Comparative Evaluation of Mobile Forensic Tools

  • J. K. Alhassan
  • R. T. Oguntoye
  • Sanjay Misra
  • Adewole Adewumi
  • Rytis Maskeliūnas
  • Robertas Damaševičius
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 721)

Abstract

The rapid rise in the technology today has brought to limelight mobile devices which are now being used as a tool to commit crime. Therefore, proper steps need to be ensured for Confidentiality, Integrity, Authenticity and legal acquisition of any form of digital evidence from the mobile devices. This study evaluates some mobile forensic tools that were developed mainly for mobile devices memory and SIM cards. An experiment was designed with five android phones with different Operating System. Four tools were used to find out the capability and efficiency of the tools when used on the sampled phones. This would help the forensic investigator to know the type of tools that will be suitable for each phone to be investigated for acquiring digital evidence. The evaluation result showed that AccessData FTK imager and Paraben device seizure performs better than Encase and Mobiledit. The experimental result shows that, Encase could detect the unallocated space on the mobile deice but could retrieve an deleted data.

Keywords

Mobile Mobile phone Smartphone Forensics Digital investigation Digital evidence 

Notes

Acknowledgements

We acknowledge the support and sponsorship provided by Covenant University through the Centre for Research, Innovation and Discovery (CUCRID).

References

  1. 1.
    Azfar, A., Choo, K.K., Liu, L.: International Conference on Multimedia Tools Applcation. Springer (2016)Google Scholar
  2. 2.
    Lin, C., Peng, C.: Research of digital evidence forensics standard operating procedure with comparison and analysis based on smart phone. In: Broadband and Wireless Computing Communication and Application (BWCCA), pp. 386–391. IEEE Xplore, Taiwan (2011)Google Scholar
  3. 3.
    Alghafi, J., Martin, M.: Forensic data acquistion methods for mobile phones. 2012 International Conference on Internet Technology and Secured Transactions, pp. 265–269. IEEE, United Arab. Emirates (2012)Google Scholar
  4. 4.
    Chandran, A.: Investigating and analysing malicious events in Android application. Int. J. Eng. Sci. Res. Technol., 1462–1467 (2013)Google Scholar
  5. 5.
    Ntantogian, A., Marinakis, X.: Discovering authentication credentials in volatile memory android mobile devices. Mob. Forensics, 110–117 (2013)Google Scholar
  6. 6.
    Farjamfar, A., Mahmod, U.: A review on mobile device’s digital forensic process models. Res. J. Appl. Sci. Eng. Technol. 8(3), 358–366 (2014)Google Scholar
  7. 7.
    Lai, Y., Lin, A.: Design and implementation of mobile forensic tool for android smart phone through cloud computing. In: Design and Implementation of Mobile Forensic Tool, pp. 196–203 (2011)Google Scholar
  8. 8.
    Kamble, J.: Digital forensic investigation procedure. Int. J. Adv. Res. Sci. Eng. IJARSE 4, 157–168 (2015)Google Scholar
  9. 9.
    Aniar, R.R., Anshul, K.K., Leesha, A.: Anroid phone forensics: tools and techniques. In: International Conference on Computing, Communication and Automation, ICCCA 2016 (2016)Google Scholar
  10. 10.
    Padmanabhan, R., Lobo, K., Ghelani, M., Sujan, D., Mahesh, S.: Comparative analysis of commercial and open source mobile device forensic tools. IEEE (2016)Google Scholar
  11. 11.
    Osho, O., Ohida, A.: Comparative evaluation of mobile forensic tools. I. J. Inf. Technol. Comput. Sci., pp. 74–83 (2016)Google Scholar
  12. 12.
    Yusof, M., Abdullah, D.: Performance measurement for mobile forensic data acquisition in firefox OS. Int. J. Cyber-Secur. Digital Forensics (IJCSDF), 130–140 (2014)Google Scholar
  13. 13.
    Kubi, S., Saleem, P.: Evaluation of some tools for extracting e-evidence from mobile devices. I. J. Inf. Technol. Comput. Sci., 64–73 (2011)Google Scholar
  14. 14.
    Mohtasebi, A., Dehghantanha, G., Broujerdi, H.: Smartphone foresics: a case study with Nokia E5-00 mobile phone. Int. J. Digital Inf. Wireless Commun. 1(3), 651–655 (2011)Google Scholar
  15. 15.
    Al Mutawa, N., Baggili, I., Marrington, A.: Forensic analysis of social networking applications on mobile devices. Digital Invest. 9, S24–S33 (2012)CrossRefGoogle Scholar
  16. 16.
    Ahmed, R., Dharaskar, R.V.: Mobile forensics: an overview, tools, future trends and challenges from law enforcement perspective. In: 6th International Conference on E-Governance, ICEG, Emerging Technologies in E-Government, M-Government, pp. 312–323 (2008)Google Scholar

Copyright information

© Springer International Publishing AG 2018

Authors and Affiliations

  • J. K. Alhassan
    • 1
  • R. T. Oguntoye
    • 1
  • Sanjay Misra
    • 2
  • Adewole Adewumi
    • 2
  • Rytis Maskeliūnas
    • 3
  • Robertas Damaševičius
    • 3
  1. 1.Federal University of TechnologyMinnaNigeria
  2. 2.Covenant UniversityOttaNigeria
  3. 3.Kaunas University of TechnologyKaunasLithuania

Personalised recommendations