CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Forensic Browser on Facebook Services using National Institute of Standards Technology Method

by Cintia Kus Herawati, Imam Riadi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 183 - Number 30
Year of Publication: 2021
Authors: Cintia Kus Herawati, Imam Riadi
10.5120/ijca2021921683

Cintia Kus Herawati, Imam Riadi . Forensic Browser on Facebook Services using National Institute of Standards Technology Method. International Journal of Computer Applications. 183, 30 ( Oct 2021), 17-24. DOI=10.5120/ijca2021921683

@article{ 10.5120/ijca2021921683,
author = { Cintia Kus Herawati, Imam Riadi },
title = { Forensic Browser on Facebook Services using National Institute of Standards Technology Method },
journal = { International Journal of Computer Applications },
issue_date = { Oct 2021 },
volume = { 183 },
number = { 30 },
month = { Oct },
year = { 2021 },
issn = { 0975-8887 },
pages = { 17-24 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume183/number30/32120-2021921683/ },
doi = { 10.5120/ijca2021921683 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:18:18.498391+05:30
%A Cintia Kus Herawati
%A Imam Riadi
%T Forensic Browser on Facebook Services using National Institute of Standards Technology Method
%J International Journal of Computer Applications
%@ 0975-8887
%V 183
%N 30
%P 17-24
%D 2021
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Advances in science and technology are increasingly developing, making the process of disseminating information easier. Social media is one of the media that serves to disseminate information. Facebook is one of the social media applications with 82% of users based on the total population in Indonesia. The high number of Facebook users makes many possibilities for digital crimes or cybercrime. Cybercrime is a crime that is carried out by making the computer a tool, target, and place of crime. One example of cybercrime that has the most cases is the spread of hoax news. Hoax is fake news that spreads and harms a certain party. In this study, will looked for digital evidence of the process of spreading hoax content that is accessed through the Chrome browser. This research was conducted using case scenarios adapted to the original case. The forensic process is carried out using the live forensic method by following the NIST (National Institute of Standards and Technology) stages, namely collection, examination, analysis, and reporting. This study uses forensic tools such as ftk imager, belkasoft RAM capture, browser history capture, browser history examiner, browser history viewer, and history reader. This study produces digital data that is by the evidence from the victim who was submitted to the police as report material. The data found were in the form of captions of the perpetrator's posts, comment text, history of web visits, web access time, usernames of perpetrators and victims' accounts, and cache images.Success of 50% in the form of text posts,link posts while the remaining 50% is found for images.

