Araştırma Makalesi
BibTex RIS Kaynak Göster

Android İşletim Sistemine Sahip Cihazdan Elde Edilen Logcat Kayıtlarının Adli Bilişim Açısından Değerlendirilmesi

Yıl 2025, Cilt: 7 Sayı: 2, 192 - 213, 31.12.2025
https://doi.org/10.59940/jismar.1786182

Öz

Günümüzde mobil cihazlar, çoklu bağlantı özellikleri, yoğun kullanım oranları ve barındırdıkları zengin veri çeşitliliği nedeniyle adli bilişim süreçlerinde önemli bir delil kaynağı haline gelmiştir. Android işletim sistemlerinde yer alan Logcat, cihazın sistem, uygulama ve kullanıcı aktivitelerini tutan bir kayıt mekanizmasıdır. Bu kayıtlar, cihaz üzerinde hangi işlemlerin ne zaman ve nasıl gerçekleştiği bilgisini vererek, olayların dijital izlerinin tespit edilmesinde kritik bir rol oynar. Araştırma, Android işletim sistemine sahip bir OPPO A5S cihazından elde edilen Logcat kayıtlarının adli bilişim açısından analizini konu almaktadır. Araştırmacı tarafından oluşturulan senaryolar sonucunda elde edilen loglar üzerinden kullanıcının Wi-Fi bağlantıları, internet tarayıcı geçmişi, Google Haritalar sorgulamaları ve kamera servisleriyle ilişkili faaliyetler incelenmiştir. Bulgular, Logcat çıktılarında doğrudan parola veya desen kilidi gibi kişisel veriler yer almasa da, gerçekleştirilen tüm eylemlerin doğru şekilde tespit edilebildiğini göstermektedir. Sonuç olarak, Logcat verileri yalnızca teknik kayıtlar sunmakla kalmayıp; dijital olayların kronolojik sıralamasını oluşturma, kullanıcı davranışlarını anlamlandırma ve beyanların doğruluğunu test etme açısından da adli bilişim uzmanlarına güçlü bir destek sağlamaktadır. Bu yönüyle Logcat, mobil cihaz incelemelerinde etkili ve tamamlayıcı bir adli bilişim aracı olarak değerlendirilebilir.

