{"id":"https://openalex.org/W2942683438","doi":"https://doi.org/10.23919/icact.2019.8701941","title":"Extracting Suspicious IP Addresses from WhatsApp Network Traffic in Cybercrime Investigations","display_name":"Extracting Suspicious IP Addresses from WhatsApp Network Traffic in Cybercrime Investigations","publication_year":2019,"publication_date":"2019-02-01","ids":{"openalex":"https://openalex.org/W2942683438","doi":"https://doi.org/10.23919/icact.2019.8701941","mag":"2942683438"},"language":"en","primary_location":{"id":"doi:10.23919/icact.2019.8701941","is_oa":false,"landing_page_url":"https://doi.org/10.23919/icact.2019.8701941","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038738213","display_name":"Da\u2010Yu Kao","orcid":null},"institutions":[{"id":"https://openalex.org/I143545923","display_name":"Central Police University","ror":"https://ror.org/03xms6995","country_code":"TW","type":"education","lineage":["https://openalex.org/I143545923"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Da-Yu KAO","raw_affiliation_strings":["Department of Information Management, Central Police University, Taoyuan, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Information Management, Central Police University, Taoyuan, Taiwan","institution_ids":["https://openalex.org/I143545923"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044004688","display_name":"En-Cih Chang","orcid":null},"institutions":[{"id":"https://openalex.org/I143545923","display_name":"Central Police University","ror":"https://ror.org/03xms6995","country_code":"TW","type":"education","lineage":["https://openalex.org/I143545923"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"En-Cih CHANG","raw_affiliation_strings":["Department of Information Management, Central Police University, Taoyuan, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Information Management, Central Police University, Taoyuan, Taiwan","institution_ids":["https://openalex.org/I143545923"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5061987526","display_name":"Fu-Ching Tsai","orcid":null},"institutions":[{"id":"https://openalex.org/I143545923","display_name":"Central Police University","ror":"https://ror.org/03xms6995","country_code":"TW","type":"education","lineage":["https://openalex.org/I143545923"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Fu-Ching TSAI","raw_affiliation_strings":["Department of Criminal Investigation, Central Police University, Taoyuan, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Criminal Investigation, Central Police University, Taoyuan, Taiwan","institution_ids":["https://openalex.org/I143545923"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5038738213"],"corresponding_institution_ids":["https://openalex.org/I143545923"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.04382776,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1108","last_page":"1115"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7613252401351929},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6908977031707764},{"id":"https://openalex.org/keywords/law-enforcement","display_name":"Law enforcement","score":0.6419200897216797},{"id":"https://openalex.org/keywords/criminal-investigation","display_name":"Criminal investigation","score":0.5942307710647583},{"id":"https://openalex.org/keywords/cybercrime","display_name":"Cybercrime","score":0.5803782939910889},{"id":"https://openalex.org/keywords/packet-analyzer","display_name":"Packet analyzer","score":0.5318287014961243},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.52869713306427},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5226145386695862},{"id":"https://openalex.org/keywords/sniffing","display_name":"Sniffing","score":0.4986419677734375},{"id":"https://openalex.org/keywords/network-forensics","display_name":"Network forensics","score":0.4977588951587677},{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.47947725653648376},{"id":"https://openalex.org/keywords/table","display_name":"Table (database)","score":0.4660668671131134},{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.42631155252456665},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3782094717025757},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.35769614577293396},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.14574980735778809},{"id":"https://openalex.org/keywords/criminology","display_name":"Criminology","score":0.09392651915550232}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7613252401351929},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6908977031707764},{"id":"https://openalex.org/C2780262971","wikidata":"https://www.wikidata.org/wiki/Q44554","display_name":"Law enforcement","level":2,"score":0.6419200897216797},{"id":"https://openalex.org/C117660856","wikidata":"https://www.wikidata.org/wiki/Q1964968","display_name":"Criminal