CFP last date
20 May 2024
Reseach Article

Facebook Browser Investigation on Chrome using National Institute of Standards and Technology Method

by Pangestu Windu Bahari, Imam Riadi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 183 - Number 44
Year of Publication: 2021
Authors: Pangestu Windu Bahari, Imam Riadi
10.5120/ijca2021921858

Pangestu Windu Bahari, Imam Riadi . Facebook Browser Investigation on Chrome using National Institute of Standards and Technology Method. International Journal of Computer Applications. 183, 44 ( Dec 2021), 35-40. DOI=10.5120/ijca2021921858

@article{ 10.5120/ijca2021921858,
author = { Pangestu Windu Bahari, Imam Riadi },
title = { Facebook Browser Investigation on Chrome using National Institute of Standards and Technology Method },
journal = { International Journal of Computer Applications },
issue_date = { Dec 2021 },
volume = { 183 },
number = { 44 },
month = { Dec },
year = { 2021 },
issn = { 0975-8887 },
pages = { 35-40 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume183/number44/32229-2021921858/ },
doi = { 10.5120/ijca2021921858 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:19:41.578005+05:30
%A Pangestu Windu Bahari
%A Imam Riadi
%T Facebook Browser Investigation on Chrome using National Institute of Standards and Technology Method
%J International Journal of Computer Applications
%@ 0975-8887
%V 183
%N 44
%P 35-40
%D 2021
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Facebook is a social network or social media that allows users to add personal information with photos, contacts or information. The important role of the development of the internet for cybercrime or cybercrime, has led to the emergence of new types of crime, such as advertisements for buying and selling organs on Facebook services. The subject of this research is digital forensics on Facebook social media that runs on the Chrome browser to uncover criminal cases of buying and selling human organs online with digital evidence. The research was conducted using standards released by the National Institute of Standard Technology (NIST). When conducting research, scenarios are made in advance to run a simulation of the collection of evidence. The results obtained from this study are posts that have been deleted and the user account used to login to the Facebook service on the Chrome browser. For data acquisition using forensic tools FTK Imager, Belkasoft RAM Capture, and Browser History Capture, while for analysis using Browser History Examiner, Browser History Viewer, and also FTK. Details of digital evidence obtained from forensic tools are FTK Imager 60%, Belkasoft RAM Capture 60%, Browser History Capture 60%, Browser History Examiner 60% and Browser History Viewer 60%. The results obtained from this research are posts that have been deleted and the user account used to login to the Facebook service on the Chrome browser.

