CFP last date
20 May 2024
Reseach Article

Digital Data Retrieval on Web-based Twitter Services using National Institute of Standard and Technology Method

by Iraunasya Wiyanto, Imam Riadi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 184 - Number 3
Year of Publication: 2022
Authors: Iraunasya Wiyanto, Imam Riadi
10.5120/ijca2022921992

Iraunasya Wiyanto, Imam Riadi . Digital Data Retrieval on Web-based Twitter Services using National Institute of Standard and Technology Method. International Journal of Computer Applications. 184, 3 ( Mar 2022), 44-51. DOI=10.5120/ijca2022921992

@article{ 10.5120/ijca2022921992,
author = { Iraunasya Wiyanto, Imam Riadi },
title = { Digital Data Retrieval on Web-based Twitter Services using National Institute of Standard and Technology Method },
journal = { International Journal of Computer Applications },
issue_date = { Mar 2022 },
volume = { 184 },
number = { 3 },
month = { Mar },
year = { 2022 },
issn = { 0975-8887 },
pages = { 44-51 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume184/number3/32317-2022921992/ },
doi = { 10.5120/ijca2022921992 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:20:35.170201+05:30
%A Iraunasya Wiyanto
%A Imam Riadi
%T Digital Data Retrieval on Web-based Twitter Services using National Institute of Standard and Technology Method
%J International Journal of Computer Applications
%@ 0975-8887
%V 184
%N 3
%P 44-51
%D 2022
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Technological developments are increasing. Technology helps make it easier for humans to communicate. In addition to having a good impact, advances in information technology and telecommunications also have a bad impact, namely the number of crimes related to internet applications. This study was conducted based on reports from original cases that had occurred.This research was conducted to collect digital data on laptop hardware related to cases of cyber harassment that occurred through a web-based Twitter application service. This research was conducted to scenario cases of sexual harassment (sexsual harassment) using a web-based twitter service with google chrome. The process of searching and processing data is carried out using the stages of the National Institute of Standard and Technology (NIST), which has a collection, examination, analysis and reporting flow.This study obtains digital data from the acquisition results on the perpetrator's laptop and data extraction on web-based twitter running on google chrome. The results are then analyzed and matched with digital data evidence obtained by the police. The data obtained in the form of images and text captions that have been deleted, as well as email, username, password (perpetrator) and time of posting.Forensic processes were carried out with several tools with success rates, namely FTK Imager was successful at 50%, Browser History capture was successful at 100%, Browser History Viewer was successful at 100%, Browser History Examiner was successful at 50%. The findings of the evidence are the same as the reports found by the police.

