Analysis of Skype Digital Evidence Recovery based on Android Smartphones Using the NIST Framework

Analisis Recovery Bukti Digital Skype berbasis Smartphone Android Menggunakan Framework NIST

  • Anton Yudhana
  • Abdul Fadlil
  • Muhammad Rizki Setyawan Universitas Ahmad Dahlan
Keywords: Cybercrime, Digital Forensics, Recovery, Skype, NIST

Abstract

Cybercrime is an activity utilizing electronic devices and network technology as tools or media to commit crimes. One of them uses the Skype application that is installed on the smartphone. In finding evidence from a cybercrime case, a forensic activity known as digital forensic must be carried out. This study aims to recover digital evidence that has been erased using the NIST framework and forensic tools such as Oxygen and Belkasoft. The results of digital evidence recovery from smartphone Samsung J2 in the removal scenario via the application manager, the Oxygen tool cannot recover deleted data and the percentage of success using Belkasoft is 26%. While the results of data recovery with the manual removal method the percentage of success using Oxygen was 63% and Belkasoft was 44%. Digital evidence recovery results from smartphones Andromax A on the erase scenario through the application manager, Oxygen and Belkasoft tools cannot recover deleted data. While manual removal of Oxygen by 61% and Belkasoft cannot restore data. It can be concluded the results of data recovery from both smartphones that are used according to the erasure method through the application manager, Belkasoft has better performance than Oxygen, and data recovery according to the method of erasing manually, Oxygen has better performance than Belkasoft.

Downloads

Download data is not yet available.

References

R. Umar, I. Riadi, dan G. M. Zamroni, “Mobile Forensic Tools Evaluation for Digital Crime Investigation,” International Journal on Advanced Science, Engineering and Information Technology, vol. 8, no. 3, hal. 949, Jun 2018, doi: 10.18517/ijaseit.8.3.3591.

S. Kemp, “Digital 2019: Global Internet Use Accelerates,” Hootsuite and We Are Social, 2019. https://wearesocial.com/blog/2019/01/digital-2019-global-internet-use-accelerates (diakses Mei 17, 2020).

S. Ikhsani dan B. C. Hidayanto, “Analisa Forensik Whatsapp dan LINE Messenger Pada Smartphone Android Sebagai Rujukan Dalam Menyediakan Barang Bukti yang Kuat dan Valid di Indonesia,” Jurnal Teknik ITS, vol. 5, no. 2, 2016, doi: 10.12962/j23373539.v5i2.17271.

A. Yudhana, I. Riadi, dan F. Ridho, “DDoS Classification Using Neural Network and Naïve Bayes Methods for Network Forensics,” International Journal of Advanced Computer Science and Applications (IJACSA), vol. 9, no. 11, hal. 177–183, 2018.

F. G. Hikmatyar dan B. Sugiantoro, “Digital Forensic Analysis on Android Smartphones for Handling Cybercrime Cases,” International Journal on Informatics for Development (IJID), vol. 7, no. 2, hal. 19, Jan 2019, doi: 10.14421/ijid.2018.07204.

D. T. Yuwono, A. Fadlil, dan Sunardi, “Perbandingan Kinerja Perangkat Lunak Forensik untuk File Carving dengan Metode NIST,” Jurnal Teknologi dan Sistem Komputer, vol. 7, no. July, hal. 89–92, 2019, doi: 10.14710/jtsiskom.7.3.2019.89-92.

M. N. Faiz, R. Umar, dan A. Yudhana, “Analisis Live Forensics untuk Perbandingan Kemananan Email pada Sistem Operasi Proprietary,” ILKOM Jurnal Ilmiah, vol. 8, no. 3, hal. 242–247, Des 2016, doi: 10.33096/ilkom.v8i3.79.242-247.

Sunardi, I. Riadi, dan M. H. Akbar, “Penerapan Metode Static Forensics untuk Ekstraksi File Steganografi,” Rekayasa Sistem dan Teknologi Informasi (RESTI ), vol. 4, no. 3, hal. 576–583, 2020.

