CFP last date
22 July 2024
Call for Paper
August Edition
IJCA solicits high quality original research papers for the upcoming August edition of the journal. The last date of research paper submission is 22 July 2024

Submit your paper
Know more
Reseach Article

Analysis of File Component Requirements Using Digital Forensic XML on Social Media TikTok Applications

by Muhammad Romi Nasution, Mirajul Rifqi, Urfi Utami, Wirda Jannatul Jannah
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 185 - Number 49
Year of Publication: 2023
Authors: Muhammad Romi Nasution, Mirajul Rifqi, Urfi Utami, Wirda Jannatul Jannah
10.5120/ijca2023923327

Muhammad Romi Nasution, Mirajul Rifqi, Urfi Utami, Wirda Jannatul Jannah . Analysis of File Component Requirements Using Digital Forensic XML on Social Media TikTok Applications. International Journal of Computer Applications. 185, 49 ( Dec 2023), 45-52. DOI=10.5120/ijca2023923327

@article{ 10.5120/ijca2023923327,
author = { Muhammad Romi Nasution, Mirajul Rifqi, Urfi Utami, Wirda Jannatul Jannah },
title = { Analysis of File Component Requirements Using Digital Forensic XML on Social Media TikTok Applications },
journal = { International Journal of Computer Applications },
issue_date = { Dec 2023 },
volume = { 185 },
number = { 49 },
month = { Dec },
year = { 2023 },
issn = { 0975-8887 },
pages = { 45-52 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume185/number49/33025-2023923327/ },
doi = { 10.5120/ijca2023923327 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:29:15.352647+05:30
%A Muhammad Romi Nasution
%A Mirajul Rifqi
%A Urfi Utami
%A Wirda Jannatul Jannah
%T Analysis of File Component Requirements Using Digital Forensic XML on Social Media TikTok Applications
%J International Journal of Computer Applications
%@ 0975-8887
%V 185
%N 49
%P 45-52
%D 2023
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Every smartphone application definitely leaves traces, especially XML file artifacts, for example the TikTok application has XML artifacts from records of activities carried out in the application. Starting from the beginning of the application being installed, the version of the application used, the time the application was accessed, videos or photos uploaded, newly registered or previously existing accounts and so on. This research found more than 150 XML files in the TikTok application using 3 accounts. However, not all of them are user activities, in general the activities carried out by users are recorded in the aweme_user file, even though the account has been deleted, it still leaves traces in the file. These activities are entering the application and recording video uploads. The file classification required for analysis in the context of this research is divided into 3 parts. These include very needed, less needed and not needed. Analysis is carried out especially on really needed parts such as the aweme_user file, version, search and others. Those that are less needed will still be analyzed to support the XML data contents of the very needed category files. After carrying out the analysis, it can be determined which files are isolated for further study. The data content of these files will be seen to see whether they contain important information about the perpetrator's activities. In this research, dozens of XML files can be identified.

References
  1. N. N. Isachenko, “The role of information and informational and communication technologies in modern society,” Utopia y Praxis Latinoamericana, vol. 23, no. 82, pp. 361–367, Jul. 2018, doi: 10.5281/zenodo.1512122.
  2. Ming-Li Hsieh and K. W. Shun-Yung, “Routine activities in a virtual space: A Taiwanese case of an ATM hacking spree,” International Journal of Cyber Criminology, vol. 11, no. 1, pp. 110–127, 2018, doi: 10.5281/zenodo.495776.
  3. A. Oliveira, T. Kohwalter, M. Kalinowski, L. Murta, and V. Braganholo, “XChange: A semantic diff approach for XML documents,” Inf Syst, vol. 94, no. August, 2020, doi: 10.1016/j.is.2020.101610.
  4. Y. H. Wang, T. J. Gu, and S. Y. Wang, “Causes and Characteristics of Short Video Platform Internet Community Taking the TikTok Short Video Application as an Example,” 2019 IEEE International Conference on Consumer Electronics - Taiwan, ICCE-TW 2019, pp. 4–5, 2019, doi: 10.1109/ICCE-TW46550.2019.8992021.
  5. A. Fiallos, C. Fiallos, and S. Figueroa, “Tiktok and education: Discovering knowledge through learning videos,” in 2021 8th International Conference on eDemocracy and eGovernment, ICEDEG 2021, Institute of Electrical and Electronics Engineers Inc., Jul. 2021, pp. 172–176. doi: 10.1109/ICEDEG52154.2021.9530988.
  6. Debra Aho Williamson, “TikTok Will Be the Top Social App in Daily Minutes in 2025,” eMarketer.
  7. N. Hoang Khoa, P. The Duy, H. Do Hoang, D. Thi Thu Hien, and V. H. Pham, “Forensic analysis of TikTok application to seek digital artifacts on Android smartphone,” Proceedings - 2020 RIVF International Conference on Computing and Communication Technologies, RIVF 2020, 2020, doi: 10.1109/RIVF48685.2020.9140739.
  8. P. Domingues, R. Nogueira, J. C. Francisco, and M. Frade, “Post-mortem digital forensic artifacts of TikTok Android App,” ACM International Conference Proceeding Series, no. August, 2020, doi: 10.1145/3407023.3409203.
  9. S. Garfinkel, “Digital forensics XML and the DFXML toolset,” Digit Investig, vol. 8, no. 3–4, pp. 161–174, 2012, doi: 10.1016/j.diin.2011.11.002.
  10. S. L. Garfinkel, “Digital forensics research: The next 10 years,” DFRWS 2010 Annual Conference, vol. 7, 2010.
  11. G. Wawrzyniak and I. El Fray, “New XML Signature Scheme That is Resistant to Some Attacks,” IEEE Access, vol. 8, pp. 35815–35831, 2020, doi: 10.1109/ACCESS.2020.2975034.
  12. Q. Hoang, T. Van Nguyen, H. L. M. Vo, and T. T. N. Thuy, “A method for transforming TimeER model-based specification into temporal XML,” Advances in Intelligent Systems and Computing, vol. 453, pp. 59–73, 2016, doi: 10.1007/978-3-319-38884-7_5.
  13. Z. Brahmia, H. Hamrouni, and R. Bouaziz, “XML data manipulation in conventional and temporal XML databases: A survey,” Comput Sci Rev, vol. 36, p. 100231, 2020, doi: 10.1016/j.cosrev.2020.100231.
  14. M. Romi Nasution, “Analisis DFXML Untuk Mendukung Identifikasi dan Pengelolaan Artefak Digital Pada Aplikasi TikTok,” 2022.
  15. M. R. Nasution, Y. Y. Prayudi, and A. Luthfi, “Investigating Social Media User Activity on Android Smartphone,” 2022.
  16. A. Nelson, A. Chassanoff, and A. Holloway, “Navigating Unmountable Media with the Digital Forensics XML File System,” Int J Digit Curation, vol. 12, no. 2, pp. 309–326, 2017, doi: 10.2218/ijdc.v12i2.581.
  17. M. Hacherouf, S. N. Bahloul, and C. Cruz, “Transforming XML documents to OWL ontologies: A survey,” J Inf Sci, vol. 41, no. 2, pp. 242–259, 2015, doi: 10.1177/0165551514565972.
Index Terms

Computer Science
Information Sciences

Keywords

Analisis Social Media Aplikasi jejak digital XML Digital Forensic.