CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Mobile Forensic on Android-based IMO Messenger Services using Digital Forensic Research Workshop (DFRWS) Method

by Afif Nur Ichsan, Imam Riadi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 174 - Number 18
Year of Publication: 2021
Authors: Afif Nur Ichsan, Imam Riadi
10.5120/ijca2021921076

Afif Nur Ichsan, Imam Riadi . Mobile Forensic on Android-based IMO Messenger Services using Digital Forensic Research Workshop (DFRWS) Method. International Journal of Computer Applications. 174, 18 ( Feb 2021), 34-40. DOI=10.5120/ijca2021921076

@article{ 10.5120/ijca2021921076,
author = { Afif Nur Ichsan, Imam Riadi },
title = { Mobile Forensic on Android-based IMO Messenger Services using Digital Forensic Research Workshop (DFRWS) Method },
journal = { International Journal of Computer Applications },
issue_date = { Feb 2021 },
volume = { 174 },
number = { 18 },
month = { Feb },
year = { 2021 },
issn = { 0975-8887 },
pages = { 34-40 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume174/number18/31778-2021921076/ },
doi = { 10.5120/ijca2021921076 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:22:29.317604+05:30
%A Afif Nur Ichsan
%A Imam Riadi
%T Mobile Forensic on Android-based IMO Messenger Services using Digital Forensic Research Workshop (DFRWS) Method
%J International Journal of Computer Applications
%@ 0975-8887
%V 174
%N 18
%P 34-40
%D 2021
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The development of mobile device technology is very rapid in this global era, This has an impact on the increase in cybercrime such as narcotics transactions using the Instant Messenger application. IMO Messenger is an Instant Messenger application that can be used as a medium for crime because it has increased the number of users every year. This study used three stages of the Digital Forensics Research Workshop (DFRWS) method, namely identification, preservation, collection. This study uses two smartphones with root and non-root conditions that have the IMO application installed. The case used in this research is narcotics transactions based on previous case scenarios. Evidence from the criminal case will be acquired using four forensic tools, namely, MOBILedit forensic express, DB Browser for SQLite, AccessData FTK Imager, and Belkasoft evidence center. This research produces digital evidence in the form of chat files, images, audio, video, perpetrator's accounts, and chat times that have been deleted from a smartphone device in root condition. Calculation of the percentage index number from the evidence obtained on a smartphone with root conditions using MOBILedit forensic express tools at 100%, DB Browser for SQLite at 33.33%, AccessData FTK Imager at 33.33% and Belkasoft evidence center at 83.33%, smartphones with non-root conditions, no digital evidence was found.

References
  1. Hootsuite, “Digital 2019: Indonesia,” Glob. Digit. Insights, p. 77, 2019.
  2. I. Zuhriyanto, A. Yudhana, and I. Riadi, “Comparative Analysis of Forensic Tools on Twitter Applications Using the Digital Forensics Research Workshop Method,” J. RESTI (Rekayasa Sist. dan Teknol. Informasi), vol. 4, no. 5, pp. 829–836, 2020.
  3. Muhammad Kukuh Tri Haryanto, “Forensics Analysis of the SQLite Database in the Android-Based IMO Application,” 2018.
  4. M. Nur Faiz, W. Adi Prabowo, and M. Fajar Sidiq, “Study Comparison of Digital Forensic Investigation on Crime,” J. Informatics, Inf. Syst. Softw. Eng. Appl., vol. 1, no. 1, pp. 63–70, 2018.
  5. Andri Puspo Heriyanto, Mobile phone forensics: theory mobile phone forensics dan security series, 1st ed. Yogyakarta, 2016.
  6. M. S. Asyaky, “Analysis and Comparison of Digital Evidence on Instant Messenger Applications on Android,” J. Penelit. Tek. Inform., vol. Vol. 3 No, no. 1, pp. 220–231, 2019.
  7. W. A. Mukti, S. U. Masruroh, D. Khairani, and B. Forensik, “Analysis and Comparison of Forensic Evidence on Social Media Applications Facebook and Twitter on Android Smartphones,” vol. 10, no. 1, 2017.
  8. A. L. Suryana, R. El Akbar, and N. Widiyasono, “Investigating Email Spoofing Using the Digital Forensics Research Workshop (DFRWS) Method,” J. Edukasi dan Penelit. Inform., vol. 2, no. 2, pp. 111–117, 2016.
  9. T. D. Larasati and B. C. Hidayanto, “Live Forensics Analysis for Comparison of Instant Messenger Applications on the Windows 10 Operating System,” Sesindo, vol. 6, no. November, pp. 456–256, 2017.
  10. Z. Akbar, B. Nugraha, and M. Alaydrus, “Whatsapp Forensics on Android Smartphones: a Survey,” Sinergi, vol. 20, no. 3, p. 207, 2016.
  11. S. RACHMIE, “The Role of Forensic Digital Science on Investigating Website Hacking Cases,” Litigasi, vol. 21, no. 21, pp. 104–127, 2020.
  12. E. Army, Electronic Evidence in Judicial Practice, 1st ed. Jakarta: Sinar Grafika, 2020.
  13. A. P. Heriyanto, Mobile Phone Forensics: Theory: Mobile Phone Forensics and Security Series, 1st ed. Yogyakarta: ANDI, 2016.
  14. C. Handoko, “The Position of Digital Evidence in Proving Cybercrime in Court,” J. Jurisprud., vol. 6, no. 1, p. 1, 2017.
  15. D. Oktavianto, Log Analysis For Forensic Digital Investigation, 4th ed. TIM Redaksi CDEF, 2018.
  16. W. Komputer, Tips and Tricks Caring for Android-Based Cell Phones. Jakarta: PT Elex Media Komputindo, 2012.
  17. E. Ketaren, “Cybercrime, Cyber ​​Space, and Cyber ​​Law,” Times, vol. 5, no. 2, pp. 35–42, 2016.
  18. S. Sunardi, I. Riadi, and M. H. Akbar, “Steganalysis of Digital Evidence on Storage Media Using the Static Forensics Method,” J. Nas. Teknol. dan Sist. Inf., vol. 6, no. 1, pp. 1–8, 2020.
  19. Wardana, Learning Programming, and Hacking Using Python. Jakarta: PT Elex Media Komputindo, 2019.
  20. Y. Anugrah, M. Hannats, H. Ichsan, and A. Kusyanti, “Implementation of the SHA-256 Algorithm Using the MQTT Protocol in Ornamental Fish Cultivation,” J. Pengemb. Teknol. Inf. dan Ilmu Komput., vol. 3, no. 4, pp. 4066–4074, 2019.
  21. D. Kurniawan, Android Hacking. Jakarta: PT Elex Media Komputindo, 2016.
Index Terms

Computer Science
Information Sciences

Keywords

Forensics Mobile IMO Messenger Cybercrime DFRWS