scholarly journals Encrypted Network Traffic Analysis of Secure Instant Messaging Application: A Case Study of Signal Messenger App

2021 ◽  
Vol 11 (17) ◽  
pp. 7789
Author(s):  
Asmara Afzal ◽  
Mehdi Hussain ◽  
Shahzad Saleem ◽  
M. Khuram Shahzad ◽  
Anthony T. S. Ho ◽  
...  

Instant messaging applications (apps) have played a vital role in online interaction, especially under COVID-19 lockdown protocols. Apps with security provisions are able to provide confidentiality through end-to-end encryption. Ill-intentioned individuals and groups use these security services to their advantage by using the apps for criminal, illicit, or fraudulent activities. During an investigation, the provision of end-to-end encryption in apps increases the complexity for digital forensics investigators. This study aims to provide a network forensic strategy to identify the potential artifacts from the encrypted network traffic of the prominent social messenger app Signal (on Android version 9). The analysis of the installed app was conducted over fully encrypted network traffic. By adopting the proposed strategy, the forensic investigator can easily detect encrypted traffic activities such as chatting, media messages, audio, and video calls by looking at the payload patterns. Furthermore, a detailed analysis of the trace files can help to create a list of chat servers and IP addresses of involved parties in the events. As a result, the proposed strategy significantly facilitates extraction of the app’s behavior from encrypted network traffic which can then be used as supportive evidence for forensic investigation.

2018 ◽  
Vol 2 (2) ◽  
pp. 62-73 ◽  
Author(s):  
Sunday Olarinre Oladokun ◽  
Cyril Ayodele Ajayi

ABSTRACT Facilities play a vital role in the attraction and retention of quality staff and students in tertiary institution. Hence, the perception of these facilities users is important in assessing Facilities Management (FM) services. Few studies exist in Nigeria on FM practice in tertiary institutions. Therefore, this study investigated the perception of staff and students on FM services within the campus of one of the foremost public universities in Nigeria. This study utilised survey approach by eliciting data from staff and students through self-administered questionnaire. Data collected were analysed using descriptive statistics, factor analysis, and independent sample t-test. It was found that staff and students were more satisfied with cleaning and security services than other FM services in the study area. A significant difference was also found between the perception of staff and that of students over five out of nine categories of FM services while staff were more satisfied in in all the five. The findings suggest the need for all-inclusive performance assessment of FM units and the need to embrace a more user-focused FM policy in tertiary institution. Further research covering more tertiary institutions and other stakeholders within university system may provide more generalisable results.


Author(s):  
R I Battalov ◽  
A V Nikonov ◽  
M M Gayanova ◽  
V V Berkholts ◽  
R Ch Gayanov

Traffic analysis systems are widely used in monitoring the network activity of users or a specific user and restricting client access to certain types of services (VPN, HTTPS) which makes content analysis impossible. Algorithms for classifying encrypted traffic and detecting VPN traffic are proposed. Three algorithms for constructing classifiers are considered - MLP, RFT and KNN. The proposed classifier demonstrates recognition accuracy on a test sample up to 80%. The MLP, RFT and KNN algorithms had almost identical performance in all experiments. It was also found that the proposed classifiers work better when the network traffic flows are generated using short values of the time parameter (timeout). The novelty lies in the development of network traffic analysis algorithms based on a neural network, differing in the method of selection, generation and selection of features, which allows to classify the existing traffic of protected connections of selected users according to a predetermined set of categories.


