Comparison of Forensic Tools on Social Media Services Using the Digital Forensic Research Workshop Method (DFRWS)

Ghufron Zaida Muflih, Sunardi Sunardi, Imam Riadi, Anton Yudhana, Himawan I Azmi

Abstract


Social media applications currently play a role and become part of various human activities, on the other hand social media is also very vulnerable to various crimes. Some crimes on social media can be in the form of hate speech, defamation, fraud, gambling, pornography, and other harmful actions. This research applies the Digital Forensic Research Workshop (DFRWS) method to search for all data on twitter social media services running on the Android operating system using MOBILedit Forensic Express and Belkasoft Evidence Center tools. Twitter social media services in this research are used for activities by utilizing all the features in it. Activities carried out by twitter users become evidence that will be acquired using MOBILedit Forensic Express and Belkasoft Evidence Center tools. From the two tools used, a comparison was obtained that MOBILedit Forensic Express found more data on twitter social media than Belkasoft Evidence Center, the findings in these two tools made several contributions to social media investigations that run on the android operating system

Full Text:

PDF

References


I. Riadi, A. Yudhana, dan M. C. F. Putra, “Akuisisi Bukti Digital Pada Instagram Messenger Berbasis Android Menggunakan Metode National Institute of Justice (Nij),†J. Tek. Inform. dan Sist. Inf., vol. 4, no. 2, hal. 219–227, 2018, doi: 10.28932/jutisi.v4i2.769.

N. Anwar dan I. Riadi, “Analisis Investigasi Forensik WhatsApp Messanger Smartphone Terhadap WhatsApp Berbasis Web,†J. Ilm. Tek. Elektro Komput. dan Inform., vol. 3, no. 1, hal. 1, 2017, doi: 10.26555/jiteki.v3i1.6643.

W. A. Mukti, S. U. Masruroh, dan D. Khairani, “Analisa dan Perbandingan Bukti Forensik Aplikasi Media Sosial Facebook dan Twitter pada Smartphone Android,†J. Tek. Inform., vol. 10, no. 1, hal. 73–84, 2018, doi: 10.15408/jti.v10i1.6820.

Kementrian Komunikasi dan Informasi, “Kominfo : Pengguna Internet di Indonesia 63 Juta Orang,†Website Resmi Kementerian Komunikasi dan Informatika RI, 2013. .

M. Cindo, D. P. Rini, dan Ermatita, “Sentiment Analysis On Twitter By Using Maximum Entropy And Support Vector Machine Method,†Sinergi, vol. 24, no. 2, hal. 87–94, 2020, doi: 10.22441/sinergi.2020.2.002.

A. Fauzan, I. Riadi, dan A. Fadlil, “Analisis Forensik Digital Pada Line Messenger Untuk Penanganan Cybercrime,†in Annual Research Seminar (ARS), 2016, vol. 2, no. 1, hal. 159–163.

Kementrian Komunikasi dan Informasi, “SIARAN PERS NO. 08/HM/KOMINFO/01/2019 Warganet Paling Banyak Laporkan Akun Twitter,†Kementrian Komunikasi dan Informasi, 2019. [Daring]. Tersedia pada: https://www.kominfo.go.id/tautan. [Diakses: 01-Feb-2019].

I. Saputra dan M. N. Azhar, “Analisis dan Investigasi Forensik Digital Live Memory untuk Deteksi Tingkah Laku Agresi Pada Aplikasi Whatsapp,†Semin. Nas. dan Disk. Panel Multidisiplin Has. Penelit. Pengabdi. Kpd. Masy., hal. 119–125, 2018.

APJII, “Penetrasi & Profil Perilaku Pengguna Internet Indonesia Tahun 2018,†Indonesia, 2018.

A. Yudhana, I. Riadi, dan I. Anshori, “Analisis Bukti Digital Facebook Messenger Menggunakan Metode Nist,†It J. Res. Dev., vol. 3, no. 1, hal. 13–21, 2018, doi: 10.25299/itjrd.2018.vol3(1).1658.

I. Riadi, R. Umar, dan I. M. Nasrulloh, “Analisis Forensik Digital Pada Frozen Solid State Drive Dengan Metode National Institute of Justice (Nij),†Elinvo (Electronics, Informatics, Vocat. Educ., vol. 3, no. 1, hal. 70–82, 2018, doi: 10.21831/elinvo.v3i1.19308.