Kaynakça

  • [1] Worldometers, "World population projections," Worldometers, Jan. 2, 2025. [Online]. Available: https://www.worldometers.info/worldpopulation/world-population-projections/. Accessed: Aug. 25, 2025.
  • [2] StatCounter, "Android version market share worldwide," [Online]. Available: https://gs.statcounter.com/android-version-market-share/mobile-tablet/worldwide. Accessed: Aug. 22, 2025.
  • [3] StatCounter, "Android version market share in Turkey," [Online]. Available: https://gs.statcounter.com/android-version-market-share/mobile-tablet/turkey. Accessed: Aug. 22, 2025.
  • [4] Adobe, ".LOG Format – What Is .LOG and How to Open It," Adobe Acrobat Resources, 2025. [Online]. Available: https://www.adobe.com/uk/acrobat/resources/document-files/text-files/log.html. Accessed: Sep. 13, 2025.
  • [5] S. Allen, Importance of Understanding Logs from an Information Security Standpoint, Tech. Rep., 2001, p. 241.
  • [6] H. Çakır and M. S. Kılıç, Eds., Güncel Tehdit: Siber Suçlar. Ankara, Turkey: Seçkin, 2014, pp. 241, 251.
  • [7] Android Developers, "Günlükleri Logcat ile görüntüleme," Android Studio. [Online]. Available: https://developer.android.com/studio/debug/logcat?hl=tr. Accessed: Sep. 3, 2025.
  • [8] Y. Liu, X. Zhang, S. He, H. Zhang, L. Li, Y. Kang, and D. Zhang, "Uniparser: A unified log parser for heterogeneous log data," in Proc. ACM Web Conf., Apr. 2022, pp. 1893–1901.
  • [9] H. Çakır and M. S. Kılıç, Adli Bilişim ve Elektronik Deliller. Ankara, Turkey: Seçkin Yayıncılık, 2014, p. 275.
  • [10] A. Utku, "Güvenlik duvarlarındaki ağ trafiği log kayıtlarının analizinde açıklanabilir yapay zekâ ve derin sinir ağlarının kullanımı: Karşılaştırmalı bir analiz," Erciyes Üniversitesi Fen Bilimleri Enstitüsü Fen Bilimleri Dergisi, vol. 40, no. 3, pp. 587–608, 2024.
  • [11] N. T. Nguyen, T. T. Pham, T. X. Dang, M.-S. Dao, D.-T. Dang-Nguyen, C. Gurrin, and B. T. Nguyen, "Malware detection using system logs," in Proc. 2020 Intelligent Cross-Data Analysis and Retrieval Workshop (ICDAR ’20), Dublin, Ireland, Oct. 2020, doi: 10.1145/3379174.3392318.
  • [12] S. Karagiannis, L. L. Ribeiro, C. Ntantogian, E. Magkos, and L. M. Campos, "Chidroid: A mobile Android application for log collection and security analysis in healthcare and IoMT," Appl. Sci., vol. 13, no. 5, Art. 3061, Feb. 27, 2023, doi: 10.3390/app13053061.
  • [13]G. Horsman and L. R. Conniss, “Investigating evidence of mobile phone usage by drivers in road traffic accidents,” Digital Investigation, vol. 12, no. S1, pp. S30–S37, 2015. [Online]. Available:https://dfrws.org/sites/default/files/session-files/2015_EU_paperinvestigating_evidence_of_mobile_phone_usage_by_drivers_in_road_traffic_accidents.pdf [14] Y. Shin, S. Kim, W. Jo, and T. Shon, "Digital forensic case studies for in-vehicle infotainment systems using Android Auto and Apple CarPlay," Sensors, vol. 22, no. 19, p. 7196, 2022.
  • [15] J. Bellizzi, M. Vella, C. Colombo, and J. C. Hernandez-Castro, "Using infrastructure-based agents to enhance forensic logging of third-party applications," in Proc. ICISSP, Feb. 2023, pp. 389–401.
  • [16] P. C. Patel, P. M. Bhatt, U. Parmar, and K. Bhavsar, "A forensic perspective on the use of event viewer for detecting malicious activities and ensuring system integrity," ShodhKosh: J. Visual Perform. Arts, vol. 5, no. 1, pp. 3250–3256, 2024, doi: 10.29121/shodhkosh.v5.i1.2024.5975.
  • [17] J. Jung, S. Han, M. Park, and S. J. Cho, “Automotive digital forensics through data and log analysis of vehicle diagnosis Android apps,” Forensic Science International: Digital Investigation, vol. 49, 301752,2024.[Online].Available:https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4579305
  • [18] J. H. Lee, S. H. Lim, B. Hyeon, O. Y. Jeon, J. J. Park, and N. I. Park, "Tesla log data analysis approach from a digital forensics perspective," World Electr. Veh. J., vol. 15, no. 12, p. 590, 2024.
  • [19] J. A. Bessa, R. Miranda Filho, G. Souza, R. Barreto, and R. de Freitas, "Log parsers' performance on raw logs from Android devices," J. Internet Serv. Appl., vol. 16, no. 1, pp. 105–116, 2025.
  • [20] J. Olegård, S. Axelsson, and Y. Li, "When is logging sufficient?—Tracking event causality for improved forensic analysis and correlation," Forensic Sci. Int.: Digit. Invest., vol. 52, p. 301877, 2025, doi: 10.1016/j.fsidi.2025.301877.
  • [21] S. Pavani, L. S. Naga, N. Manoja, and E. Karthik, "An integrated forensic logger for Android devices: Multisource user activity reconstruction," Int. Res. J. Mod. Eng. Technol. Sci., vol. 7, no. 6, pp. 5244–5250, Jun. 2025, doi: 10.56726/IRJMETS80449.
  • [22] S. Jadhav, K. Kondhare, S. Mulik, J. Panchal, and M. Kale, "Implementation and evaluation of an automated Android log extraction tool for digital forensics," Int. J. Adv. Res. Sci. Commun. Technol., vol. 5, no. 5, p. 213, Jun. 2025, doi: 10.48175/IJARSCT-27730.
  • [23] S. Cho, H. Seong, H. Kang, S. J. Cho, and B. Kang, “Forensic investigation of vehicle-related data in Android phones connected to In-Vehicle Infotainment systems,” Computer Networks, 111370, 2025.[Online].Available:https://eprints.soton.ac.uk/503333/
  • [24] C. C. C. Cheng, C. Shi, N. Z. Gong, and Y. Guan, "Logextractor: Extracting digital evidence from Android log messages via string and taint analysis," Forensic Sci. Int.: Digit. Invest., vol. 37, p. 301193, 2021, doi: 10.1016/j.fsidi.2021.301193

