CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

The Comparison National Institute of Standards and Technology and Digital Forensics Research Workshop Method in Instant Messenger Services

by Vendratama Catur Prasetya, Imam Riadi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 184 - Number 6
Year of Publication: 2022
Authors: Vendratama Catur Prasetya, Imam Riadi
10.5120/ijca2022922019

Vendratama Catur Prasetya, Imam Riadi . The Comparison National Institute of Standards and Technology and Digital Forensics Research Workshop Method in Instant Messenger Services. International Journal of Computer Applications. 184, 6 ( Apr 2022), 48-55. DOI=10.5120/ijca2022922019

@article{ 10.5120/ijca2022922019,
author = { Vendratama Catur Prasetya, Imam Riadi },
title = { The Comparison National Institute of Standards and Technology and Digital Forensics Research Workshop Method in Instant Messenger Services },
journal = { International Journal of Computer Applications },
issue_date = { Apr 2022 },
volume = { 184 },
number = { 6 },
month = { Apr },
year = { 2022 },
issn = { 0975-8887 },
pages = { 48-55 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume184/number6/32337-2022922019/ },
doi = { 10.5120/ijca2022922019 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:20:49.043563+05:30
%A Vendratama Catur Prasetya
%A Imam Riadi
%T The Comparison National Institute of Standards and Technology and Digital Forensics Research Workshop Method in Instant Messenger Services
%J International Journal of Computer Applications
%@ 0975-8887
%V 184
%N 6
%P 48-55
%D 2022
%I Foundation of Computer Science (FCS), NY, USA
Abstract

There have been many crimes committed through the internet (cybercrime). Especially for the problem of cybercrime, digital forensics is needed, where the handling is the same as in other forensic fields, only in the handling of digital forensics, the media used to obtain evidence is through mobile devices and other digital devices. This researchaims to compare the results of the tools used, namely MOBILedit Forensic, Magnet AXIOM, and FTK Imager. As well as knowing the differences in digital forensic methods between the methods of the National Institute of Standards and Technology and Digital Forensics Research Workshop. In this research, it is necessary to carry out research stages including case simulation used to obtain data to be investigated next is a comparison of tools used to determine the application that has the best extraction results, the next stage is to analyze NIST method in which there are four stages including Collection, Examination, Analysis and Reporting and DFRWS method that consists of six stages, including Identification, Preservation,Collection,Examination, Analysis, and Presentation, then an analysis of the differences between two methods is carried out. The results showed the use of tool MOBILedit Forensic WhatsApp with the extraction percentage in the form of group chat and picture by 50% and tool Magnet AXIOM by 50%, and tool FTK Imager by 25%, while the use of tool Magnet AXIOM WhatsApp Business, the extraction percentage in the form of group chat and picture 50% and a tool MOBILedit Forensic is 0% and tool FTK Imager 25%. This researchcan determine the strengths and weaknesses of the forensic method between NIST and DFRWS methods in handling cyberbullying and online shop fraud, with NIST method is more inclined to reporting evidence and for handling cases that are not too complex, while DFRWS method is more directed to handling by investigators and for handling more complex cases.