References
  1. S. R. Ardiningtias et al., “Investigasi Digital Pada Facebook Messenger,” pp. 19–26, 2018.
  2. G. Atiko, R. H. Sudrajat, K. Nasionalita, and U. Telkom,Analysis of Tourism Promotion Strategies Through Social Media by the Ministry of Tourism (Descriptive Study on Instagram Account @Indtravel) 3(2):2349–58.
  3. I. Z. Yadi and Y. N. Kunang, “National Conference on Computer Science (KONIK) 2014 Forensic Analysis on Android Platform,” Konf. Nas. Ilmu Komput., p. 142, 2014,[Online].Available:http://eprints.binadarma.ac.id/2191/.
  4. Hadiyat and Yayat. 2017. “Online Prostitution Communication Patterns on Twitter." Journal of Communication and Development Research 18(2):125. Doi: 10.31346/Jpkp.V18i2.1219.
  5. Y. Prayudi and D. S. Afrianto, “Anticipation Of Cybercrime Using Computer Engineering,” vol. 2007, no. Snati, 2007.
  6. P. T. Informasi and F. Tarbiyah 2020. “Application of National Institute of Standards and Technology (Nist) Methods in Digital Forensic Analysis for Handling Cyber Crime.” 4:29–39.
  7. D. T. Yuwono and Y. W, “Comparative Analysis of File Carving with the Nist Method,” J. Sains Komput. dan Teknol. Inf., vol. 2, no. 2, pp. 1–6, 2020, doi: 10.33084/jsakti.v2i2.1472
  8. N. Nasirudin, S. Sunardi, and I. Riadi, “Forensic Analysis of Android Smartphones Using NIST Method and MOBILedit Forensic Express Tool,” J. Inform. Univ. Pamulang, vol. 5, no. 1, p. 89, 2020, doi: 10.32493/informatika.v5i1.4578.
  9. T. Rochmadi, “Live Forensics for Anti-Forensic Analysis on a Web Browser Case Study Browzar,” Indones. J. Bus. Intell., vol. 1, no. 1, p. 32, 2019, doi: 10.21927/ijubi.v1i1.878.
  10. M. F. Sidiq and M. N. Faiz, “Review of Web Browser Forensics Tools to Support Digital Evidence Searching,” J. Edukasi dan Penelit. Inform., vol. 5, no.1, p. 67, 2019, doi: 10.26418/jp.v5i1.31430.
  11. Y. Prayudi and D. S. Afrianto, “Anticipation of Cybercrime Using Computer Techniques.” vol 2007, no. Snati,2007.
  12. T. Santoso. (1997) Sexuality and criminal law. Jakarta. Ind-Hill-Co. Hal. 134
  13. B. Raharjo, “More About Digital Forensics.” pp. 384–387.
  14. I. Saputra and M. N. Azhar, “Analysis and Forensic Investigation of Digital Live Memory on Whatsapp Application.” pp. 119–125, 2018.
  15. S. D. Utami, C. Carudin, and A. A. Ridha, “Live Forensic Analysis on Whatsapp Web for Proving Electronic Transaction Fraud Cases,” Cyber Secur. dan Forensik Digit., vol. 4, no. 1, pp. 24–32, 2021, doi: 10.14421/csecurity.2021.4.1.2416.
  16. J. P. Soepomo, “Forensic Analysis Of Digital Evidence On Frozen Solid State Drive Using The National Institute Of Standards And Technology (Nist) Method,” Vol. 2, No. 2, Pp. 33–40, 2017.
  17. J. P. Soepomo, “Forensic analysis of the KakaoTalk application using the National Institute Standard Technology method,” vol. 2018, no. November, pp. 129–133, 2018.
  18. P. Studi, T. Informatika, U. Ahmad, J. P. Soepomo, and S. H. J. Yogyakarta, “Forensic Analysis Instant Messenger Application,” vol. 2, no. 2, pp. 25–32, 2017.
  19. W. Sanjaya, B. Sugiantoro, and Y. Prayudi, “A Offline Forensic Methods for Digital Analysis of Artifacts On TOR Browsers in Linux Operating Systems,” JITU J. Inform. Technol. Commun., vol. 4, no. 2, pp. 41–51, 2020, doi: 10.36596/jitu.v4i2.345.
  20. P. Widiandana and I. Riadi, “Cyberbullying Forensic Investigation Analysis On Whatsapp Messenger Using The National Institute Of Standards And Technology (Nist) Method,” pp. 488–493, 2019.
  21. D. T. Yuwono, A. Fadlil, and S. Sunardi, “Performance Comparison of Forensic Software for Carving Files using NIST Method,” J. Teknol. dan Sist. Komput., vol. 7, no. 3, pp. 89–92, 2019, doi: 10.14710/jtsiskom.7.3.2019.89-92.
  22. D. Zarella,(2010) The Social Media Marketing Book. Sebastopol: O’reilly Media.Inc.
  23. I. Zuhriyanto et al.,“Digital Forensic Design in Applications.” Semin. Nas. Inform., vol. 2018, no. November, pp. 86–91, 2018.
  24. D. A. Putri, and I. Riadi, “Forensic Mobile against Threat WhatsApp Services using National Institute of Standards Technology Method,” vol. 183, no. 30, pp. 1–8, 2021.
  25. A. P. Utami, and I. Riadi, “Mobile Forensics Analysis of Line Messenger on Illegal Drug Transaction Case using National Institute of Standard Technology ( NIST ) Method,” vol. 183, no. 32, pp. 23–33, 2021.
Index Terms

Computer Science
Information Sciences

Keywords

Digital Forensic Facebook Cybercrime Advertising buying and selling human organs NIST Web browser