2023
DOI: 10.1016/j.asej.2022.102069
|View full text |Cite
|
Sign up to set email alerts
|

A framework for digital forensics of encrypted real-time network traffic, instant messaging, and VoIP application case study

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 20 publications
0
2
0
Order By: Relevance
“…Notably, these analyses are confined to one operating system, Android, and the output primarily involves the examination of network metadata trying to categorize some of the user actions within this application. A previous study [12] introduced a framework and methodology that effectively extracts important information from the encrypted traffic of WhatsApp and Telegram on IOS devices. This innovative framework allows analysts to identify, categorize, and analyze encrypted traffic, including texting, typing, voice and video calls, and media transmissions.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Notably, these analyses are confined to one operating system, Android, and the output primarily involves the examination of network metadata trying to categorize some of the user actions within this application. A previous study [12] introduced a framework and methodology that effectively extracts important information from the encrypted traffic of WhatsApp and Telegram on IOS devices. This innovative framework allows analysts to identify, categorize, and analyze encrypted traffic, including texting, typing, voice and video calls, and media transmissions.…”
Section: Related Workmentioning
confidence: 99%
“…Network forensics is another category of digital forensics that involves capturing live or backup traffic packets and log files from various network components. Analyzing encrypted network traffic [11], [12], [13] can have a significant impact on investigations. However, advancements in encryption techniques have made it more challenging for investigators to extract user activities from encrypted network traffic while using IM applications.…”
Section: Introductionmentioning
confidence: 99%