CFP last date
20 November 2024
Reseach Article

Browser Forensic for Cyber Fraud Case on Facebook Messenger Services using National Institute of Standard Technology Method

by Chelsea Sept. Thiani Puri, Imam Riadi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 183 - Number 42
Year of Publication: 2021
Authors: Chelsea Sept. Thiani Puri, Imam Riadi
10.5120/ijca2021921818

Chelsea Sept. Thiani Puri, Imam Riadi . Browser Forensic for Cyber Fraud Case on Facebook Messenger Services using National Institute of Standard Technology Method. International Journal of Computer Applications. 183, 42 ( Dec 2021), 22-29. DOI=10.5120/ijca2021921818

@article{ 10.5120/ijca2021921818,
author = { Chelsea Sept. Thiani Puri, Imam Riadi },
title = { Browser Forensic for Cyber Fraud Case on Facebook Messenger Services using National Institute of Standard Technology Method },
journal = { International Journal of Computer Applications },
issue_date = { Dec 2021 },
volume = { 183 },
number = { 42 },
month = { Dec },
year = { 2021 },
issn = { 0975-8887 },
pages = { 22-29 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume183/number42/32211-2021921818/ },
doi = { 10.5120/ijca2021921818 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:19:27.633382+05:30
%A Chelsea Sept. Thiani Puri
%A Imam Riadi
%T Browser Forensic for Cyber Fraud Case on Facebook Messenger Services using National Institute of Standard Technology Method
%J International Journal of Computer Applications
%@ 0975-8887
%V 183
%N 42
%P 22-29
%D 2021
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Technology in the field of communication has increased over time, advances in communication technology can make it easier for people to interact in real-time and online using instant message. Facebook Messenger is one of the instant messaging applications that is widely used, besides being able to provide good effects, it also cannot avoid bad effects as a medium for committing internet crimes, internet crimes that can be committed through the Facebook Messenger service include online fraud, bullying, extortion, the spread of pornography. and others. In this study using a scenario of online social gathering fraud cases through the Facebook Messenger service running on the Chrome web browser by applying the NIST stages consisting of Collection, Examination, Analysis, and Reporting and using tools forensicconsisting of Belkasoft Live RAM Capturer, FTK Imager, Browser History Capturer, Browser History Examiner, and Browser History Viewer. The percentage of results that have been obtained from Capture RAM using the BelkasoftLive RAM Capturer forensic tool which is read using the FTK Imager tool is 80% successful in obtaining evidence of Email, Password, Conversation Text and Web Browser History. In the capture results from the Chrome browser using thetool Browser History Capturer which was read with theforensic tool Browser History Examiner 40% succeeded in obtaining evidence of Email and Web Browser History, and using thetool Browser History Viewer 40% succeeded in obtaining Images and Web Browser History.The results of this research succeeded in obtaining digital evidence from fraud cases using a forensic process.

