CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Mobile Forensic Signal Instant Messenger Services in Case of Web Phishing using National Institute of Standards and Technology Method

by Trisna Irawan, Imam Riadi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 184 - Number 32
Year of Publication: 2022
Authors: Trisna Irawan, Imam Riadi
10.5120/ijca2022922394

Trisna Irawan, Imam Riadi . Mobile Forensic Signal Instant Messenger Services in Case of Web Phishing using National Institute of Standards and Technology Method. International Journal of Computer Applications. 184, 32 ( Oct 2022), 30-40. DOI=10.5120/ijca2022922394

@article{ 10.5120/ijca2022922394,
author = { Trisna Irawan, Imam Riadi },
title = { Mobile Forensic Signal Instant Messenger Services in Case of Web Phishing using National Institute of Standards and Technology Method },
journal = { International Journal of Computer Applications },
issue_date = { Oct 2022 },
volume = { 184 },
number = { 32 },
month = { Oct },
year = { 2022 },
issn = { 0975-8887 },
pages = { 30-40 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume184/number32/32519-2022922394/ },
doi = { 10.5120/ijca2022922394 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:22:57.602770+05:30
%A Trisna Irawan
%A Imam Riadi
%T Mobile Forensic Signal Instant Messenger Services in Case of Web Phishing using National Institute of Standards and Technology Method
%J International Journal of Computer Applications
%@ 0975-8887
%V 184
%N 32
%P 30-40
%D 2022
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The increasing online dependence of the entire world creates opportunities for cybercrime to occur. One of the problems with instant messaging applications that trigger phishing cybercrimes is the Signal application.Phishing is a criminal activity that uses social engineering techniques.The purpose of this study is to carry out a forensic process on an android smartphone in the form of a web phishing case using the National Institute of Standards and Technology (NIST) method to obtain digital evidence on the Signal Instant Messenger application.This study uses the NIST method with four forensic stages, namely collection, examination, analysis, and reporting. Forensic tools used to collect digital evidence are MOBILedit Forensic Express Pro and Belkasoft Evidence Center. The process in obtaining evidence is by making acquisitions of two smartphones. The acquisition results are used as digital evidence to prove the occurrence of crimes that lead to web phishing cases.The results of this study show that the MOBILedit Forensic Express Pro and Belkasoft Evidence Center tools obtained evidence from the first smartphone in the form of contacts, account phone numbers, text messages, and picture messages. Meanwhile, the second smartphone did not get the expected evidence, either using the MOBILedit Forensic Express Pro or Belkasoft Evidence Center tools, because the smartphone was not rooted and the security of the encrypted storage device system failed at the acquisition stage for digital evidence retrieval.It is hoped that further research will be able to acquire on smartphones the state of the data intentionally or accidentally deleted by the perpetrators and be able to acquire the latest android version.