A. L. Suryana, R. El Akbar, dan N. Widiyasono, “Investigasi Email Spoofing dengan Metode Digital Forensics Research Workshop (DFRWS),†J. Edukasi dan Penelit. Inform., vol. 2, no. 2, hal. 111–117, 2016, doi: 10.26418/jp.v2i2.16821.

I. Riadi, S. Sunardi, dan Sahiruddin, “Perbandingan Tool Forensik Data Recovery Berbasis Android Menggunakan Metode NIST,†J. Teknol. Inf. dan Ilmu Komput., vol. x, no. 30, hal. 1–8, 2020, doi: 10.25126/jtiik.202071921.

R. Inggi, B. Sugiantoro, dan Y. Prayudi, “Penerapan System Development Life Cycle ( Sdlc )Dalam Mengembangkan Framework Audio Forensik,†semanTIK, vol. 4, no. 2, hal. 193–200, 2018, doi: 10.5281/zenodo.2528444.

M. N. Yusoff, A. Dehghantanha, dan R. Mahmod, “Forensic Investigation of Social Media and Instant Messaging Services in Firefox OS: Facebook, Twitter, Google+, Telegram, OpenWapp and Line as Case Studies,†in Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, vol. 4, no. 4, Elsevier, 2017, hal. 41–62.

P. Salave dan Atisha Wakdikar, “Memory Forensics: Tools Comparison,†Int. J. Sci. Res., vol. 6, no. 6, hal. 5–8, 2017.

P. Brankica Popović dan P. Kristijan Kuk, “Comprehensive Forensic Examination With Belkasoft Evidence Center,†in International Scientific Conference “Archibald Reiss Days†Thematic Conference Proceedings of International Significance, 2018.

I. Riadi, A. Fadlil, dan A. Fauzan, “A study of mobile forensic tools evaluation on android-based LINE messenger,†Int. J. Adv. Comput. Sci. Appl., vol. 9, no. 10, hal. 201–206, 2018, doi: 10.14569/IJACSA.2018.091024.

A. C. K. Wardana, R. Pedrason, dan T. B. Prasetyo, “Implementation of Digital Forensic Brunei Darussalam in Building Cyber Security,†J. Prodi Perang Asimetris, vol. VOL 4, no. 1, hal. 1–22, 2018.

R. Harris, “Arriving at an Anti-forensics Consensus,†in DFRWS 2006 Conference proceedings, 2006.

G. Palmer, “A Road Map for Digital Forensic Research Report From the First Digital Forensic Research Workshop (DFRWS),†Utica, New York, 2001.

A. Yudhana, R. Umar, dan A. Ahmadi, “Digital Evidence Identification on Google Drive in Android Device Using NIST Mobile Forensic Method,†Sci. J. Informatics Vol., vol. 6, no. 1, hal. 54–63, 2019, doi: 10.15294/sji.v6i1.17767.

I. F. Editia Kurdiat, N. Widiyasono, dan H. Mubarok, “Analisis Proses Investigasi Dekstop PC Yang Terhubung Layanan Private Cloud,†J. Tek. Inform. dan Sist. Inf., vol. 2, no. 2, hal. 221–230, 2016, doi: 10.28932/jutisi.v2i2.463.

R. Umar, I. Riadi, dan G. Maulana, “A Comparative Study of Forensic Tools for WhatsApp Analysis using NIST Measurements,†Int. J. Adv. Comput. Sci. Appl., vol. 8, no. 12, hal. 69–75, 2017, doi: 10.14569/ijacsa.2017.081210.

M. Parekh dan S. Jani, “Memory Forensic: Acquisition and Analysis of Memory and its Tools Comparison,†Int. J. Eng. Technol. Manag. Res., vol. 5, no. 2, hal. 90–95, 2018, doi: 10.5281/zenodo.1198968.

P. E. Walck, “Book Review: Social Communication in the Twitter Age,†Int. J. Interact. Commun. Syst. Technol., vol. 3, no. 2, hal. 66–69, 2013.

H. Basri, “Peran media Sosial Twitter dalam Interaksi Sosial Pelajar Sekolah Menengah Pertama di Kota Pekanbaru (Studi Kasus Pelajar Smpn 1 Kota Pekanbaru),†J. Online Mhs. Fak. Ilmu Sos. dan Ilmu Polit., vol. 4, no. 2, hal. 1–15, 2017.




DOI: https://doi.org/10.33387/jiko.v6i1.5872

Refbacks

  • There are currently no refbacks.
slot gacor slot gacor hari ini slot gacor 2025 demo slot pg slot gacor slot gacor