{"title":"Network Forensic Analysis of Twitter Application on Android OS","authors":"Alia Umrani, Yousra Javed, Muhammad Iftikhar","doi":"10.1109/FIT57066.2022.00053","DOIUrl":null,"url":null,"abstract":"The increased use of secure social media apps on smartphones has attracted the interest of criminals looking to engage in illegal activities. The additional user confidentiality requirements, as well as the security features of these applications, complicate forensic investigations. The extensive analysis of encrypted traffic sessions, on the other hand, has the potential of identifying involved parties and their activities. In this paper, we conduct a network traffic analysis of Twitter, a popular social media application that uses encryption to protect information transmitted over the network. We concentrate on the Android platform to generate Twitter traffic, analyze fixed patterns, and extract artifacts based on various user actions. A firewall is also used to investigate Twitter's hidden design flexibilities and alternate connectivity options. Through our analysis, we were able to correctly identify the flow of Twitter traffic, user-related information, and fixed patterns to classify different user activities on Twitter.","PeriodicalId":102958,"journal":{"name":"2022 International Conference on Frontiers of Information Technology (FIT)","volume":"41 2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Frontiers of Information Technology (FIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/FIT57066.2022.00053","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
The increased use of secure social media apps on smartphones has attracted the interest of criminals looking to engage in illegal activities. The additional user confidentiality requirements, as well as the security features of these applications, complicate forensic investigations. The extensive analysis of encrypted traffic sessions, on the other hand, has the potential of identifying involved parties and their activities. In this paper, we conduct a network traffic analysis of Twitter, a popular social media application that uses encryption to protect information transmitted over the network. We concentrate on the Android platform to generate Twitter traffic, analyze fixed patterns, and extract artifacts based on various user actions. A firewall is also used to investigate Twitter's hidden design flexibilities and alternate connectivity options. Through our analysis, we were able to correctly identify the flow of Twitter traffic, user-related information, and fixed patterns to classify different user activities on Twitter.