References
  1. M. Riskiyadi, “Forensic Investigation of Digital Evidence in Exposing Cybercrime,” CyberSecurity and Digit Forensics., vol. 3, no. 2, hal. 12–21, 2020, [Daring]. Available on: http://202.0.92.5/saintek/cybersecurity/article/view/2144.
  2. Imam Riadi, Rusydi Umar, dan M. I. Syahib, “Digital Evidence Acquisition of Viber Messenger Android Using National Institute of Standards and Technology (NIST) Method,” J. RESTI (Rekayasa Sist. dan Teknol. Informasi), vol. 5, no. 1, hal. 45–54, 2021, doi: 10.29207/resti.v5i1.2626.
  3. I. Riadi, Sunardi, dan P. Widiandana, “Investigating Cyberbullying on WhatsApp Using Digital Forensics,” J. RESTI (Rekayasa Sist. dan Teknol. Informasi), vol. 4, no. 4, hal. 730–735, 2020, [Daring]. Available on: https://jurnal.iaii.or.id/index.php/RESTI/article/view/2161/285.
  4. P. E. Reports, P. S. Trends, B. P. Measurement, E. P. Attacks, M. Targeted, dan I. Sectors, “Uni fying the Global Response To Cybercrime,” no. June, hal. 1–13, 2022.
  5. K. Khairunnisak, H. Ashari, dan A. P. Kuncoro, “Forensic Analysis To Detect Authenticity Of Digital Image Using The Nist Method,” J. Resist. (Rekayasa Sist. Komputer), vol. 3, no. 2, hal. 72–81, 2020, doi: 10.31598/jurnalresistor.v3i2.634.
  6. A. Yudhana, A. Fadlil, dan M. R. Setyawan, “Analysis of Skype Digital Evidence Recovery based on Android Smartphone Using NIST Framework,” J. RESTI (Rekayasa Sist. dan Teknol. Informasi), vol. 4, no. 4, hal. 682–690, 2020, [Daring]. Available on: http://jurnal.iaii.or.id/index.php/RESTI/article/view/2093/278.
  7. M. Unik, V. G. Larenda, dan H. Mukhtar, “Android Forensic Short Message Service (SMS) Investigation Analysis On Smartphone,” JOISIE (Journal Inf. Syst. Informatics Eng., vol. 3, no. 1, hal. 10–15, 2019, [Daring]. Available on: http://www.ejournal.pelitaindonesia.ac.id/ojs32/index.php/JOISIE/article/download/414/374.
  8. D. Mualfah dan R. A. Ramadhan, “Digital Forensic Analysis of CCTV Camera Recordings Using the NIST (National Institute of Standards Technology) Method,” IT J. Res. Dev., vol. 5, no. 2, hal. 171–182, 2020, doi: 10.25299/itjrd.2021.vol5(2).5731.
  9. N. Nasirudin, S. Sunardi, dan I. Riadi, “Forensic Analysis of Android Smartphones Using the NIST Method and the MOBILedit Forensic Express Tool,” J. Inform. Univ. Pamulang, vol. 5, no. 1, hal. 89, 2020, doi: 10.32493/informatika.v5i1.4578.
  10. A.- Ahmadi, “Google Drive Forensic Data Acquisition On Android With The National Institute of Justice (NIJ) Method,” J. CoreIT J. Has. Penelit. Ilmu Komput. dan Teknol. Inf., vol. 4, no. 1, hal. 8, 2018, doi: 10.24014/coreit.v4i1.5803.
  11. M. Fitriana, K. A. AR, dan J. M. Marsya, “Application of the National Institute of Standards and Technology (NIST) Method in Digital Forensic Analysis for Handling Cyber Crime,” Cybersp. J. Pendidik. Teknol. Inf., vol. 4, no. 1, hal. 29, 2020, doi: 10.22373/cj.v4i1.7241.
  12. S. Madiyanto, H. Mubarok, dan N. Widiyasono, “Mobile Forensics Investigation Mobile Forensics Investigation Process on IOS-Based Smartphones,” J. Rekayasa Sist. Ind., vol. 4, no. 01, 2017, doi: 10.25124/jrsi.v4i01.149.
  13. I. Riadi, A. Yudhana, dan M. Al Barra, “Mobile Forensics on LinkedIn Social Media Services,” JISKA (Jurnal Inform. Sunan Kalijaga), vol. 6, no. 1, hal. 9–20, 2021, doi: 10.14421/jiska.2021.61-02.
  14. A. Wirara, B. Hardiawan, dan M. Salman, “Identification of Digital Evidence on Mobile Device Acquisition of Instant Messaging Application 'WhatsApp,’” Teknoin, vol. 26, no. 1, hal. 66–74, 2020, doi: 10.20885/teknoin.vol26.iss1.art7.
  15. E. Zuliarso dan H. Februariyant, “Utilization of Instant Messaging for Academic Service Applications,” Jurna; Teknol. Inf. Din., vol. 18, no. 2, hal. 112–121, 2013.
  16. N. Iman, A. Susanto, dan R. Inggi, “Analysis of Digital Forensics Development in Cybercrime Investigation in Indonesia (Systematic Review),” J. Telekomun. dan Komput., vol. 9, no. 3, hal. 186, 2020, doi: 10.22441/incomtech.v9i3.7210.
  17. F. Natsir, “Content Forensic Analysis and Timestamp on Tiktok App,” STRING (Satuan Tulisan Ris. dan Inov. Teknol., vol. 6, no. 2, hal. 203, 2021, doi: 10.30998/string.v6i2.11454.
  18. Z. Efendy, I. E. Putra, dan R. Saputra, “Phishing Web Attack Analysis on E-commerce Services with Network Forensic Process Method,” J. Terap. Teknol. Inf., vol. 2, no. 2, hal. 135–146, 2019, doi: 10.21460/jutei.2018.22.103.
  19. J. Ju dkk., “Cyberfraud Criminal Witness In Law Number 11 Year 2008 Regarding Information and Electronic Transactions Reviewed According to Islamic Criminal Law,” J. Chem. Inf. Model., vol. 43, no. 1, hal. 7728, 2020, [Daring]. Available on: https://online210.psych.wisc.edu/wp-content/uploads/PSY-210_Unit_Materials/PSY-210_Unit01_Materials/Frost_Blog_2020.pdf%0Ahttps://www.economist.com/special-report/2020/02/06/china-is-making-substantial-investment-in-ports-and-pipelines-worldwide%0Ahttp://.
  20. A. Nofiyan dan M. Mushlihudin, “Forensic Analysis on Web Phishing Using the National Institute Of Standards And Technology (NIST) Method,” JSTIE (Jurnal Sarj. Tek. Inform., vol. 8, no. 2, hal. 53, 2020, doi: 10.12928/jstie.v8i2.16697.
  21. Y. N. K. Yadi, Ilman Zuhri, “Forensic Analysis On Android Platform,” J. Rekayasa Teknol. Inf., vol. 3, no. 1, hal. 87–95, 2019.
  22. H. M. Al Fawareh dan S. Jusoh, “The Use and Effects of Smartphones in Higher Education,” Int. J. Interact. Mob. Technol., vol. 11, no. 6, hal. 103–111, 2017, doi: 10.3991/ijim.v11i6.7453.
  23. I. Riadi, A. Yudhana, M. Caesar, dan F. Putra, “Digital Evidence Acquisition on Android-Based Instagram Messenger Using the National Institute Of Justice (NIJ) Method,” J. Tek. Inform. dan Sist. Inf., vol. 4, hal. 219–227, 2018.
  24. A. Yudhana, I. Riadi, dan I. Anshori, “Facebook Messenger Digital Evidence Analysis Using the Nist Method,” It J. Res. Dev., vol. 3, no. 1, hal. 13–21, 2018, doi: 10.25299/itjrd.2018.vol3(1).1658.
  25. Mustafa, I. Riadi, dan R. Umar, “E-mail Forensic Investigation Design with the National Institute of Standards and Technology (NIST) Method,” Snst Ke-9, vol. 9, hal. 121–124, 2018, [Daring]. Available on: https://publikasiilmiah.unwahas.ac.id/index.php/PROSIDING_SNST_FT/article/download/2385/2371.
Index Terms

Computer Science
Information Sciences

Keywords

Mobile Forensic NIST Phishing Signal Instant Messenger