1109/FIT57066.2022.00053
Link to publisher’s version
Copyright
© 2023, IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.