References
  1. Y. N. Kunang and A. Khristian, “Implementation of Forensic Procedures for Whatsapp Artifact Analysis on Android Phones,” vol. 2, no. 1, pp. 59–68, 2016.
  2. A. Yudhana, I. Riadi, and I. Anshori, “Analysis of Digital Evidence for Facebook Messenger Using the Nist Method,” It J. Res. Dev., vol. 3, no. 1, pp. 13–21, 2018, doi: 10.25299/itjrd.2018.vol3(1).1658.
  3. M. Fitriana, K. A. AR, and J. M. Marsya, “Application of the National Institute of Standards and Technology (Nist) Methods in Digital Forensic Analysis for Handling Cyber ​​Crime,” Cybersp. J. Pendidik. Teknol. Inf., vol. 4, no. 1, p. 29, 2020, doi: 10.22373/cj.v4i1.7241.
  4. R. A. Bintang, R. Umar, and A. Yudhana, “Analysis of Facebook Lite Social Media with Forensic tools using the NIST Method,” Techno (Jurnal Fak. Tek. Univ. Muhammadiyah Purwokerto), vol. 21, no. 2, p. 125, 2020, doi: 10.30595/techno.v21i2.8494.
  5. M. Riskiyadi, “Forensic Investigation of Digital Evidence in Revealing Cybercrime,” Cyber Secur. dan Forensik Digit., vol. 3, no. 2, pp. 12–21, 2020, doi: 10.14421/csecurity.2020.3.2.2144.
  6. I. Anshori, K. E. Setya Putri, and U. Ghoni, “Analysis of Digital Evidence on Facebook Messenger Applications on Android Smartphones Using the NIJ Method,” IT J. Res. Dev., vol. 5, no. 2, pp. 118–134, 2020, doi: 10.25299/itjrd.2021.vol5(2).4664.
  7. N. Nasirudin, S. Sunardi, and I. Riadi, “Forensic Analysis of Android Smartphones Using the NIST Method and the MOBILedit Forensic Express Tool,” J. Inform. Univ. Pamulang, vol. 5, no. 1, p. 89, 2020, doi: 10.32493/informatika.v5i1.4578.
  8. N. Anggraini et al., “Forensic Analysis of Whatsapp Messenger on Android Smartphones,” vol. XII, no. 1, pp. 83–100, 2020.
  9. M. Iqbal and I. Riadi, “Forensic WhatsApp based Android using National Institute of Standard Technology (NIST) Method,” Int. J. Comput. Appl., vol. 177, no. 8, pp. 1–7, 2019, doi: 10.5120/ijca2019919443.
  10. M. F. Sidiq and M. N. Faiz, “Review of Web Browser Forensics Tools to Support Digital Evidence Searching,” J. Edukasi dan Penelit. Inform., vol. 5, no. 1, p. 67, 2019, doi: 10.26418/jp.v5i1.31430.
  11. T. Rochmadi, “Live Forensics for Anti-Forensic Analysis on a Web Browser Case Study Browzar,” Indones. J. Bus. Intell., vol. 1, no. 1, p. 32, 2019, doi: 10.21927/ijubi.v1i1.878.
  12. W. Sanjaya, B. Sugiantoro, and Y. Prayudi, “An Offline Forensic Method For Digital Artifact Analysis In TOR Browser On Linux Operating System,” JITU J. Inform. Technol. Commun., vol. 4, no. 2, pp. 41–51, 2020, doi: 10.36596/jitu.v4i2.345.
  13. D. Setiawan, R. Setiawan, R. Karunia, and I. W. S. Wicaksana, “Comparing Web Browser Performance,” Ilmu Komput. Univ. Gunadarma, vol. 1, no. 1, pp. 1–6, 2007.
  14. B. Y. Prasetyo and I. Riadi, “Investigation Cyberbullying on Kik Messenger using National Institute of Standards Technology Method,” Int. J. Comput. Appl., vol. 174, no. 17, pp. 34–41, 2021, doi: 10.5120/ijca2021921060.
  15. A. P. Utami, “Mobile Forensics Analysis of Line Messenger on Illegal Drug Transaction Case using National Institute of Standard Technology ( NIST ) Method,” vol. 183, no. 32, pp. 23–33, 2021.
  16. R. Saputra and I. Riadi, “Forensic Browser of Twitter based on Web Services,” Int. J. Comput. Appl., vol. 175, no. 29, pp. 34–39, 2020, doi: 10.5120/ijca2020920832.
  17. I. Riadi, R. Umar, and I. M. Nasrulloh, “Digital Forensic Analysis on Frozen Solid State Drive Using the National Institute of Justice (Nij),” Elinvo (Electronics, Informatics, Vocat. Educ., vol. 3, no. 1, pp. 70–82, 2018, doi: 10.21831/elinvo.v3i1.19308.
  18. D. T. Yuwono and Y. W, “Comparative Analysis of File Carving with the Nist Method,” J. Sains Komput. dan Teknol. Inf., vol. 2, no. 2, pp. 1–6, 2020, doi: 10.33084/jsakti.v2i2.1472.
  19. T. D. Larasati, “Live Forensics Comparison of Instant Messenger Applications Live Forensics Analysis for Comparing Instant Messenger Applications ( Line, Facebook, and Telegram ) on Windows 10 Operating System. Live Forensics,” 2017.
  20. A. Fauzan, I. Riadi, and A. Fadlil, “Digital Forensics Analysis on Line Messenger for Cybercrime Handling,” Annu. Res. Semin., vol. 2, no. 1, pp. 159–163, 2017.
  21. V. R. G. Leri and I. Riadi, “Data Search for Pornographic Content on Twitter Services using National Institute of Standard and Technology (NIST) Method,” Int. J. Comput. Appl., vol. 183, no. 24, pp. 25–31, 2021, doi: 10.5120/ijca2021921610.
  22. M. Jannah, “Forensic Browser on Line Messenger Services for Handling Cyberfraud using National Institute of Standard Technology Method,” vol. 183, no. 30, pp. 9–16, 2021.
  23. C. K. Herawati, “Forensic Browser on Facebook Services using National Institute of Standards Technology Method,” vol. 183, no. 30, pp. 17–24, 2021.
  24. W. Y. Sulistyo, I. Riadi, and A. Yudhana, “Application of SURF Techniques in Image Forensics for Digital Photo Engineering Analysis,” JUITA J. Inform., vol. 8, no. 2, p. 179, 2020, doi: 10.30595/juita.v8i2.6602.
  25. S. D. Utami, C. Carudin, and A. A. Ridha, “Live Forensic Analysis on Whatsapp Web for Proving Electronic Transaction Fraud Cases,” Cyber Secur. dan Forensik Digit., vol. 4, no. 1, pp. 24–32, 2021, doi: 10.14421/csecurity.2021.4.1.2416.
  26. S. K. Saad, R. Umar, and A. Fadlil, “Forensic Analysis of Dropbox Applications on Android Using the NIST Method,” Semin. Nas. Din. Inform., pp. 119–123, 2020.
  27. D. Mualfah and R. A. Ramadhan, “Digital Forensic Analysis of CCTV Camera Recordings Using the NIST (National Institute of Standards Technology) Method,” IT J. Res. Dev., vol. 5, no. 2, pp. 171–182, 2020, doi: 10.25299/itjrd.2021.vol5(2).5731.
Index Terms

Computer Science
Information Sciences

Keywords

Forensics Browser Messenger Cybercrime NIST