Professional Documents
Culture Documents
Nowadays, mobile devices have become one of the most popular instruments used by
a person on its regular life, mainly due to the importance of their applications. In that
context, mobile devices store user’s personal information and even more data,
becoming a personal tracker for daily activities that provides important information
about the user. Derived from this gathering of information, many tools are available to
use on mobile devices, with the restrain that each tool only provides isolated
information about a specific application or activity. Therefore, the present work
proposes a tool that allows investigators to obtain a complete report and timeline of
the activities that were performed on the device. This report incorporates the
information provided by many sources into a unique set of data. Also, by means of an
example, it is presented the operation of the solution, which shows the feasibility in
the use of this tool and shows the way in which investigators have to apply the tool.
Operational Feasibility
Economic Feasibility
Technical Feasibility
Operational Feasibility
A Forensics Activity Logger to Extract User Activity From Mobile Devices
8
Operational Feasibility deals with the study of prospects of the system to be
developed. This system operationally eliminates all the tensions of the Admin and
helps him in effectively tracking the project progress. This kind of automation will
surely reduce the time and energy, which previously consumed in manual work.
Based on the study, the system is proved to be operationally feasible.
Economic Feasibility
Economic Feasibility or Cost-benefit is an assessment of the economic
justification for a computer based project. As hardware was installed from the
beginning & for lots of purposes thus the cost on project of hardware is low. Since the
system is a network based, any number of employees connected to the LAN within
that organization can use this tool from at anytime. The Virtual Private Network is to
be developed using the existing resources of the organization. So the project is
economically feasible.
Technical Feasibility
According to Roger S. Pressman, Technical Feasibility is the assessment of
the technical resources of the organization. The organization needs IBM compatible
machines with a graphical web browser connected to the Internet and Intranet. The
system is developed for platform Independent environment. Java Server Pages,
JavaScript, HTML, SQL server and WebLogic Server are used to develop the system.
The technical feasibility has been carried out. The system is technically feasible for
development and can be developed with the existing facility.
3.1 EXISTING SYSTEM:
Nowadays, mobile devices have become one of the most popular instruments used by
a person on its regular life, mainly due to the importance of their applications. In that
context, mobile devices store user’s personal information and even more data,
becoming a personal tracker for daily activities that provides important information
about the user. Derived from this gathering of information, many tools are available to
use on mobile devices, with the restrain that each tool only provides isolated
information about a specific application or activity
PROPOSED SYSTEM:
Therefore, the present work proposes a tool that allows investigators to obtain a
complete report and timeline of the activities that were performed on the device. This
SOFTWARE REQUIREMENTS:
The application starts running when it is executed for the first time. The server
has to be started and then the internet explorer in used as the browser. The
project will run on the local area network so the server machine will serve as
the administrator while the other connected systems can act as the clients. The
developed system is highly user friendly and can be easily understood by
anyone using it even for the first time.
ApplyForensicsActivity
user
Filter Data
Exit
CLASS DIAGRAM:
In software engineering, a class diagram in the Unified Modeling Language (UML) is
a type of static structure diagram that describes the structure of a system by showing
the system's classes, their attributes, operations (or methods), and the relationships
among the classes. It explains which class contains information.
Extract Data()
Apply Forensics Activity()
Filter Data()
Exit()
SEQUENCE DIAGRAM:
A sequence diagram in Unified Modeling Language (UML) is a kind of interaction
diagram that shows how processes operate with one another and in what order. It is a
construct of a Message Sequence Chart. Sequence diagrams are sometimes called
event diagrams, event scenarios, and timing diagrams.
Extract Data
Filter Data
exit
Advantages of Python :-
Let’s see how Python dominates over other languages.
1. Extensive Libraries
Python downloads with an extensive library and it contain code for various
purposes like regular expressions, documentation-generation, unit-testing, web
browsers, threading, databases, CGI, email, image manipulation, and more. So,
we don’t have to write the complete code for that manually.
Disadvantages of Python
So far, we’ve seen why Python is a great choice for your project. But if you
choose it, you should be aware of its consequences as well. Let’s now see the
downsides of choosing Python over another language.
1. Speed Limitations
We have seen that Python code is executed line by line. But since Python is
interpreted, it often results in slow execution. This, however, isn’t a problem
unless speed is a focal point for the project. In other words, unless high speed is a
requirement, the benefits offered by Python are enough to distract us from its
speed limitations.
2. Weak in Mobile Computing and Browsers
While it serves as an excellent server-side language, Python is much rarely seen
on the client-side. Besides that, it is rarely ever used to implement smartphone-
based applications. One such application is called Carbonnelle.
The reason it is not so famous despite the existence of Brython is that it isn’t that
secure.
