Abstract
With the rapid development of technology, mobile devices have become an essential tool in terms of crime fighting and criminal investigation. However, many mobile forensics investigators face difficulties with the forensics investigation process in their domain. The difficulties are due to the heavy reliance of the forensics field on knowledge as a valuable resource, a resource that is scattered and widely dispersed. Wide dispersion of mobile forensics knowledge not only makes investigation difficult for new investigators, resulting in substantial waste of time, but also leads to confusion in concepts and terminologies of mobile forensics domain. This paper proposes a common concept for the mobile forensics domain based on the concepts extraction process. The proposed concepts contribute to simplifying the investigation process and enables investigation teams to capture and reuse specialized forensic knowledge, thereby reducing the conceptual and terminological confusion in the mobile forensics domain.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Jansen, W., Ayers, R.: Guidelines on Cell Phone Forensics. NIST Special Publication, vol. 800, p. 101 (2007)
Kristina Rose, L.O.R., Holder, E.H.: Electronic Crime Scene Investigation: An On-the-Scene Reference for First Responders (2009)
Ali, A., Razak, S.A., Othman, S.H., Mohammed, A.: Towards adapting metamodeling approach for the mobile forensics investigation domain. In: International Conference on Innovation in Science and Technology (lICIST), p. 5. UniversitiTeknologi Malaysia, Kuala Lumpur (2015)
Casey, E., Bann, M., Doyle, J.: Introduction to windows mobile forensics. Digit. Invest. 6, 136–146 (2010)
Yang, T.Y., Dehghantanha, A., Choo, K.-K.R., Muda, Z.: Windows instant messaging app forensics: Facebook and Skype as case studies. PLoS ONE 11, e0150300 (2016)
Lutui, P.R.: Digital forensic process model for mobile business devices: smart technologies. Auckland University of Technology (2015)
Hoog, A.: Android Forensics: Investigation. Analysis and Mobile Security for Google Android. Elsevier, Amsterdam (2011)
McMillan, J.E.R., Glisson, W.B., Bromby, M.: Investigating the increase in mobile phone evidence in criminal activities. In: 2013 46th Hawaii International Conference on System Sciences (HICSS), pp. 4900–4909 (2013)
Chang, W., Chung, P.: Knowledge management in cybercrime investigation–a case study of identifying cybercrime investigation knowledge in Taiwan. In: Intelligence and Security Informatics, pp. 8–17. Springer (2014)
Kessler, G., Mislan, R., Ayers, R., Bothers, S., Jansen, W.: NIST Mobile Forensics Workshop and Webcast (2014). http://www.nist.gov/forensics/mobile_forensics2.cfm
Beydoun, G., Low, G., Henderson-Sellers, B., Mouratidis, H., Gomez-Sanz, J.J., Pavon, J., et al.: FAML: a generic metamodel for MAS development. IEEE Trans. Softw. Eng. 35, 841–863 (2009)
Othman, S.H., Beydoun, G., Sugumaran, V.: Development and validation of a Disaster Management Metamodel (DMM). Inf. Process. Manag. 50, 235–271 (2014)
Caro, M.F., Josyula, D.P., Cox, M.T., Jiménez, J.A.: Design and validation of a metamodel for metacognition support in artificial intelligent systems. Biologically Inspired Cogn. Archit. 9, 82–104 (2014)
Velardi, P., Missikoff, M., Basili, R.: Identification of relevant terms to support the construction of domain ontologies. In: Proceedings of the Workshop on Human Language Technology and Knowledge Management, vol. 2001, p. 5 (2001)
Formica, A., Missikoff, M.: Concept similarity in SymOntos: an enterprise ontology management tool. Comput. J. 45, 583–594 (2002)
Ménard, P.A., Ratté, S.: Concept extraction from business documents for software engineering projects. Autom. Softw. Eng. 1–38 (2015)
Torii, M., Wagholikar, K., Liu, H.: Using machine learning for concept extraction on clinical documents from multiple data sources. J. Am. Med. Inform. Assoc. 18, 580–587 (2011)
Ayers, R., Brothers, S., Jansen, W.: Guidelines on Mobile Device Forensics. NIST Special Publication, vol. 800, p. 101 (2013)
