Akuisisi Bukti Digital Viber Messenger Android Menggunakan Metode National Institute of Standards and Technology (NIST)
Acquisition of Digital Evidence Android-Based Viber Messenger App Using the National Institute of Standards and Technology (NIST) Method
Abstract
Viber is one of the most popular social media in the Instant Messenger application category that can be used to send text messages, make voice calls, send picture messages and video messages to other users. As many as 260 million people around the world have used this application. Increasing the number of viber users certainly brings positive and negative impacts, one of the negative impacts of this application is the use of digital forensic crime. This research simulates and removes digital crime evidence from the viber application on Android smartphones using the National Institute of Standards Technology (NIST) method, which is a method that has work guidelines on forensic policy and process standards to ensure each investigator follows the workflow the same so that their work is documented and the results can be accounted for. This study uses three forensic tools, MOBILedit Forensic Express, Belkasoft and Autopsy. The results in this study show that MOBILedit Forensic Express gets digital evidence with a percentage of 100% in getting accounts, contacts, pictures and videos. While proof of digital chat is only 50%. Belkasoft gets digital evidence with a percentage of 100% in getting accounts, contacts, pictures and videos. While proof of digital chat is only 50%. For Autopsy does not give the expected results in the extraction process, in other words the Autopsy application gives zero results. It can be concluded that MOBILedit Forensic Express and Belkasoft have a good performance compared to Autopsy and thus this research has been completed and succeeded in accordance with the expected goals.
Downloads
References
W. A. Mukti, S. U. Masruroh, and D. Khairani, “Analisa dan Perbandingan Bukti Forensik Aplikasi Media Sosial Facebook dan Twitter pada Smartphone Android,” J. Tek. Inform., vol. 10, no. 1, pp. 73–84, 2018, doi: 10.15408/jti.v10i1.6820.
M. I. Syahib, I. Riadi, and R. Umar, “Akuisisi Bukti Digital Aplikasi Viber Menggunakan Metode National Institute of Standards Technology (NIST),” J-SAKTI (Jurnal Sains Komput. dan Inform., vol. 4, no. 1, p. 170, 2020, doi: 10.30645/j-sakti.v4i1.196.
R. Ruuhwan, I. Riadi, and Y. Prayudi, “Penerapan Integrated Digital Forensic Investigation Framework v2 (IDFIF) pada Proses Investigasi Smartphone,” J. Edukasi dan Penelit. Inform., vol. 2, no. 1, 2016, doi: 10.26418/jp.v2i1.14369.
D. Hariyadi, W. W. Winarno, A. Luthfi, M. Informatika, F. Teknologi, and U. I. Indonesia, “Analisis Konten Dugaan Tindak Kejahatan Dengan Barang Bukti Digital Blackberry Messenger,” pp. 81–89, 2014.
A. P. Utama Siahaan, “Pelanggaran Cybercrime Dan Kekuatan Yurisdiksi Di Indonesia,” J. Tek. dan Inform., vol. 5, no. 1, pp. 6–9, 2018.
A. Fauzan, I. Riadi, and A. Fadlil, “Analisis Forensik Digital Pada Line Messenger Untuk Penanganan Cybercrime,” Annu. Res. Semin., vol. 2, no. 1, pp. 159–163, 2017.
M. D. K. Perdani, W. Widyawan, and P. I. Santosa, “Blockchain untuk Keamanan Transaksi Elektronik Perusahaan Financial Technology (Studi Kasus pada PT XYZ),” Semnasteknomedia, vol. 6, no. 1, pp. 7–12, 2018.
Z. Akbar, B. Nugraha, and M. Alaydrus, “Whatsapp Forensics Pada Android Smartphone : a Survey,” Sinergi, vol. 20, no. 3, p. 207, 2016, doi: 10.22441/sinergi.2016.3.006.
A. Yudhana, I. Riadi, and I. Anshori, “Analisis Bukti Digital Facebook Messenger Menggunakan Metode Nist,” It J. Res. Dev., vol. 3, no. 1, p. 13, 2018, doi: 10.25299/itjrd.2018.vol3(1).1658.
A. Tanner and D. Dampier, “Concept mapping for digital forensic investigations,” IFIP Adv. Inf. Commun. Technol., vol. 306, pp. 291–300, 2009, doi: 10.1007/978-3-642-04155-6_22.
P. Mell and T. Grance, “The NIST Definition of Cloud Computing Recommendations of the National Institute of Standards and Technology,” Natl. Inst. Stand. Technol. Inf. Technol. Lab., vol. 145, p. 7, 2011, doi: 10.1136/emj.2010.096966.