Evaluation of Logcat Records Extracted from Android-Based Devices in Terms of Digital Forensics

Yıl 2025, Cilt: 7 Sayı: 2, 192 - 213, 31.12.2025
https://doi.org/10.59940/jismar.1786182

Öz

Today, mobile devices have become an important source of evidence in forensic investigations due to their multi-connectivity features, high usage rates, and the rich variety of data they contain. In Android operating systems, Logcat is a logging mechanism that records system, application, and user activities. These records provide information about what operations occurred on the device, when, and how, thus playing a critical role in identifying the digital traces of events. This study focuses on the forensic analysis of Logcat records obtained from an Android-based OPPO A5S device. Based on scenarios created by the researcher, the logs were examined to analyze user activities such as Wi-Fi connections, web browsing history, Google Maps queries, and camera-related actions. The findings indicate that although Logcat outputs do not contain personal data such as passwords or pattern locks, all actions performed during the scenarios were accurately detected.In conclusion, Logcat data not only provide technical records but also offer strong support to forensic experts in reconstructing the chronological sequence of digital events, interpreting user behavior, and verifying the accuracy of statements. In this respect, Logcat can be considered an effective and complementary digital forensic tool in mobile device examinations.

Kaynakça

  • [1] Worldometers, "World population projections," Worldometers, Jan. 2, 2025. [Online]. Available: https://www.worldometers.info/worldpopulation/world-population-projections/. Accessed: Aug. 25, 2025.
  • [2] StatCounter, "Android version market share worldwide," [Online]. Available: https://gs.statcounter.com/android-version-market-share/mobile-tablet/worldwide. Accessed: Aug. 22, 2025.
  • [3] StatCounter, "Android version market share in Turkey," [Online]. Available: https://gs.statcounter.com/android-version-market-share/mobile-tablet/turkey. Accessed: Aug. 22, 2025.
  • [4] Adobe, ".LOG Format – What Is .LOG and How to Open It," Adobe Acrobat Resources, 2025. [Online]. Available: https://www.adobe.com/uk/acrobat/resources/document-files/text-files/log.html. Accessed: Sep. 13, 2025.
  • [5] S. Allen, Importance of Understanding Logs from an Information Security Standpoint, Tech. Rep., 2001, p. 241.
  • [6] H. Çakır and M. S. Kılıç, Eds., Güncel Tehdit: Siber Suçlar. Ankara, Turkey: Seçkin, 2014, pp. 241, 251.
  • [7] Android Developers, "Günlükleri Logcat ile görüntüleme," Android Studio. [Online]. Available: https://developer.android.com/studio/debug/logcat?hl=tr. Accessed: Sep. 3, 2025.
  • [8] Y. Liu, X. Zhang, S. He, H. Zhang, L. Li, Y. Kang, and D. Zhang, "Uniparser: A unified log parser for heterogeneous log data," in Proc. ACM Web Conf., Apr. 2022, pp. 1893–1901.
  • [9] H. Çakır and M. S. Kılıç, Adli Bilişim ve Elektronik Deliller. Ankara, Turkey: Seçkin Yayıncılık, 2014, p. 275.
  • [10] A. Utku, "Güvenlik duvarlarındaki ağ trafiği log kayıtlarının analizinde açıklanabilir yapay zekâ ve derin sinir ağlarının kullanımı: Karşılaştırmalı bir analiz," Erciyes Üniversitesi Fen Bilimleri Enstitüsü Fen Bilimleri Dergisi, vol. 40, no. 3, pp. 587–608, 2024.
  • [11] N. T. Nguyen, T. T. Pham, T. X. Dang, M.-S. Dao, D.-T. Dang-Nguyen, C. Gurrin, and B. T. Nguyen, "Malware detection using system logs," in Proc. 2020 Intelligent Cross-Data Analysis and Retrieval Workshop (ICDAR ’20), Dublin, Ireland, Oct. 2020, doi: 10.1145/3379174.3392318.
  • [12] S. Karagiannis, L. L. Ribeiro, C. Ntantogian, E. Magkos, and L. M. Campos, "Chidroid: A mobile Android application for log collection and security analysis in healthcare and IoMT," Appl. Sci., vol. 13, no. 5, Art. 3061, Feb. 27, 2023, doi: 10.3390/app13053061.
