Skip to main content

Network Forensics of WhatsApp: A Practical Approach Based on Side-Channel Analysis

  • Conference paper
  • First Online:
Advanced Information Networking and Applications (AINA 2020)

Abstract

Nowadays, billions of people use Instant Messaging (IM) applications (called apps for short) to communicate, e.g., WhatsApp, Telegram, etc. These applications have a positive impact in social relations, allowing a real-time communication that is simple and immediate. In this way, users can be available everywhere and at any time. In the state of the art, the most popular instant messaging application in the world is definitely WhatsApp. Given the multiple operational scenarios where they are involved in, to prevent the violation of communication by malicious users, IM applications typically ensure security in terms of confidentiality, integrity and availability. Indeed, in the WhatsApp application as well as in the other IM applications, the communication between the various entities takes place in a protected manner. Therefore, it is practically impossible to break the protection of messages exchanged by such applications and find the content of such messages. On the other hand, due to their security properties, those applications are widely used also by cybercriminals. In this paper we focus on the WhatsApp application and propose an approach based on the side-channel analysis to detect some actions performed by WhatsApp users, such as the starting or rejecting of a call, the joining or leaving from/to a chat group, etc. More precisely, the approach we propose is based on the analysis of some characteristics and patterns present in the traffic generated during typical WhatsApp sessions. The proposed approach does not require particular tools or backgrounds to be completed, but only simple packet capture tools, such as WireShark. Furthermore, we point out that our approach can be very useful in the context of forensic analysis, since it complements all the other tools and methodologies typically used in the state of the art to deal with a cybercrime. Finally, the proposed approach has been tested in real usage scenarios, both as regards the communication between two (unicast) and more endpoints (multicast).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. How voice and video call works? https://blog.mindorks.com/how-voice-and-video-call-works-b0896aa0a630

  2. Ranked: The world’s most downloaded apps - visual capitalist. https://www.visualcapitalist.com/ranked-most-downloaded-apps/

  3. Statistics on cyber-terrorism. http://csciwww.etsu.edu/gotterbarn/stdntppr/stats.htm

  4. Wireshark. https://www.wireshark.org/

  5. Cyberbullying facts and statistics for 2016–2019 (2019). https://www.comparitech.com/internet-providers/cyberbullying-statistics

  6. Anglano, C.: Forensic analysis of WhatsApp Messenger on Android smartphones. Digit. Invest. 11(3), 201–213 (2014)

    Article  Google Scholar 

  7. Carpentieri, B., Castiglione, A., De Santis, A., Palmieri, F., Pizzolante, R.: Compression-based steganography. Concurr. Comput. Pract. Exp. e5322 (2019)

    Google Scholar 

  8. Carpentieri, B., Castiglione, A., De Santis, A., Palmieri, F., Pizzolante, R., Xing, X.: Securing visual search queries in ubiquitous scenarios empowered by smart personal devices. Inf. Sci. 508, 393–404 (2020)

    Article  Google Scholar 

  9. Castiglione, A., Pizzolante, R., Palmieri, F., De Santis, A., Carpentieri, B., Castiglione, A.: Secure and reliable data communication in developing regions and rural areas. Pervasive Mob. Comput. 24, 117–128 (2015)

    Article  Google Scholar 

  10. Conti, M., Li, Q.Q., Maragno, A., Spolaor, R.: The dark side (-channel) of mobile devices: a survey on network traffic analysis. IEEE Commun. Surv. Tutor. 20(4), 2658–2713 (2018)

    Article  Google Scholar 

  11. Gordon, S., Ford, R.: On the definition and classification of cybercrime. J. Comput. Virol. 2(1), 13–20 (2006)

    Article  Google Scholar 

  12. Jahankhani, H., Al-Nemrat, A., Hosseinian-Far, A.: Cybercrime classification and characteristics. In: Akhgar, B., Staniforth, A., Bosco, F. (eds.) Cyber Crime and Cyber Terrorism Investigator’s Handbook, pp. 149–164. Elsevier, Amsterdam (2014)

    Chapter  Google Scholar 

  13. Janczukowicz, E.C.: Qos management for WebRTC: loose coupling strategies. Ph.D. thesis, Ecole nationale supérieure Mines-Télécom Atlantique (2017)

    Google Scholar 

  14. Jong, C.H.: Private communication detection via side-channel attacks. Ph.D. thesis, University of Maryland, College Park (2012)

    Google Scholar 

  15. Kadloor, S., Gong, X., Kiyavash, N., Tezcan, T., Borisov, N.: Low-cost side channel remote traffic analysis attack in packet networks. In: 2010 IEEE International Conference on Communications, pp. 1–5. IEEE (2010)

    Google Scholar 

  16. Lescisin, M., Mahmoud, Q.: Tools for active and passive network side-channel detection for web applications. In: 12th USENIX Workshop on Offensive Technologies (WOOT 2018) (2018)

    Google Scholar 

  17. Lone, A.H., Badroo, F.A., Chudhary, K.R., Khalique, A.: Implementation of forensic analysis procedures for WhatsApp and Viber Android applications. Int. J. Comput. Appl. 128(12), 26–33 (2015)

    Google Scholar 

  18. Orebaugh, A., Allnutt, J.: Data mining instant messaging communications to perform author identification for cybercrime investigations. In: International Conference on Digital Forensics and Cyber Crime, pp. 99–110. Springer (2009)

    Google Scholar 

  19. Rosner, N., Kadron, I.B., Bang, L., Bultan, T.: Profit: detecting and quantifying side channels in networked applications. In: NDSS (2019)

    Google Scholar 

  20. Tsai, F.C., Chang, E.C., Kao, D.Y.: WhatsApp network forensics: discovering the communication payloads behind cybercriminals. In: 2018 20th International Conference on Advanced Communication Technology (ICACT), pp. 679–684. IEEE (2018)

    Google Scholar 

  21. Walnycky, D., Baggili, I., Marrington, A., Moore, J., Breitinger, F.: Network and device forensic analysis of Android social-messaging applications. Digit. Invest. 14, S77–S84 (2015)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Raffaele Pizzolante .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

De Luca Fiscone, G., Pizzolante, R., Castiglione, A., Palmieri, F. (2020). Network Forensics of WhatsApp: A Practical Approach Based on Side-Channel Analysis. In: Barolli, L., Amato, F., Moscato, F., Enokido, T., Takizawa, M. (eds) Advanced Information Networking and Applications. AINA 2020. Advances in Intelligent Systems and Computing, vol 1151. Springer, Cham. https://doi.org/10.1007/978-3-030-44041-1_69

Download citation

Publish with us

Policies and ethics