Comparative Security Analysis of Web-Based Instant Messaging Applications
Abstract
Web-based instant messaging applications vulnerability has become one of the main concerns for its users in line with the increasing number of cybercrimes that occur on social media. This research was conducted to determine the comparability of the vulnerability value of the web-based WhatsApp, Telegram, and Skype applications using the Association of Chief Police Officers (ACPO) method. Digital artifacts in the form of text messages, picture messages, video messages, telephone numbers, and user IDs have been acquired in this research process using FTK imager and OSForensic tools. The results of the study using the FTK imager and OSForensic tools show that the web-based Skype application has a vulnerability value of 92%, while WhatsApp and Web-based Telegram have the same vulnerability value with 67% each based on all digital artifacts that successfully acquired.
Downloads
References
M. N. Yusoff, A. Dehghantanha, and R. Mahmod, “Forensic Investigation of Social Media and Instant Messaging Services in Firefox OS,” Contemp. Digit. Forensic Investig. Cloud Mob. Appl., pp. 41–62, 2017, doi: 10.1016/B978-0-12-805303-4.00004-6.
T. Sutikno, L. Handayani, D. Stiawan, M. A. Riyadi, and I. M. I. Subroto, “WhatsApp, viber and telegram: Which is the best for instant messaging?,” Int. J. Electr. Comput. Eng., vol. 6, no. 3, pp. 909–914, 2016, doi: 10.11591/ijece.v6i3.10271.
B. N. Prastowo, N. A. S. Putro, and O. A. Dhewa, “PLO User Interface based on Telegram Bot,” IJCCS (Indonesian J. Comput. Cybern. Syst., vol. 13, no. 1, p. 21, 2019, doi: 10.22146/ijccs.29089.
C. Anglano, M. Canonico, and M. Guazzone, “Forensic analysis of Telegram Messenger on Android smartphones,” Digit. Investig., vol. 23, no. October, pp. 31–49, 2017, doi: 10.1016/j.diin.2017.09.002.
M. S. Asyaky, “Analisis dan Perbandingan Bukti Digital Aplikasi Instant Messenger Pada Android,” vol. 3, no. October, 2019.
D. Vadlamudi, D. K. Thirupathi Rao, P. Vidyullatha, and B. AjasekharReddy, “Analysis on digital forensics challenges and anti-forensics techniques in cloud computing,” Int. J. Eng. Technol., vol. 7, no. 2.7, p. 1072, 2018, doi: 10.14419/ijet.v7i2.7.12230.
B. Rahardjo and I. P. A. E. Pratama, “Pengujian Dan Analisa Anti Komputer Forensik Menggunakan Shred Tool,” Lontar Komput. J. Ilm. Teknol. Inf., vol. 7, no. 2, p. 104, 2016, doi: 10.24843/lkjiti.2016.v07.i02.p04.
J. Choi, J. Yu, S. Hyun, and H. Kim, “Digital forensic analysis of encrypted database files in instant messaging applications on Windows operating systems: Case study with KakaoTalk, NateOn and QQ messenger,” Digit. Investig., vol. 28, pp. S50–S59, 2019, doi: 10.1016/j.diin.2019.01.011.
O. F. AbdelWahab, A. I. Hussein, H. F. A. Hamed, H. M. Kelash, A. A. M. Khalaf, and H. M. Ali, “Hiding data in images using steganography techniques with compression algorithms,” Telkomnika (Telecommunication Comput. Electron. Control., vol. 17, no. 3, pp. 1168–1175, 2019, doi: 10.12928/TELKOMNIKA.V17I3.12230.
T. D. Larasati, “Live Forensics Perbandingan Aplikasi Instant Messenger Live Forensics Analysis for Comparing Instant Messenger Applications ( Line , Facebook , and Telegram ) on Windows 10 Operating System . Live Forensics,” 2017.
T. D. Transformation, “CURRENT STATE OF CYBERCRIME The Digital Transformation of Cybercrime,” 2019.
I. Riadi, A. Fadlil, and A. Fauzan, “Evidence Gathering and Identification of LINE Messenger on Android Device,” Int. J. Comput. Sci. Inf. Secur. (IJCSIS), vol. 16, no. June, pp. 201–205, 2018.
