Comparative analysis of Forensic Tools on Twitter applications using the DFRWS method

Bahasa Indonesia

  • Ikhsan Zuhriyanto UAD
  • Anton Yudhana Universitas Ahmad Dahlan
  • Imam Riadi Universitas Ahmad Dahlan
Keywords: Digital Forensics, DFRWS, Mobile Forensics, Social Media, Twitter


Current crime is increasing, one of which is the crime of using social media, although no crime does not leave digital evidence. Twitter application is a social media that is widely used by its users. Acts of crime such as fraud, insults, hate speech, and other crimes lately use many social media applications, especially Twitter. This research was conducted to find forensic evidence on the social media Twitter application that is accessed using a smartphone application using the Digital Forensics Research Workshop (DFRWS) method. These digital forensic stages include identification, preservation, collection, examination, analysis, and presentation in finding digital evidence of crime using the MOBILedit Forensic Express software and Belkasoft Evidence Center. Digital evidence sought on smartphones can be found using case scenarios and 16 variables that have been created so that digital proof in the form of smartphone specifications, Twitter accounts, application versions, conversations in the way of messages and status. This study's results indicate that MOBILedit Forensic Express digital forensic software is better with an accuracy rate of 85.75% while Belkasoft Evidence Center is 43.75%.


Download data is not yet available.


M. I. Syahib et al., “Analisis Forensik Digital Aplikasi Beetalk Untuk Penanganan Cybercrime Menggunakan Metode Nist,” Semin. Nas. Inform. 2018 (semnasIF 2018), vol. 2018, no. November, pp. 134–139, 2018.

A. Eleyan and M. S. Anwar, “Multiresolution Edge Detection Using Particle Swarm Optimization,” Int. J. Eng. Sci. Appl., vol. 1, no. 1, pp. 11–17, 2017, doi: 10.1109/CCAA.2017.8229843.

A. A. Agus and Riskawati, “PENANGANAN KASUS CYBER CRIME DI KOTA MAKASSAR ( Studi Pada Kantor Kepolisian Resort Kota Besar Makassar ),” vol. XI, no. April, pp. 20–29, 2016.

T. D. Larasati and B. C. Hidayanto, “Analisis Live Forensics Untuk Perbandingan Aplikasi Instant Messenger Pada Sistem Operasi Windows 10,” Semin. Nas. Sist. Inf. Indones. 6 Novemb. 2017, no. November, 2017.

T. Rochmadi, I. Riadi, and Y. Prayudi, “Live Forensics for Anti-Forensics Analysis on Private Portable Web Browser,” Int. J. Comput. Appl., vol. 164, no. 8, pp. 31–37, 2017, doi: 10.5120/ijca2017913717.

I. Riadi, A. Yudhana, and W. Y. Sulistyo, “Analisis Perbandingan Nilai Kualitas Citra pada Metode Deteksi Tepi,” Rekayasa Sist. dan Teknol. Inf., vol. 4, no. 2, pp. 345–351, 2020.

Handrizal, “Analisis Perbandingan Toolkit Puran File Recovery , Glary Undelete Dan Recovery Untuk Digital Forensik,” J. sains Komput. Inform., no. 1, pp. 84–94, 2017.

M. R. Wankhade and N. M. Wagdarikar, “Feature Extraction of Edge Detected Images,” Int. J. Comput. Sci. Mob. Comput., vol. 6, no. 6, pp. 336–345, 2017.

N. Anwar and I. Riadi, “Analisis Investigasi Forensik WhatsApp Messenger Smartphone Terhadap WhatsApp Berbasis Web,” J. Ilmu Tek. Elektro Komput. dan Inform., vol. 3, no. 1, 2017, doi: 10.26555/jiteki.v3i1.6643.

I. Zuhriyanto, A. Yudhana, and I. Riadi, “Perancangan Digital Forensik Pada Aplikasi Twitter Menggunakan Metode Live Forensics,” vol. 2018, no. November, pp. 86–91, 2018.

I. Riadi, R. Umar, and I. M. Nasrulloh, “Analisis Forensik Digital Pada Frozen Solid State Drive Dengan Metode National Institute of Justice (Nij),” ELINVO (Electronics, Informatics, Vocat. Educ., vol. 3, no. 1, pp. 70–82, 2018, doi: 10.21831/elinvo.v3i1.19308.

A. L. Suryana, R. R. El Akbar, and N. Widiyasono, “Investigasi Email Spoofing dengan Metode Digital Forensics Research Workshop ( DFRWS ),” J. Edukasi dan Penelit. Inform., vol. 2, no. 2, pp. 111–117, 2016.

A. C. K. Wardana, R. Pedrason, and T. B. Prasetyo, “Implementasi Digital Forensik Brunei Darussalam Dalam Membangun Keamanan Siber,” pp. 1–22, 2017.

A. Yudhana, R. Umar, and F. M. Ayudewi, “The Monitoring of Corn Sprouts Growth Using the Region Growing Methods,” J. Phys. Conf. Ser., vol. 1373, no. 1, 2019, doi: 10.1088/1742-6596/1373/1/012054.

I. Riadi, A. Yudhana, M. Caesar, and F. Putra, “Forensic Tool Comparison on Instagram Digital Evidence Based on Android with The NIST Method,” vol. 5, no. 2, pp. 235–247, 2018.

Y. N. Kunang and A. Khristian, “Implementasi Prosedur Forensik untuk Analisis Artefak Whatsapp pada Ponsel Android,” Annu. Res. Semin. 2016, vol. 2, no. 1, pp. 59–68, 2016.

W. A. Mukti, S. U. Masruroh, and D. Khairani, “Analisa Dan Perbandingan Bukti Forensik Aplikasi Media Sosial,” J. Tek. Inform., vol. 10, no. 1, pp. 73–84, 2017, doi: 10.15408/JTI.V10I1.5617.

F. G. Hikmatyar, “Digital Forensic Analysis on Android Smartphones for Handling Cybercrime Cases,” vol. 7, no. 2, pp. 19–22, 2018.

M. Parekh and S. Jani, “Memory Forensic : Acquisition And Analysis Of Memory And Its Tools Comparison,” Communiacation, Integr. Networks Signal Process. 2018, vol. 5, no. 2: SE : February 2018, pp. 90–95, 2018, doi: 10.5281/zenodo.1198968.

I. Riadi, R. Umar, and A. Firdonsyah, “Forensic Tools Performance Analysis on Android-Based Blackberry Messenger using NIST Measurements,” Int. J. Electr. Comput. Eng., vol. 8, no. 5, pp. 3991–4003, 2018, doi: 10.11591/ijece.v8i5.pp3991-4003.

How to Cite
Zuhriyanto, I., Anton Yudhana, & Imam Riadi. (2020). Comparative analysis of Forensic Tools on Twitter applications using the DFRWS method. Jurnal RESTI (Rekayasa Sistem Dan Teknologi Informasi), 4(5), 829-836.
Artikel Teknologi Informasi

Most read articles by the same author(s)