2018 ◽  
Vol 5 (2) ◽  
pp. 73-83
Author(s):  
Hussein Abed Ghannam

WhatsApp is a giant mobile instant message IM application with over 1billion users. The huge usage of IM like WhatsApp through giant smart phone “Android” makes the digital forensic researchers to study deeply. The artefacts left behind in the smartphone play very important role in any electronic crime, or any terror attack. “WhatsApp” as a biggest IM in the globe is considered to be very important resource for information gathering about any digital crime. Recently, end-to-end encryption and many other important features were added and no device forensic analysis or network forensic analysis studies have been performed to the time of writing this paper. This paper explains how can we able to extract the Crypt Key of “WhatsApp” to decrypt the databases and extract precious artefacts resides in the android system without rooting the device. Artefacts that extracted from the last version of WhatsApp have been analysed and correlate to give new valuable evidentiary traces that help in investigating. Many hardware and software tools for mobile and forensics are used to collect as much digital evidence as possible from persistent storage on android device. Some of these tools are commercial like UFED Cellebrite and Andriller, and other are open source tools such as autopsy, adb, WhatCrypt. All of these tools that forensically sound accompanied this research to discover a lot of artefacts resides in android internal storage in WhatsApp application.


2011 ◽  
Vol 13 (1) ◽  
pp. 155-139
Author(s):  
Hasan Shafie

In this study we propose the establishment of theological rules (qawāʿid iʿtiqādiyya) similar to the jurisitic rules (qawāʿid fiqhiyya) which have for centuries been very important to Islamic jurisprudence, and which play a vital role in jurisprudence and uṣūl al-fiqh. The present article takes the second sura of the Qur'an, Sūrat al-Baqara, as a case study, identifying three fundamental principles in this sura: (i) man is honoured (al-insān mukarram), (ii) the Resurrection is a reality (al-baʿth ḥaqq) (iii) belief in all prophets is obligatory (al-īmān bi-kāfat al-anbiyāʾ wājib). These three rules are emphasised and reiterated in many parts of the sura, to a greater extent than any other principle. This study calls for other scholars to consider this proposition and develop it further.


2020 ◽  
Author(s):  
Sumit Kumari ◽  
Neetu Sharma ◽  
Prashant Ahlawat

2017 ◽  
Vol 2 (11) ◽  
pp. 8-16
Author(s):  
Moses Ashawa ◽  
Innocent Ogwuche

The fast-growing nature of instant messaging applications usage on Android mobile devices brought about a proportional increase on the number of cyber-attack vectors that could be perpetrated on them. Android mobile phones store significant amount of information in the various memory partitions when Instant Messaging (IM) applications (WhatsApp, Skype, and Facebook) are executed on them. As a result of the enormous crimes committed using instant messaging applications, and the amount of electronic based traces of evidence that can be retrieved from the suspect’s device where an investigation could convict or refute a person in the court of law and as such, mobile phones have become a vulnerable ground for digital evidence mining. This paper aims at using forensic tools to extract and analyse left artefacts digital evidence from IM applications on Android phones using android studio as the virtual machine. Digital forensic investigation methodology by Bill Nelson was applied during this research. Some of the key results obtained showed how digital forensic evidence such as call logs, contacts numbers, sent/retrieved messages, and images can be mined from simulated android phones when running these applications. These artefacts can be used in the court of law as evidence during cybercrime investigation.


Author(s):  
Lu Zhang ◽  
Zhenghong Peng

As the most historically and culturally valuable city district in Nanning, Xingning Block has gradually formed its own unique color characteristics and architectural style in the slow process of urban historical development, showing the unique local customs and architectural features. However, restricted by the specific development conditions, many undesirable aspects can be found in the overall architectural landscape color of some nodes on the block, such as lack of systematic planning, poor material matching, messy building color, as well as various challenges of contemporary social development to the architectural environmental color on the block.The architectural environmental color of urban traditional blocks is an important part of the specific history, culture and spirit of the times of a city, which plays a vital role in the development and change of the city. Therefore, how to effectively and reasonably do a good job in sustainable urban planning and development is an issue that must attract the attention of competent authorities at all levels, scientific research institutions and planning practitioners.


Author(s):  
Ayush Bahuguna ◽  
Ankit Agrawal ◽  
Ashutosh Bhatia ◽  
Kamlesh Tiwari ◽  
Deepak Vishwakarma

Sign in / Sign up

Export Citation Format

Share Document