References
  1. SM Wisnu Budi, Aan Widayat Kusban, Muhammad, “Computer Forensic Analysis to Support the Investigation Process in Crime Cases,” P. 12, 2015.
  2. T. Rochmadi, “Live Forensics For Anti-Forensics Analysis On Private Portable Web Browser Live Forensics For Anti-Forensics Analysis On Private Portable Web Browser,” No. May, 2017.
  3. R. Saputra And I. Riadi, “Forensic Browser Of Twitter Based On Web Services,” Int. J. Comput. app., Vol. 175, No. 29, PP. 34–39, 2020.
  4. M. Saifulloh And A. Ernanda, "Communication Privacy Management for Teenagers Using Alter Ego Accounts on Twitter," Wacana, J. Ilm. Communal Science., Vol. 17, No. 2, P. 235, 2018.
  5. Aprillia, I. (2017).This Girl Has Experienced Sexual Harassment On Social Media, Here's How To Deal With Girlbanget.Grid.Id/Love-Life-And-Sex-Education/This-Girl-Has-Experienced-Sexual-Harassment-On-Social-Media-This-How-To Deal With It.
  6. N. Anwar And I. Riadi, "Forensic Investigation Analysis of Smartphone Messenger Whatsapp Against Web-Based Whatsapp," J. Ilm. Tech. Electrical Computing. Dan Information., Vol. 3, No. 1, P. 1, 2017.
  7. M. Riskiyadi, “Forensic Investigation of Digital Evidence in Revealing Cybercrime,” Cybersecurity And Digit Forensics., Vol. 3, No. 2, PP. 12–21, 2020.
  8. P. Widiandana, I. Riadi, And Sunardi, “Forensic Investigation Analysis of Cyberbullying on Whatsapp Messenger Using the Nist Method,” Semin. Nas. technol. Fac. Engineering Univ. Krisnadwipayana, Pp. 488–493, 2019.
  9. A. Nofiyan, "Forensic Analysis of Web Phishing Using the National Institute Of Standards And Technology (Nist) Method," Jstie (Jurnal Sarj. Tek. Inform., Vol. 8, No. 2, Pp. 11–23, 2020.
  10. RAKN Bintang, R. Umar, And U. Yudhana, "Comparative Design of Live Forensics on Instagram, Facebook and Twitter Social Media Security in Windows 10," Pros. Snst Ke -9 of 2018 Fak. Tek. Univ. Wahid Hasyim, Pp. 125–128, 2018.
  11. DT Yuwono, A. Fadlil, And S. Sunardi, “Performance Comparison Of Forensic Software For Carving Files Using Nist Method,” J. Teknol. Dan Sist. Komput., Vol. 7, No. 3, Pp. 89–92, 2019.
  12. S. Rachmie, “The Role of Digital Forensic Science Against Website Hacking Case Investigation," Litigation, Vol. 21, No. 21, Pp. 104–127, 2020.
  13. S. Dogan And E. Akbal, "Analysis Of Mobile Phones In Digital Forensics,” 2017 40th Int. Conv. Inf. Commun. Technol. Electron. M microelectrons. Mipro 2017 - Proc., pp. 1241–1244, 2017.
  14. D. A. Putri and I. Riadi, “Forensic Mobile against Threat WhatsApp Services using National Institute of Standards Technology Method,” Int. J. Comput. Appl., vol. 183, no. 30, pp. 1–8, 2021.
  15. MN Faiz, R. Umar, And A. Yudhana, “Implementation of Live Forensics for Comparison of Browsers on Email Security,” Jiska (Jurnal Inform. Sunan Kalijaga), Vol. 1, No. 3, PP. 108–114, 2017.
  16. J. Bickford and P. Giura, “Safe Internet Browsing Using a Transparent Virtual Browser,” Proc. - 2nd IEEE Int. Conf. Cyber Secur. Cloud Comput. CSCloud 2015 - IEEE Int. Symp. Smart Cloud, IEEE SSC 2015, pp. 423–432, 2016.
  17. I. Riadi, R. Umar, And IM Nasrulloh, “Digital Forensic Analysis on Frozen Solid State Drives Using the National Institute Of Justice (Nij) Method,” Elinvo (Electronics, Informatics, Vocat. Educ., Vol. 3, No. 1, pp. 70–82, 2018.
  18. AS Cahyono, “Anang Sugeng Cahyono, The Influence of Social Media on Social Change in Indonesian Society,” pp. 140–157.
  19. N. Ainiyah, U. Ibrahimy, And S. Situbondo, “Millennial Adolescents and Social Media: Social Media as Educational Information Media for Millennial Youth,” Vol. 2, No. April, Pp. 221–236, 2018.
  20. MS Nazir Et Al., “The Impact of Twitter Use on Learning English,” Spectrochim. Acta - Part A Mol. Biomol. Spectrosc., Vol. 192, No. 4, pp. 121–130, 2018
  21. A. Husnusyifa, “Twitter is a type of microblogging social media that facilitates users to write their opinions. Historically, the presence and emergence of social media Twitter which provides a certain space or other social media, on the Twitter of other users,” IDEA J. Hum., vol. 2, no. 2, pp. 120–133, 2019.
  22. Y. Prayudi And DS Afrianto, “Anticipating Cybercrime Using,” J. Fak. Huh. Uii, Vol. 2005, No. Snati, 2005.
  23. C. K. Herawati and I. Riadi, “Mobile Forensic of Facebook Services using National Institute of Standard Technology (NIST) Method,” Int. J. Comput. Appl., vol. 183, no. 33, pp. 9–15, 2021.
  24. YY H, “Verbal and Nonverbal Forms of Sexual Harassment of Female Workers (Content Analysis of Niki Caro's North Country Film),” 2007.
  25. FN Rosyidah And MF Nurdin, “Distorted Behavior: Social Media as a New Space in Youth Sexual Harassment,” J. Pemikir. And Researcher. social., Vol. 2, No. 2, PP. 38–48, 2018.
  26. National Institute Of Standards AndTechnologyUs Department Of Commerce, “Nist Cybersecurity,”2019.
Index Terms

Computer Science
Information Sciences

Keywords

Forensic Web Twitter NIST Cyber ​​Harassment