investigation","level":2,"score":0.5942307710647583},{"id":"https://openalex.org/C2779390178","wikidata":"https://www.wikidata.org/wiki/Q29137","display_name":"Cybercrime","level":3,"score":0.5803782939910889},{"id":"https://openalex.org/C95362637","wikidata":"https://www.wikidata.org/wiki/Q54366","display_name":"Packet analyzer","level":3,"score":0.5318287014961243},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.52869713306427},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5226145386695862},{"id":"https://openalex.org/C131722271","wikidata":"https://www.wikidata.org/wiki/Q7547759","display_name":"Sniffing","level":2,"score":0.4986419677734375},{"id":"https://openalex.org/C50747538","wikidata":"https://www.wikidata.org/wiki/Q7001032","display_name":"Network forensics","level":3,"score":0.4977588951587677},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.47947725653648376},{"id":"https://openalex.org/C45235069","wikidata":"https://www.wikidata.org/wiki/Q278425","display_name":"Table (database)","level":2,"score":0.4660668671131134},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.42631155252456665},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3782094717025757},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.35769614577293396},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.14574980735778809},{"id":"https://openalex.org/C73484699","wikidata":"https://www.wikidata.org/wiki/Q161733","display_name":"Criminology","level":1,"score":0.09392651915550232},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C169760540","wikidata":"https://www.wikidata.org/wiki/Q207011","display_name":"Neuroscience","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/icact.2019.8701941","is_oa":false,"landing_page_url":"https://doi.org/10.23919/icact.2019.8701941","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.8100000023841858}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W36102565","https://openalex.org/W2417711523","https://openalex.org/W2492776233","https://openalex.org/W2497213239","https://openalex.org/W2557842949","https://openalex.org/W2600171532","https://openalex.org/W2748993045","https://openalex.org/W4234416465","https://openalex.org/W4236740106","https://openalex.org/W4241235601"],"related_works":["https://openalex.org/W4284977705","https://openalex.org/W2185605233","https://openalex.org/W2370305774","https://openalex.org/W3196589513","https://openalex.org/W3187051416","https://openalex.org/W3027524240","https://openalex.org/W2884338576","https://openalex.org/W287401843","https://openalex.org/W3008603700","https://openalex.org/W2519215548"],"abstract_inverted_index":{"Sniffers":[0],"are":[1,34,44,66,89],"among":[2],"the":[3,84,94,111,132,167,194],"commonest":[4],"approaches":[5],"for":[6,125],"capturing":[7],"network":[8,69,119,154],"traffic":[9],"activities":[10],"and":[11,40,71,141,156,174,187],"collecting":[12],"digital":[13],"evidences":[14],"in":[15,161,180],"cybercrime":[16],"investigations.":[17],"The":[18,145,163],"ubiquity":[19],"of":[20,42,118,147,171,196],"instant":[21],"messaging":[22],"(IM)":[23],"apps":[24,80],"on":[25,59,93,139,152],"smartphones":[26],"has":[27],"provided":[28],"criminals":[29],"with":[30],"communication":[31,113,183],"channels":[32],"that":[33,109,130],"difficult":[35,82],"to":[36,190],"decode.":[37],"Moreover,":[38],"investigators":[39],"analysts":[41],"cybercrimes":[43],"encountering":[45],"increasingly":[46],"large":[47],"datasets.":[48],"To":[49],"combat":[50],"criminal":[51,182],"activity,":[52],"law":[53],"enforcement":[54],"agencies":[55],"(LEAs)":[56],"often":[57],"rely":[58],"call-record":[60,198],"analysis.":[61,199],"In":[62],"this":[63,148],"paper,":[64],"cybercriminals":[65,186],"investigated":[67],"by":[68,104],"forensics":[70,155],"sniffing":[72,126],"techniques.":[73],"Retrieving":[74],"valuable":[75],"information":[76],"from":[77,115,135],"specific":[78],"IM":[79],"is":[81,100,128,150],"because":[83],"criminal's":[85,98],"IP":[86],"address":[87],"records":[88],"not":[90],"easily":[91],"recognisable":[92],"Internet.":[95],"Here,":[96],"a":[97,105,142,157],"identity":[99],"located":[101],"more":[102],"effectively":[103],"packet":[106],"filter":[107],"framework":[108],"isolates":[110],"WhatsApp":[112],"features":[114],"huge":[116],"collections":[117],"packets.":[120],"A":[121],"rule":[122],"extraction":[123],"method":[124],"packets":[127],"proposed":[129],"retrieves":[131],"relevant":[133],"attributes":[134],"high-dimensional":[136],"analysis":[137],"based":[138],"geolocation":[140],"pivot":[143],"table.":[144],"utility":[146],"methodology":[149,164],"illustrated":[151],"real-time":[153],"lawful":[158],"interception":[159],"system":[160],"Taiwan.":[162],"also":[165],"meets":[166],"ISO/IEC":[168],"27043:2015":[169],"standards":[170],"fear,":[172],"uncertainty,":[173],"doubt":[175],"avoidance.":[176],"Besides":[177],"supporting":[178],"LEAs":[179],"discovering":[181],"payloads,":[184],"prosecuting":[185],"bringing":[188],"them":[189],"justice,":[191],"it":[192],"improves":[193],"effectiveness":[195],"modern":[197]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