3. Design Restrictions
As you know, Python is dynamically-typed. This means that you don’t need to
declare the type of variable while writing the code. It uses duck-typing. But wait,
what’s that? Well, it just means that if it looks like a duck, it must be a duck.
While this is easy on the programmers during coding, it can raise run-time
errors.
4. Underdeveloped Database Access Layers
Compared to more widely used technologies like JDBC (Java DataBase
Connectivity) and ODBC (Open DataBase Connectivity), Python’s database
What do the alphabet and the programming language Python have in common?
Right, both start with ABC. If we are talking about ABC in the Python context,
it's clear that the programming language ABC is meant. ABC is a general-purpose
programming language and programming environment, which had been
developed in the Netherlands, Amsterdam, at the CWI (Centrum Wiskunde
&Informatica). The greatest achievement of ABC was to influence the design of
Python.Python was conceptualized in the late 1980s. Guido van Rossum worked
that time in a project at the CWI, called Amoeba, a distributed operating system.
In an interview with Bill Venners1, Guido van Rossum said: "In the early 1980s, I
worked as an implementer on a team building a language called ABC at Centrum
voor Wiskunde en Informatica (CWI). I don't know how well people know ABC's
influence on Python. I try to mention ABC's influence because I'm indebted to
everything I learned during that project and to the people who worked on it."Later
on in the same Interview, Guido van Rossum continued: "I remembered all my
experience and some of my frustration with ABC. I decided to try to design a
simple scripting language that possessed some of ABC's better properties, but
without its problems. So I started typing. I created a simple virtual machine, a
simple parser, and a simple runtime. I made my own version of the various ABC
parts that I liked. I created a basic syntax, used indentation for statement grouping
instead of curly braces or begin-end blocks, and developed a small number of
powerful data types: a hash table (or dictionary, as we call it), a list, strings, and
numbers."
There have been several updates in the Python version over the years. The question
is how to install Python? It might be confusing for the beginner who is willing to
start learning Python but this tutorial will solve your query. The latest or the newest
version of Python is version 3.7.4 or in other words, it is Python 3.
Note: The python version 3.7.4 cannot be used on Windows XP or earlier devices.
Before you start with the installation process of Python. First, you need to know
about your System Requirements. Based on your system type i.e. operating system
and based processor, you must download the python version. My system type is
a Windows 64-bit operating system. So the steps below are to install python
version 3.7.4 on Windows 7 device or to install Python 3. Download the Python
Cheatsheet here.The steps on how to install Python on Windows 10, 8 and 7
are divided into 4 parts to help understand better.
Step 1: Go to the official site to download and install python using Google Chrome
or any other web browser. OR Click on the following link: https://www.python.org
Step 3: You can either select the Download Python for windows 3.7.4 button in
Yellow Color or you can scroll further down and click on download with respective
to their version. Here, we are downloading the most recent python version for
windows 3.7.4
Step 5: Here you see a different version of python along with the operating system.
• To download Windows 32-bit python, you can select any one from the three
options: Windows x86 embeddable zip file, Windows x86 executable installer or
Windows x86 web-based installer.
•To download Windows 64-bit python, you can select any one from the three
options: Windows x86-64 embeddable zip file, Windows x86-64 executable installer
or Windows x86-64 web-based installer.
Step 2: Before you click on Install Now, Make sure to put a tick on Add Python 3.7
to PATH.
With these above three steps on python installation, you have successfully and
correctly installed Python. Now is the time to verify the installation.
Note: The installation process might take a couple of minutes.
Step 3: Click on IDLE (Python 3.7 64-bit) and launch the program
Step 4: To go ahead with working in IDLE you must first save the file. Click on
File > Click on Save
Step 5: Name the file and save as type should be Python files. Click on SAVE. Here
I have named the files as Hey World.
Step 6: Now for e.g. enter print
using this we will extract HTML data from uploaded file and then display
content of that file
The purpose of testing i6s to discove.r errors. Testing is the process of trying to
discover every conceivable fault or weakness in a work product. It provides a way to
check the functionality of components, sub assemblies, assemblies and/or a finished
product It is the process of exercising software with the intent of ensuring that the
Software system meets its requirements and user expectations and does not fail in an
unacceptable manner. There are various types of test. Each test type addresses a
specific testing requirement.
Integration testing
Integration tests are designed to test integrated software
components to determine if they actually run as one program. Testing is event driven
and is more concerned with the basic outcome of screens or fields. Integration tests
demonstrate that although the components were individually satisfaction, as shown by
successfully unit testing, the combination of components is correct and consistent.
Integration testing is specifically aimed at exposing the problems that arise from the
combination of components.