References
  1. M. Fitriana, KA AR, and JM Marsya, "Application of the National Institute of Standards and Technology (Nist) Methods in Digital Forensic Analysis for Handling Cyber ​​Crime," Cybersp. J. Educator. Technol. inf., vol. 4, no. 1, p. 29, 2020, doi:10.22373/cj.v4i1.7241.
  2. MW Indriyanto, D. Hariyadi, and M. Habibi, “Digital Forensics Investigation and Analysis on Whatsapp Group Conversations Using NistSp 800-86 and Support Vector Machine Digital Forensics Investigation and Analysis on Whatsapp Group Chats Using NistSp 800-86 and Support Vector Machine,” Cyber ​​Security. and Digit Forensics., vol. 3, no. 2, pp. 34–38, 2020.
  3. RA Bintang, R. Umar, and A. Yudhana, “Facebook Lite Social Media Analysis with Forensic Tools using the NIST Method,” Techno (Journal of Faculty of Tek. Univ. MuhammadiyahPurwokerto), vol. 21, no. 2, p. 125, 2020, doi:10.30595/techno.v21i2.8494.
  4. M. Riskiyadi, “Forensic Investigation of Digital Evidence in Revealing Cybercrime,” CyberSecurity and Forensic Digits., vol. 3, no. 2, pp. 12–21, 2020.
  5. S. Ikhsani and BC Hidayanto, “Forensic Analysis of Whatsapp and LINE Messenger on Android Smartphones as a Reference in Providing Strong and Valid Evidence in Indonesia,” J. Tek. ITS, vol. 5, no. 2, 2016, doi:10.12962/j23373539.v5i2.17271.
  6. I. Riadi, S. Sunardi, and S. Sahiruddin, "Forensic Analysis of Recovery on Android Smartphones Using the National Institute Of Justice (NIJ) Method," J. RekayasaTeknol. inf., vol. 3, no. 1, p. 87, 2019, doi:10.30872/jurti.v3i1.2292.
  7. MS Asyaky, "Analysis and Comparison of Digital Evidence of Instant Messenger Applications on Android," J. Researcher. Tech. information., vol. Vol. 3 No., No. 1, pp. 220–231, 2019.
  8. M. NurFaiz, W. AdiPrabowo, and M. FajarSidiq, “Comparative Study of Digital Forensics Investigations on Crime,” J. Informatics, Inf. syst. Softw. eng. app., vol. 1, no. 1, pp. 63–70, 2018, doi:10.20895/INISTA.V1I1.
  9. H. Iskandar et al., “Digital Forensics Investigation Procedures of Smart Grid Environment,” 2011.
  10. WY Sulistyo, I. Riadi, and A. Yudhana, “Application of SURF Techniques in Image Forensics for Digital Photo Engineering Analysis,” JUITA J. Inform., vol. 8, no. 2, p. 179, 2020, doi:10.30595/juita.v8i2.6602.
  11. T. Lestari et al., "Proceedings of JOINT _ U 2019 ISBN : 978-979-3649-99-3 Proceedings of SENDI _ U 2019 ISBN : 978-979-3649-99-3," Pros. SENDU_U_2019, vol. 21, no. 1, pp. 978–979, 2019.
  12. I. Riadi, A. Yudhana, and MCF Putra, “Acquisition of Digital Evidence on Android-Based Instagram Messenger Using the National Institute Of Justice (NIJ) Method,” J. Tek. information. and Sis. inf., vol. 4, no. 2, pp. 219–227, 2018.
  13. BY Prasetyo and I. Riadi, “Investigation Cyberbullying on Kik Messenger using National Institute of Standards Technology Method,” Int. J. Comput. app., vol. 174, no. 17, pp. 34–41, 2021, doi:10.5120/ijca2021921060.
  14. SD Utami, C. Carudin, and AA Ridha, “Live Forensic Analysis on Whatsapp Web for Proving Electronic Transaction Fraud Cases,” Cyber ​​Secur. and Digit Forensics., vol. 4, no. 1, pp. 24-32, 2021, doi:10.14421/csecurity.2021.4.1.2416.
  15. M. Riskiyadi, “Forensic Investigation of Digital Evidence in Revealing Cybercrime,” Cyber ​​Secur. and Digit Forensics., vol. 3, no. 2, pp. 12–21, 2020, doi:10.14421/csecurity.2020.3.2.2144.
  16. H. HARIANI, “Web Browser Exploration in Searching Digital Evidence Using Sqlite,” J. INSTEK (Informatics Science and Technology, vol. 6, no. 1, p. 66, 2021, doi: 10.24252/instek.v6i1 .18638.
  17. R. Saputra and I. Riadi, “Forensic Browser of Twitter based on Web Services,” Int. J. Comput. Appl., vol. 175, no. 29, pp. 34–39, 2020, doi: 10.5120/ijca2020920832.
  18. T. Pandela and I. Riadi, “Browser Forensics on Web-based Tiktok Applications,” Int. J. Comput. Appl., vol. 175, no. 34, pp. 47–52 , 2020, doi: 10.5120 / ijca2020920897.
  19. TE WIJATMOKO, "DIGITAL forensic READINES INDEX (DiFRI) FOR MEASURING READINESS RESPONSE Cybercrime ON REGIONAL OFFICE MINISTRY OF JUSTICE aND HUMAN rIGHTS DIY," Cyber Secur. andForensicDigits.,vol. 4, no. 1, pp. 18–23, 2021, doi: 10.14421/csecurity.2021.4.1.2235.
  20. C. Juditha, “Interaction of Hoax Communication in Social Media and its Anticipation,” J. Pekommas, vol. 3, no. 1, pp. 31–34, 2018.
  21. P. Widiandana, I. Riadi, and Sunardi, “Investigative Analysis Forensic Cyberbullying on Whatsapp Messenger Using the NIST Method," Semin. Nas. Technol. Fac. Engineering Univ. Krisnadwipayana, pp. 488–493, 2019, [Online]. Available: https://jurnal.teknikunkris.ac.id/index.php/semnastek2019/article/view/308.
  22. MI Syahib, I. Riadi, and R. Umar, “Acquisition of Digital Evidence for Viber Applications Using the National Institute of Standards Technology (NIST) Method,” J-SAKTI (Journal of Komput. dan Inform., vol. 4, no. 1, p. 170, 2020, doi: 10.30645/j-sakti.v4i1.196
  23. MB Pakarti, DH Fudholi, and Y. Prayudi, “Digital Evidence Management to Improve Accessibility During the Covid-19 Pandemic, ”J. Ilm. SINUS, vol. 19, no. 1, p. 27, 2021, doi: 10.30646/sinus.v19i1.502.
  24. Imam Riadi, Rusydi Umar, and MI Syahib, “Acquisition of Digital Evidence Viber Messenger Android Using the National Institute of Standards and Technology (NIST),” MethodJ. RESTI (System Engineering and Information Technology), vol. 5, no. 1, pp. 45–54, 2021, doi: 10.29207/resti.v5i1 .2626.
  25. I. Zuhriyanto, A. Yudhana, and I. Riadi, “Designing Digital Forensics on Twitter Applications Using Live Forensics Methods,” Semin. Nas. Inform. 2008 (semnasIF 2008), vol. 2018, no. November, pp. 86–91, 2018.
Index Terms

Computer Science
Information Sciences

Keywords

Cybercrime Facebook Hoax Live Forensic BrowserT