M. A. Aziz, I. Riadi, and R. Umar, “Analisis Forensik LINE Messenger Berbasis Web Menggunakan Framework National Institute of Justice,” vol. 2018, no. November, pp. 51–57, 2018.
M. Faiz and W. A. Prabowo, “Studi Komparasi Investigasi Digital Forensik pada Tindak Kriminal,” vol. 1, no. December, 2018, doi: 10.20895/INISTA.V1I1.
I. Riadi, S. Sunardi, and Sahiruddin, “Perbandingan Tool Forensik Data Recovery Berbasis Android Menggunakan Metode NIST,” J. Teknol. Inf. dan Ilmu Komput., vol. x, no. 30, pp. 1–8, 2020, doi: 10.25126/jtiik.202071921.
I. Riadi, A. Yudhana, and M. C. F. Putra, “Forensic Tool Comparison on Instagram Digital Evidence Based on Android with The NIST Method,” Sci. J. Informatics, vol. 5, no. 2, pp. 235–247, 2018, doi: 10.15294/sji.v5i2.16545.
E. Pimenidis, “Computer Anti-forensics Methods and Their Impact on Computer Forensic Investigation Computer Anti-forensics Methods and Their Impact on,” no. August 2009, pp. 145–155, 2016, doi: 10.1007/978-3-642-04062-7.
I. Riadi, U. Rusydi, and M. A. Aziz, “Forensik Web Layanan Instant Messaging Menggunakan Metode Association of Chief Police Officers ( ACPO ),” vol. 1, no. 1, pp. 1–11, 2019.
H. Setiaji and I. V. Paputungan, “Design of Telegram Bots for Campus Information Sharing,” IOP Conf. Ser. Mater. Sci. Eng., vol. 325, no. 1, 2018, doi: 10.1088/1757-899X/325/1/012005.
A. Fauzan, I. Riadi, and A. Fadlil, “Analisis Forensik Digital Pada Line Messenger Untuk Penanganan Cybercrime,” Annu. Res. Semin., vol. 2, no. 1, pp. 159–163, 2017.
S. Madiyanto, H. Mubarok, and N. Widiyasono, “Mobile Forensics Investigation Proses Investigasi Mobile Forensics Pada Smartphone Berbasis IOS,” J. Rekayasa Sist. Ind., vol. 4, no. 01, pp. 93–98, 2017, doi: 10.25124/jrsi.v4i01.149.
B. Actoriano and I. Riadi, “Forensic Investigation on Whatsapp Web Using Framework Integrated Digital Forensic Investigation on Whatsapp Web Using Framework Integrated Digital Forensic Investigation Framework Version 2,” no. September, 2018.
R. Umar, I. Riadi, and G. M. Zamroni, “Mobile forensic tools evaluation for digital crime investigation,” Int. J. Adv. Sci. Eng. Inf. Technol., vol. 8, no. 3, pp. 949–955, 2018, doi: 10.18517/ijaseit.8.3.3591.
D. Hariyadi, F. E. Nastiti, and F. N. Aini, “Framework for Acquisition of CCTV Evidence Based on ACPO and SNI ISO / IEC 27037 : 2014,” Int. Conf. Informatics Dev., no. November, 2018.
R. Umar, I. Riadi, and G. Maulana, “A Comparative Study of Forensic Tools for WhatsApp Analysis using NIST Measurements,” Int. J. Adv. Comput. Sci. Appl., vol. 8, no. 12, pp. 69–75, 2017, doi: 10.14569/IJACSA.2017.081210.
Copyright (c) 2020 Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi)
This work is licensed under a Creative Commons Attribution 4.0 International License.
Copyright in each article belongs to the author
- The author acknowledges that the RESTI Journal (System Engineering and Information Technology) is the first publisher to publish with a license Creative Commons Attribution 4.0 International License.
- Authors can enter writing separately, arrange the non-exclusive distribution of manuscripts that have been published in this journal into other versions (eg sent to the author's institutional repository, publication in a book, etc.), by acknowledging that the manuscript has been published for the first time in the RESTI (Rekayasa Sistem dan Teknologi Informasi) journal ;