Immanuel, F., Martini, B., Choo, K.-K.R.: Android cache taxonomy and forensic process. In: Trustcom/BigDataSE/ISPA 2015, pp. 1094–1101. IEEE (2015)
Beydoun, G., Low, G., Mouratidis, H., Henderson-Sellers, B.: A security-aware metamodel for multi-agent systems (MAS). Inf. Softw. Technol. 51, 832–845 (2009)
Murphy, C.A.: Developing process for mobile device forensics, Madison (2009)
Yu, X., Jiang, L.-H., Shu, H., Yin, Q., Liu, T.-M.: A process model for forensic analysis of Symbian smart phones. In: Advances in Software Engineering, pp. 86–93. Springer (2009)
Ramabhadran, A.: Forensic Investigation Process Model for Windows Mobile Devices, pp. 1–6. Tata Elxsi Security Group (2007)
Goel, A., Tyagi, A., Agarwal, A.: Smartphone forensic investigation process model. Int. J. Comput. Sci. Secur. (IJCSS) 6, 322–341 (2012)
Lin, I.-L., Chao, H.-C., Peng, S.-H.: Research of digital evidence forensics standard operating procedure with comparison and analysis based on smart phone. In: 2011 International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA), pp. 386–391 (2011)
Jane, M.M.: Enhanced mobile forensic process model for hand-held devices–a case of smart phones, Master (2014)
Husain, M.I., Baggili, I., Sridhar, R.: A simple cost-effective framework for iPhone forensic analysis. In: Digital Forensics and Cyber Crime, pp. 27–37. Springer (2011)
Mumba, E.R., Venter, H.S.: Mobile forensics using the harmonised digital forensic investigation process. In: 2014 Information Security for South Africa, pp. 1–10 (2014)
Marturana, F., Me, G., Berte, R., Tacconi, S.: A quantitative approach to triaging in mobile forensics. In: 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 582–588 (2011)
Dancer, F.C., Dampier, D.A., Jackson, J.M., Meghanathan, N.: A theoretical process model for smartphones. In: Advances in Computing and Information Technology, pp. 279–290. Springer (2013)
Martini, B., Do, Q., Choo, K.-K.R.: Conceptual evidence collection and analysis methodology for Android devices. arXiv preprint arXiv:1506.05527 (2015)
Rajendran, S., Gopalan, N.: Mobile Forensic Investigation (MFI) life cycle process for Digital Data Discovery (DDD). In: Proceedings of the International Conference on Soft Computing Systems, pp. 393–403 (2016)
Azfar, A., Choo, K.-K.R., Liu, L.: An Android social app forensics adversary model. In: 2016 49th Hawaii International Conference on System Sciences (HICSS), pp. 5597–5606 (2016)
Di Leom, M., D’Orazio, C.J., Deegan, G., Choo, K.-K.R.: Forensic collection and analysis of thumbnails in Android. In: Trustcom/BigDataSE/ISPA 2015. IEEE, pp. 1059–1066 (2015)
Ruuhwan, R., Riadi, I., Prayudi, Y.: Penerapan Integrated Digital Forensic Investigation Framework v2 (IDFIF) pada Proses Investigasi Smartphone. Jurnal Edukasi dan Penelitian Informatika (JEPIN) 2 (2016)
Parvez, S., Dehghantanha, A., Broujerdi, H.G.: Framework of digital forensics for the Samsung Star Series phone. In: 2011 3rd International Conference on Electronics Computer Technology (ICECT), pp. 264–267 (2011)
Sadiq, M., Iqbal, M., Naveed, K., Sajad, M.: Mobile devices forensics investigation: process models and comparison. ISJ Theoret. Appl. Sci. 1, 164–168 (2016)
Acknowledgment
The authors would like to thank the Ministry of Higher Education Malaysia (MOHE) and Universiti Teknologi Malaysia through FRGS Grant No. Q.J130000.2528.14H82. We also would like to thank CyberSecurity Malaysia, Associate Professor Jim Jones, Ms. Eman Badri and Mr. Greg Smith Trewmte for their evaluation this work.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Ali, A., Razak, S.A., Othman, S.H., Mohammed, A. (2018). Extraction of Common Concepts for the Mobile Forensics Domain. In: Saeed, F., Gazem, N., Patnaik, S., Saed Balaid, A., Mohammed, F. (eds) Recent Trends in Information and Communication Technology. IRICT 2017. Lecture Notes on Data Engineering and Communications Technologies, vol 5. Springer, Cham. https://doi.org/10.1007/978-3-319-59427-9_16
Download citation
DOI: https://doi.org/10.1007/978-3-319-59427-9_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-59426-2
Online ISBN: 978-3-319-59427-9
eBook Packages: EngineeringEngineering (R0)