CFP last date
20 August 2024
Reseach Article

Email Forensic from Phishing Attack using Network Forensics Development Life Cycle Method

by Zakiyaturrahma, Imam Riadi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 183 - Number 46
Year of Publication: 2022
Authors: Zakiyaturrahma, Imam Riadi

Zakiyaturrahma, Imam Riadi . Email Forensic from Phishing Attack using Network Forensics Development Life Cycle Method. International Journal of Computer Applications. 183, 46 ( Jan 2022), 36-42. DOI=10.5120/ijca2022921865

@article{ 10.5120/ijca2022921865,
author = { Zakiyaturrahma, Imam Riadi },
title = { Email Forensic from Phishing Attack using Network Forensics Development Life Cycle Method },
journal = { International Journal of Computer Applications },
issue_date = { Jan 2022 },
volume = { 183 },
number = { 46 },
month = { Jan },
year = { 2022 },
issn = { 0975-8887 },
pages = { 36-42 },
numpages = {9},
url = { },
doi = { 10.5120/ijca2022921865 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
%0 Journal Article
%1 2024-02-07T01:20:09.368070+05:30
%A Zakiyaturrahma
%A Imam Riadi
%T Email Forensic from Phishing Attack using Network Forensics Development Life Cycle Method
%J International Journal of Computer Applications
%@ 0975-8887
%V 183
%N 46
%P 36-42
%D 2022
%I Foundation of Computer Science (FCS), NY, USA

Phishing is a technique used by attackers to steal email users' social media accounts by tricking the target into visiting a fake website that has a login form. Due to lack of awareness and insight in internet network education, users are very vulnerable to fall into the trap of attackers. A phishing email attack is a data manipulation activity that is visible in email headers. The purpose of this study is to assist email users in assessing email messages so as not to become victims of phishing attacks. The purpose of this study is to conduct forensics on phishing email attacks. NFDLC method is used to examine cybercrime digital forensic processes and create digital evidence. Wireshark and NetworkMiner programs are used to deduce the IP and IP address of the perpetrator. This research produces an analysis of phishing email attacks against fake login forms. The evidence obtained in the form of a wireshark data packet capture file that managed to capture the victim's IP address, the attacker's IP address, the sender's email, and the phishing website. The experimental results, it is proven that the Network Forensic Development Life Cycle method can analyze phishing email attacks detected on network traffic activity, with the results of data packet analysis carried out header comparison analysis.

  1. Ahmad, M. S., Riadi, I. and Prayudi, Y. (2017) 'Live Forensic Investigation from the User Side to Analyze Man in The Middle Attack', 9(April), Pp. 1–8.
  2. Efendy, Z., Putra, I. E. and Saputra, R. (2019) ‘Asset Rental Information System and Web-Based Facilities at Andalas University’, Journal of Applied Information Technology, 2(2), Pp. 47–58. Doi: 10.21460/Jutei.2018.22.103.
  3. Karsono, K. (2012) 'Forensic E-Mail', 9.
  4. Faiz, M. and Cilacap, P. N. (2017) 'Live Forensics Analysis for Comparisonal Email Security', (April). Doi: 10.33096/Ilkom.V8i3.79.242-247.
  5. Mia Haryati Wibowo, N. F. (2017) 'The Threat of Phishing to Social Media Users in Cyber Crime', 1, Pp. 1–5.
  6. Faiz, M. N., Umar, R. and Yudhana, A. (2016) 'Analysis of Live Forensics for Comparison of Email Security in Proprietary Operating Systems', Ilkom Scientific Journal, 8(3), P. 242. Doi:10.33096/Ilkom.V8i3.79.242-247.
  7. Hidayat, M. R. (2021) ‘Investigation of Botnet Attacks using Network Forensic Development Life Cycle Method’, 183(25), Pp. 30–36.
  8. Hanipah, R. (2020) ‘Wireshark’, 4(1), Pp. 11–23.
  9. Hadianto, T., Prasetyo, W. and Bahaweres, R. B. (2017) 'Comparative Study of Email Forensic Tools', 10(1), Pp. 53–61.
  10. Ginanjar, A., Widiyasono, N. and Gunawan, R. (2018) 'Analysis of Web Phishing Attacks on E-commerce Services with the Network Forensic Process Method', (2), pp. 147–157. doi: 10.21460/jutei.2018.22.103.
  11. Radiansyah, I. and Priyadi, Y. (2016) 'Analysis of Internal Phishing Threats', 7(1).
  12. Fatimah, M. H. W. and N. (2017) 'The Threat of Phishing to Social Media Users in the World of Cyber Crime', Joeict (Journal of Education and Information Communication Technology), 1, Pp. 1–5. Doi:10.29100/.V1i1.69.
  13. Ardhi, N. H. (2020) Geolocation Tracking in Forensic Email Integrated with Twitter Geo-Social Network.
  14. Andrian Maftuh Nadzifan, F. N. (2018) 'Application to Detect Spoof in Email 268', 7(September), Pp. 268–272.
  15. Purwiantono, F. E. K. A. Et Al. (2017) 'Classification Model for Detection of Phising Sites in Indonesia'.
  16. Mandowen, S. A. (2016) ‘Forensic Analysis of Computers on Network Traffic 1’, 16, Pp. 14–20.
  17. Hamid (2017) 'Analysis of Security of Android and Gmail Default Email Applications on Wireless Networks', 23, Pp. 125–136.
  18. Kurniawan, A. (2019) 'Application of Owasp Framework and Network Forensics for Analysis, Detection, and Prevention of Injection Attacks on the Host-Based Side', 14(1), Pp. 9–18.
  19. Umar, R., Riadi, I. and Muthohirin, B. F. (2018) 'Acquisition of Email Service Based Android using Nist', 3(3), Pp. 263–270.
  20. Nofiyan, A. (2020) 'Forensic Analysis on Web Phishing using National Institute of Standards and Technology (NIST) Method', 8(2), Pp. 11–23.
  21. Suryana, A. L., Akbar, R. El and Widiyasono, N. (2016) 'Investigation of Email Spoofing with the Digital Forensics Research Workshop (Dfrws) Method', Journal Of Informatics Education and Research (Jepin), 2(2), Pp. 111–117. Doi:10.26418/Jp.V2i2.16821.
  22. Susanto, B. M. Et Al. (2016) 'Identification of Phising Websites with Attribute-Based Selection', 2016(Sentika), Pp. 18–19.
  23. Hoiriyah, Sugiantro, B., Prayudi, P. (2016) 'Forensic Investigation of Email Spofing using the Header Analysis Method', 17.
  24. Sah, A. Et Al. (2018) 'Digital Evidence Detection Online Gambling using Live Abstract', 1(1), Pp. 14–19.
  25. Yudho, O. and Pranolo, A. (2018) 'Email Address Crawler Agent using the Breadth-First Crawling Method', 6(1), Pp. 9–17.
Index Terms

Computer Science
Information Sciences


Forensics Cybercrime Email Phishing NFDLC.