I. Riadi and I. M. Nasrulloh, “Analisis Forensik Solid State Drive ( Ssd ) Menggunakan Framework Grr Rapid Response Forensic Analysis Of Solid State Drives ( Ssd ) Using The Grr Rapid Response Framework,” vol. 6, no. 5, pp. 509–518, 2019, doi: 10.25126/jtiik.201961516.
I. Riadi, R. Umar, and A. Firdonsyah, “Forensic tools performance analysis on android-based blackberry messenger using NIST measurements,” Int. J. Electr. Comput. Eng., vol. 8, no. 5, pp. 3991–4003, 2018, doi: 10.11591/ijece.v8i5.pp3991-4003.
I. Riadi, R. Umar, and I. M. Nasrulloh, “Analisis Forensik Digital Pada Frozen Solid State Drive Dengan Metode National Institute of Justice (Nij),” Elinvo (Electronics, Informatics, Vocat. Educ., vol. 3, no. 1, pp. 70–82, 2018, doi: 10.21831/elinvo.v3i1.19308.
M. H. A. Sunardi, Imam Riadi, “Penerapan Metode Static Forensics untuk Ekstraksi File Steganografi,” vol. 1, no. 10, pp. 2–6, 2020.
M. N. Faiz, R. Umar, and A. Yudhana, “Implementasi Live Forensics untuk Perbandingan Browser pada Keamanan Email,” vol. 1, no. 3, pp. 108–114, 2017.
I. Riadi and R. Umar, “Identification Of Digital Evidence On Android ’ s,” Int. J. Comput. Sci. Inf. Secur., vol. 15, no. 5, pp. 3–8, 2017.
Nasirudin, “Analisis Telegram mengggunakan Metode NIST,” 2019.
R. Umar, I. Riadi, and Z. Guntur Malulana, “A Comparative Study of Forensic Tools for WhatsApp Analysis using NIST Measurements,” Int. J. Adv. Comput. Sci. Appl., vol. 8, no. 12, pp. 69–75, 2017, doi: 10.14569/IJACSA.2017.081210.
C. Anglano, M. Canonico, and M. Guazzone, “Computers & Security The Android Forensics Automator ( AnForA ): A tool for the Automated Forensic Analysis of Android Applications,” vol. 88, 2020, doi: 10.1016/j.cose.2019.101650.
I. Riadi, R. Umar, and I. M. Nasrulloh, “Experimental Investigation of Frozen Solid State Drive on Digital Evidence with Static Forensic Methods,” Lontar Komput. J. Ilm. Teknol. Inf., vol. 9, no. 3, p. 169, 2018, doi: 10.24843/lkjiti.2018.v09.i03.p06.
R. A. K. N. Bintang, R. Umar, and U. Yudhana, “Perancangan perbandingan live forensics pada keamanan media sosial Instagram, Facebook dan Twitter di Windows 10,” Pros. SNST ke-9 Tahun 2018 Fak. Tek. Univ. Wahid Hasyim, pp. 125–128, 2018.
I. Riadi, A. Yudhana, M. Caesar, and F. Putra, “Akuisisi Bukti Digital Pada Instagram Messenger Berbasis Android Menggunakan Metode National Institute Of Justice (NIJ),” vol. 4, pp. 219–227, 2018.
I. Riyadi, A. Yudhana, and M. C. F. Putra, “Akuisisi Bukti Digital Pada Instagram Messenger Berbasis Android Menggunakan Metode National Institute of Justice (Nij),” J. Tek. Inform. dan Sist. Inf., vol. 4, no. 2, pp. 219–227, 2018, doi: 10.28932/jutisi.v4i2.769.
M. S. Chang and C. Y. Chang, “Forensic analysis of LINE messenger on android,” J. Comput., vol. 29, no. 1, pp. 11–20, 2018, doi: 10.3966/199115992018012901002.
S. Madiyanto, H. Mubarok, and N. Widiyasono, “Mobile Forensics Investigation Proses Investigasi Mobile Forensics Pada Smartphone Berbasis IOS,” J. Rekayasa Sist. Ind., vol. 4, no. 01, 2017, doi: 10.25124/jrsi.v4i01.149.
G. M. Zamroni, “Analisis Forensik Instant Messaging (WhatsApp) Berbasis Android,” 2018.
Copyright (c) 2021 Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi)
This work is licensed under a Creative Commons Attribution 4.0 International License.
Copyright in each article belongs to the author
- The author acknowledges that the RESTI Journal (System Engineering and Information Technology) is the first publisher to publish with a license Creative Commons Attribution 4.0 International License.
- Authors can enter writing separately, arrange the non-exclusive distribution of manuscripts that have been published in this journal into other versions (eg sent to the author's institutional repository, publication in a book, etc.), by acknowledging that the manuscript has been published for the first time in the RESTI (Rekayasa Sistem dan Teknologi Informasi) journal ;