A Forensics Activity Logger to Extract User Activity From Mobile Devices
41
Functional test
System Test
System testing ensures that the entire integrated software system meets
requirements. It tests a configuration to ensure known and predictable results. An
example of system testing is the configuration oriented system integration test.
System testing is based on process descriptions and flows, emphasizing pre-driven
process links and integration points.
Unit Testing
Features to be tested
Verify that the entries are of the correct format
No duplicate entries should be allowed
All links should take the user to the correct page.
The task of the integration test is to check that components or software applications,
e.g. components in a software system or – one step up – software applications at the
company level – interact without error.
Test Results: All the test cases mentioned above passed successfully. No defects
encountered.
Acceptance Testing
User Acceptance Testing is a critical phase of any project and requires significant
participation by the end user. It also ensures that the system meets the functional
requirements.
Test Results: All the test cases mentioned above passed successfully. No defects
encountered.
In above screen click on ‘Upload Mobile Data’ button to upload chat log file
In above screen chat log file is uploaded and now click on ‘Extract Data’ button to
extract content from file
In above screen in first line we can see file contains total 113 lines and we can see file
created and modified date and file size is 39.272 KB
Based on several tests performed with different brands of Android mobile devices; it
can be concluded that the activity registration tool is stable and complies with the
requested examinations
The tool automates and reduces the time of evidence analysis. Selecting the right tools
for the acquisition of evidence that serves as input to the application represents a
crucial piece of research; however, none of them possess the ability to acquire all the
information of a mobile device. Therefore, it is necessary to use several of them to
improve the desired result. Finally, the advantage of using Python programming
language, is that it allows to verify the source code and thus, validate that it does not
alter the digital evidence
The main advantage found while using this tool is that it reduces the time used on an
investigation and saves resources. This because each installed software returns large
volumes of information that must be analyzed step by step by the researcher in
charge. Thus, this tool avoids the manual use of more than one software to get all the
information that is required for the case
The evidence has to be carefully manipulated, because if the information is altered in
any way, this will not be valid for the investigation
8.1 FUTUREWORK
Finally, the presented study, gives a first view on the handling of digital evidence in
mobile devices with Android OS, this later can be developed for other operating
systems such as iOS and Windows Phone. For further work, it is necessary to increase
the interoperability to gather the information from third party solutions and propose
connectors and generic ways to extract evidence. Also, it is important to measure and
perform future improvements in certain non-functional characteristics of this tool
(e.g., efficiency, latency, usability).
9.REFERENCES
[1] H. K. S. Tse, K. P. Chow, and M. Y. K. Kwan, “The next generation for the
forensic extraction of electronic evidence from mobile telephones,” Int. Work. Syst.
Approaches Digit. Forensics Eng., SADFE, 2014.
[2] K. Barmpatsalou, D. Damopoulos, G. Kambourakis, and V. Katos, “A critical
review of 7 years of Mobile Device Forensics,” Digit. Investig., vol. 10, no. 4, pp.
323–349, 2013.
[3] A. Di Iorio, R. Sansevero, and M. Castellote, “La recuperación de la información
y la informática forense: Una propuesta de proceso unificado,” no. March, 2013.
[4] M. Taylor, G. Hughes, J. Haggerty, D. Gresty, and P. Almond, “Digital evidence
from mobile telephone applications,” Comput. Law Secur. Rev., vol. 28, no. 3, pp.
335–339, 2012.
[5] B. B. Carrier, “Open Source Digital Forensics Tools : The Legal Argument.,”
@Stake, no. October, p. 11, 2002.
[6] G. F. Limodio and P. A. Palazzi, “El uso de software abierto para el análisis de la
evidencia digital,” 2016.
[7] S. Yadav, K. Ahmad, and J. Shekhar, “Analysis of Digital Forensic Tools and
Investigation Process,” High Perform. Archit. Grid …, pp. 435–441, 2011.
[8] A. Shortall and M. A. H. Bin Azhar, “Forensic Acquisitions of WhatsApp Data on
Popular Mobile Platforms,” Proc. - 2015 6th Int. Conf. Emerg. Secur. Technol. EST
2015, pp. 13–17, 2016.
[9] T. B. Tajuddin and A. A. Manaf, “Forensic investigation and analysis on digital
evidence discovery through physical acquisition on smartphone,” 2015 World Congr.
Internet Secur. WorldCIS 2015, pp. 132–138, 2015.
[10] “Welcome to Python.org.” [Online]. Available: https://www.python.org/.
[Accessed: 21-Aug-2018].
[11] C. Anglano, M. Canonico, and M. Guazzone, “Forensic analysis of Telegram
Messenger on Android smartphones,” Digit. Investig., vol. 23, pp. 31–49, 2017.