Encrypted network traffic analysis of secure instant messaging application: A case study of signal messenger app

19Citations
Citations of this article
79Readers
Mendeley users who have this article in their library.

Abstract

Instant messaging applications (apps) have played a vital role in online interaction, es-pecially under COVID-19 lockdown protocols. Apps with security provisions are able to provide confidentiality through end-to-end encryption. Ill-intentioned individuals and groups use these security services to their advantage by using the apps for criminal, illicit, or fraudulent activities. During an investigation, the provision of end-to-end encryption in apps increases the complexity for digital forensics investigators. This study aims to provide a network forensic strategy to identify the potential artifacts from the encrypted network traffic of the prominent social messenger app Signal (on Android version 9). The analysis of the installed app was conducted over fully encrypted network traffic. By adopting the proposed strategy, the forensic investigator can easily detect encrypted traffic activities such as chatting, media messages, audio, and video calls by looking at the payload patterns. Furthermore, a detailed analysis of the trace files can help to create a list of chat servers and IP addresses of involved parties in the events. As a result, the proposed strategy significantly facilitates extraction of the app’s behavior from encrypted network traffic which can then be used as supportive evidence for forensic investigation.

Cite

CITATION STYLE

APA

Afzal, A., Hussain, M., Saleem, S., Shahzad, M. K., Ho, A. T. S., & Jung, K. H. (2021). Encrypted network traffic analysis of secure instant messaging application: A case study of signal messenger app. Applied Sciences (Switzerland), 11(17). https://doi.org/10.3390/app11177789

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free