  • [13]G. Horsman and L. R. Conniss, “Investigating evidence of mobile phone usage by drivers in road traffic accidents,” Digital Investigation, vol. 12, no. S1, pp. S30–S37, 2015. [Online]. Available:https://dfrws.org/sites/default/files/session-files/2015_EU_paperinvestigating_evidence_of_mobile_phone_usage_by_drivers_in_road_traffic_accidents.pdf [14] Y. Shin, S. Kim, W. Jo, and T. Shon, "Digital forensic case studies for in-vehicle infotainment systems using Android Auto and Apple CarPlay," Sensors, vol. 22, no. 19, p. 7196, 2022.
  • [15] J. Bellizzi, M. Vella, C. Colombo, and J. C. Hernandez-Castro, "Using infrastructure-based agents to enhance forensic logging of third-party applications," in Proc. ICISSP, Feb. 2023, pp. 389–401.
  • [16] P. C. Patel, P. M. Bhatt, U. Parmar, and K. Bhavsar, "A forensic perspective on the use of event viewer for detecting malicious activities and ensuring system integrity," ShodhKosh: J. Visual Perform. Arts, vol. 5, no. 1, pp. 3250–3256, 2024, doi: 10.29121/shodhkosh.v5.i1.2024.5975.
  • [17] J. Jung, S. Han, M. Park, and S. J. Cho, “Automotive digital forensics through data and log analysis of vehicle diagnosis Android apps,” Forensic Science International: Digital Investigation, vol. 49, 301752,2024.[Online].Available:https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4579305
  • [18] J. H. Lee, S. H. Lim, B. Hyeon, O. Y. Jeon, J. J. Park, and N. I. Park, "Tesla log data analysis approach from a digital forensics perspective," World Electr. Veh. J., vol. 15, no. 12, p. 590, 2024.
  • [19] J. A. Bessa, R. Miranda Filho, G. Souza, R. Barreto, and R. de Freitas, "Log parsers' performance on raw logs from Android devices," J. Internet Serv. Appl., vol. 16, no. 1, pp. 105–116, 2025.
  • [20] J. Olegård, S. Axelsson, and Y. Li, "When is logging sufficient?—Tracking event causality for improved forensic analysis and correlation," Forensic Sci. Int.: Digit. Invest., vol. 52, p. 301877, 2025, doi: 10.1016/j.fsidi.2025.301877.
  • [21] S. Pavani, L. S. Naga, N. Manoja, and E. Karthik, "An integrated forensic logger for Android devices: Multisource user activity reconstruction," Int. Res. J. Mod. Eng. Technol. Sci., vol. 7, no. 6, pp. 5244–5250, Jun. 2025, doi: 10.56726/IRJMETS80449.
  • [22] S. Jadhav, K. Kondhare, S. Mulik, J. Panchal, and M. Kale, "Implementation and evaluation of an automated Android log extraction tool for digital forensics," Int. J. Adv. Res. Sci. Commun. Technol., vol. 5, no. 5, p. 213, Jun. 2025, doi: 10.48175/IJARSCT-27730.
  • [23] S. Cho, H. Seong, H. Kang, S. J. Cho, and B. Kang, “Forensic investigation of vehicle-related data in Android phones connected to In-Vehicle Infotainment systems,” Computer Networks, 111370, 2025.[Online].Available:https://eprints.soton.ac.uk/503333/
  • [24] C. C. C. Cheng, C. Shi, N. Z. Gong, and Y. Guan, "Logextractor: Extracting digital evidence from Android log messages via string and taint analysis," Forensic Sci. Int.: Digit. Invest., vol. 37, p. 301193, 2021, doi: 10.1016/j.fsidi.2021.301193
Toplam 23 adet kaynakça vardır.

Ayrıntılar

Birincil Dil Türkçe
Konular Adli Bilişim, Siber Güvenlik ve Gizlilik (Diğer)
Bölüm Araştırma Makalesi
Yazarlar

Müge Begüm Dönmez 0000-0002-2033-1179

İbrahim Alper Doğru 0000-0001-9324-7157

Gönderilme Tarihi 17 Eylül 2025
Kabul Tarihi 15 Aralık 2025
Yayımlanma Tarihi 31 Aralık 2025
Yayımlandığı Sayı Yıl 2025 Cilt: 7 Sayı: 2

Kaynak Göster

APA Dönmez, M. B., & Doğru, İ. A. (2025). Android İşletim Sistemine Sahip Cihazdan Elde Edilen Logcat Kayıtlarının Adli Bilişim Açısından Değerlendirilmesi. Journal of Information Systems and Management Research, 7(2), 192-213. https://doi.org/10.59940/jismar.1786182