I. Riadi, S. Sunardi, dan S. Sahiruddin, “Analisis Forensik Recovery pada Smartphone Android Menggunakan Metode National Institute Of Justice (NIJ),” Jurnal Rekayasa Teknologi Informasi (JURTI), vol. 3, no. 1, hal. 87–95, 2019, doi: 10.30872/JURTI.V3I1.2292.

B. C. Ogazi-Onyemaechi, A. Dehghantanha, dan K. K. R. Choo, “Performance of Android Forensics Data Recovery Tools,” in Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, no. March, 2017, hal. 91–110.

N. R. Roy, A. K. Khanna, dan L. Aneja, “Android phone forensic: Tools and techniques,” in 2016 International Conference on Computing, Communication and Automation (ICCCA), Apr 2016, hal. 605–610, doi: 10.1109/CCAA.2016.7813792.

S. Ningsih, “Digital Forensics Workflow as A Mapping Model for People, Evidence, and Process in Digital Investigation,” International Journal of Cyber-Security and Digital Forensics, vol. 7, no. 3, hal. 294–304, 2018, doi: 10.17781/P002463.

I. Riadi, R. Umar, dan M. A. Aziz, “Forensik Web Layanan Instant Messaging Menggunakan Metode Association of Chief Police Officers (ACPO),” Mobile and Forensics, vol. 1, no. 1, hal. 30, 2019, doi: 10.12928/mf.v1i1.705.

M. R. Setyawan, A. Yudhana, dan A. Fadlil, “Akuisisi Data Pada Skype Messenger Menggunakan Metode National Institute Of Justice,” SYSTEMIC : Information System and Informatics Journal., vol. 5, no. 2, hal. 13–18, 2019, doi: 10.29080/systemic.v5i2.724.

A. Yudhana, I. Riadi, I. Zuhriyanto, dan K. Kunci, “Analisis Live Forensics Aplikasi Media Sosial Pada Browser Menggunakan Metode Digital Forensics Research Workshop (DFRWS),” TECHNO, vol. 20, no. 2, hal. 125–130, 2019, doi: 10.30595/techno.v20i2.4594.

A. Yudhana, R. Umar, dan A. Ahmadi, “Digital Evidence Identification on Google Drive in Android Device Using NIST Mobile Forensic Method,” Scientific Journal of Informatics, vol. 6, no. 1, hal. 54–63, 2019.

I. Riadi, A. Yudhana, dan M. C. F. Putra, “Forensic Tool Comparison on Instagram Digital Evidence Based on Android with The NIST Method,” Scientific Journal of Informatics, vol. 5, no. 2, hal. 235–247, 2018.

I. Riadi, S. Sunardi, dan Sahiruddin, “Perbandingan Tool Forensik Data Recovery Berbasis Android Menggunakan Metode NIST,” Jurnal Teknologi Informasi dan Ilmu Komputer (JTIIK), vol. x, no. 30, hal. 1–8, 2020, doi: 10.25126/jtiik.202071921.

I. Riadi dan I. M. Nasrulloh, “Analisis Forensik Solid State Drive ( Ssd ) Menggunakan Framework Grr Rapid Response Forensic Analysis Of Solid State Drives ( Ssd ) Using The Grr Rapid Response Framework,” Jurnal Teknologi Informasi dan Ilmu Komputer (JTIIK), vol. 6, no. 5, hal. 509–518, 2019, doi: 10.25126/jtiik.201961516.

I. Riadi, S. Sunardi, dan A. Hadi, “Analisis Bukti Digital TRIM Enable SSD NVMe Menggunakan Metode Static Forensics,” JUITA: Jurnal Informatika, vol. 8, no. 1, hal. 65, 2020, doi: 10.30595/juita.v8i1.6584.

Published
2020-08-17
How to Cite
Anton Yudhana, Abdul Fadlil, & Setyawan, M. R. (2020). Analysis of Skype Digital Evidence Recovery based on Android Smartphones Using the NIST Framework. Jurnal RESTI (Rekayasa Sistem Dan Teknologi Informasi), 4(4), 682 - 690. https://doi.org/10.29207/resti.v4i4.2093
Section
Artikel Teknologi Informasi