References
  1. Azkiya Dihni, V. (2021). Losses Due to Cybercrime Reaches IDR 3.88 Trillion, What are the Forms? Databoks.Katadata.Co.Id.https://databoks.katadata.co.id/datapublish/2021/10/07/loss-of-cyber-crime-achieved-rp-388-trillion-what-is-form (accessed Dec. 19, 2021).
  2. Irawati, A., Fadholi, HB, Alamsyah, AN, & Dwipayana, DP (2021). The Urgency of Cyber ​​Law in the Life of Indonesian Society in the Digital Age. Proceedings of Conference on Law and Social Studies, 0(0).
  3. Social, W. are. (2021). Social Media Users Pass the 4.5 Billion Mark. Wearesocial.Com. https://wearesocial.com/uk/blog/2021/10/social-media-users-pass-the -4-5-billion-mark/ (accessed Dec. 19, 2021).
  4. Cyber, P. (2021). Statistics on the Number of Police Reports Made by the Community. Patrolisiber.Id.
  5. https://patrolisiber.id/statistics (accessed Dec. 19, 2021).
  6. Agarwal, A., Gupta, M., & Saurabh, G. (2011). Systematic Digital Forensic Investigation Model. In Saurabh Gupta & Prof. (Dr.) SC Gupta International Journal of Computer Science and Security (IJCSS) (Issue 5).
  7. Riadi, I., Yudhana, A., Caesar Febriansyah Putra, M., & Soepomo, J. (2017). Instagram Messenger Digital Evidence Recovery Analysis Using the National Institute of Standards and Technology (NIST) Method. In the National Seminar on Information and Communication Technology-SEMANTIKOM.
  8. Suryana, AL, Akbar, R. El, & Widiyasono, N. (2016). Email Spoofing Investigation Using Digital Forensics Research Workshop (DFRWS) Method. Journal of Informatics Education and Research (JEPIN), 2(2).
  9. Dwi Rahayu, Y. (2014). Building an Integrated Digital Forensics Investigation Framework (IDFIF) Using the Sequential Logic Method. National Seminar on Information and Communication Technology 2014 (SENTIKA2014).
  10. Yusoff, Y., Ismail, R., & Hassan, Z. (2011). Common Phases of Computer Forensics Investigation Models. International Journal of Computer Science and Information Technology, 3(3), 17–31.
  11. Nur Faiz, M., Adi Prabowo, W., & Fajar Sidiq, M. (2018). Journal of Informatics, Information Systems, Software Engineering and Applications Comparative Studies of Digital Forensics Investigations on Crime. Institute for Community Service (LPPM) Telkom Institute of Technology Purwokerto, 1(1), 63–70.
  12. Riadi, I., & Hamida Siregar, N. (2021). Mobile Forensics in Cyber ​​Fraud Cases Signal Messenger Service Using the NIST Method. JOINTECS (Journal of Information Technology and Computer Science), 6(3), 137–144.
  13. Riadi, I., Sunardi, & Widiandana, P. (2020). Investigating Cyberbullying on WhatsApp Using Digital Forensics Research Workshop. RESTI Journal (Systems Engineering and Information Technology), 4(4), 730–735.
  14. Shakir, A., Hammad, M., & Kamran, M. (2021). Comparative Analysis & Study of Android/iOS Mobile Forensics Tools. Digitala Vetenskapliga Arkivet.
  15. Zuhriyanto, I., Yudhana, A., & Riadi, I. (2020). Comparative Analysis of Forensic Tools on Twitter Applications Using the Digital Forensics Research Workshop Method. RESTI Journal (Systems Engineering and Information Technology), 1(3), 829–836.
  16. Raharjo, B. (2013). Overview of Digital Forensics. Journal of Sociotechnology, 12(29), 384–387, Aug. 2013, doi: 10.5614/SOSTEK.ITBJ.2013.12.29.3.
  17. Technology, B. (2020). Digital Forensics. Bagitechnology.Com.https://www.bagitechnology.com/2020/04/digital-forensic.html (accessed Dec. 19, 2021).
  18. Carrier, BD (2006). Digital Investigation and Digital Forensic Basics. Digital-Evidence.Org.https://digital-evidence.org/di_basics.html (accessed Dec. 19, 2021).
  19. Ma'ruf, F. (2014). Definition and Explanation of Digital Evidence. Academia.Edu, 1–11.
  20. Wulandari, WA (2015). Paper Forensics About the Characteristics of Digital Evidence. Academia.Edu, 14917163.
  21. Anwar, N., & Riadi, I. (2017). WhatsApp Messenger Smartphone Forensic Investigation Analysis Against Web-Based WhatsApp. Scientific Journal of Computer Electrical Engineering and Informatics, 3(1), 1.
  22. Qiscus. (2020). Get to know the History of WhatsApp Business API. Qiscus.Com https://www.qiscus.com/id/blog/menenal-sejarah-whatsapp-api/ (accessed Dec. 19, 2021).
  23. Sensor Tower. (2022). Sensor Tower - Mobile App Store MarketingIntelligence.Sensortower.Com/.https://sensortower.com/ (accessed Jan. 03, 2022).
  24. NIST. (2017). About NIST | NIST. Nist.Gov.https://www.nist.gov/about-nist (accessed Jan. 03, 2022).
  25. NIST. (2021). NIST Mission, Vision, Core Competencies, and Core Values ​​| NIST. Nist.Gov.https://www.nist.gov/about-nist/our organization/mission-vision-values ​​(accessed Jan. 03, 2022).
  26. DFRWS. (2021). About Us - DFRWS. Dfrws.Org.https://dfrws.org/about-us/ (accessed Dec. 19, 2021).
Index Terms

Computer Science
Information Sciences

Keywords

Cybercrime DFRWS NIST WhatsApp WhatsApp Business