![]() |
10.5120/ijca2020920832 |
Revani Saputra and Imam Riadi. Forensic Browser of Twitter based on Web Services. International Journal of Computer Applications 175(29):34-39, November 2020. BibTeX
@article{10.5120/ijca2020920832, author = {Revani Saputra and Imam Riadi}, title = {Forensic Browser of Twitter based on Web Services}, journal = {International Journal of Computer Applications}, issue_date = {November 2020}, volume = {175}, number = {29}, month = {Nov}, year = {2020}, issn = {0975-8887}, pages = {34-39}, numpages = {6}, url = {http://www.ijcaonline.org/archives/volume175/number29/31636-2020920832}, doi = {10.5120/ijca2020920832}, publisher = {Foundation of Computer Science (FCS), NY, USA}, address = {New York, USA} }
Abstract
Twitter is a social media that can be accessed through smartphones and desktops. The large number of users makes Twitter inseparable from crimes including pornography, online gambling and hate speech. In this study, the steps used are collection, examination and analysis. This study uses a laptop as an object that is scenario in a state of opening Twitter via the Google Chrome browser with two modes, namely public mode and private mode. The research used the help of forensic tools, namely ftk imager, dumpIT, belkasoft ram capturer, XhD, browser history viewer, browser history capturer, and cached video viewer. This research produces digital evidence with google chrome browser in public mode and google chrome browser in private mode. In the condition of using the browser in public mode with indicators in the form of text posts, link posts, images, and videos, the research succeeded in getting all the evidence that was sought. Meanwhile, in the private mode google chrome browser managed to get evidence with a success of 50%, namely in the form of text posts and link posts. While the remaining 50% is not found for private mode browsers, namely in image posts and video posts.
References
- WeAreSocial, & Hootsuite. Digital Report in 2019. Identified 22 October 2019, from https://wearesocial.com/blog/2019/01/global-digital-report-2019
- Nurhairani, H., & Riadi, I. (2019). Analysis Mobile Forensics on Twitter Application using the National Institute of Justice (NIJ) Method. International Journal of Computer Applications, 177 (27), 35–42. https://doi.org/10.5120/ijca2019919749
- Nurhairani, H., & Riadi, I. (2019). Analysis Mobile Forensics on Twitter Application using the National Institute of Justice (NIJ) Method. International Journal of Computer Applications, 177 (27), 35–42. https://doi.org/10.5120/ijca2019919749
- Ketaren, E. 2016. Cybercrime, Cyber Space, and Cyber Law. Times, 5 (2), 35–42. Retrieved from http://stmik-time.ac.id/ejournal/index.php/jurnalTIMES/article/viewFile/556/126
- Raka, ZD 2019. Spread of Illegal Content on Social Media (Case Study: Pornography on Bigo Live Application). 4 (1), 75–84. https://doi.org/.1037//0033-2909.I26.1.78
- Ahmad, MS 2017. Live Forensic Investigation from User's Side to Analyze Evil Twin-Based Man In The Middle Attack. Cell, 136 (4), 615–628. https://doi.org/10.1016/j.cell.2009.01.043
- Bintang, RAKN, Umar, R., & Yudhana, U. 2018. Designing a live forensics comparison on social media security Instagram, Facebook and Twitter on Windows 10. Proceedings of the 9th SNST 2018, Faculty of Engineering, Wahid Hasyim University, 125–128.
- Faiz, MN, Umar, R., & Yudhana, A. 2017. Implementation of Live Forensics for Browser Comparison on Email Security. JISKA (Journal of Informatics Sunan Kalijaga), 1 (3), 108. https://doi.org/10.14421/jiska.2017.13-02
- Yudhana, A., Riadi, I., & Zuhriyanto, I. 2019. Live Forensics Analysis of Social Media Applications in Browsers Using the Digital Forensics Research Workshop (DFRWS) Method. 20 (2), 125–130
- Larasati, TD 2017. Live Forensics Analysis For Comparison of Instant Messenger Applications (Line, Facebook, and Telegram) on Windows 10 Operating System.
- Wijaya, ES, & Subagyo, T. (2018). Analysis of Digital Evidence on Android Random Access Memory Using Live Forensic Method.
- Muhammad said Hasibuan. (2010). Design and Implementation of E-Journals as Improving Journal Services in Regional Kopertis 2. National Seminar on Information Technology Applications, 2010 (Snati), 46–50.
- Setiawan, D., Setiawan, R., Karunia, R., & Wicaksana, IWS (2007). Comparing Web Browser Performance. Gunadarma University, 1 (1), 1–6.
- WeAreSocial, & Hootsuite. Digital Report in 2019. Identified 22 October 2019, from https://wearesocial.com/blog/2019/01/global-digital-report-2019
- Saifulloh, M., & Ernanda, A. 2018. Communication Privacy Management for Adolescent Alter Ego Account Users on Twitter. WACANA, Scientific Journal of Communication Sciences, 17 (2), 235. https://doi.org/10.32509/wacana.v17i2.652
- Ahmad, MS 2017. Live Forensic Investigation from User's Side to Analyze Evil Twin-Based Man In The Middle Attack. Cell, 136 (4), 615–628. https://doi.org/10.1016/j.cell.2009.01.043
- Marini, S. 2018. Digital Forensic Study in Regulation in Indonesia. National Seminar on Energy & Technology, 103–106.
- Wahanggara, V., & Prayudi, Y. (2015). System Call Based Malicious Software Detection System for Classification of Digital Evidence Using Support Vector Machine Method. SENTRA (National Seminar on Technology and Engineering), 1–8.
- Faiz, MN, Prabowo, WA, & Sidiq, MF (2018). Digital Forensic Investigation Comparative Study on Crime. Journal of Informatics, Information Systems, Software Engineering and Applications (INISTA), 1 (1), 54–62. https://doi.org/10.20895/INISTA.V1I1
- Law of the Republic of Indonesia Number 44 of 2008 concerning Pornography. (2008). 3 (2), 54–67. Retrieved from http://repositorio.unan.edu.ni/2986/1/5624.pdf
- Raka, ZD (2019). Distribution Of Illegal Content In Social Media (Case Study: Pornography On Bigo Live Application). 4 (1), 75–84. https://doi.org/.1037//0033-2909.I26.1.78
Keywords
Forensics, Web, Browsers, Pornography, Twitter