Comparative analysis of Forensic Tools on Twitter applications using the DFRWS method
Bahasa Indonesia
Abstract
Current crime is increasing, one of which is the crime of using social media, although no crime does not leave digital evidence. Twitter application is a social media that is widely used by its users. Acts of crime such as fraud, insults, hate speech, and other crimes lately use many social media applications, especially Twitter. This research was conducted to find forensic evidence on the social media Twitter application that is accessed using a smartphone application using the Digital Forensics Research Workshop (DFRWS) method. These digital forensic stages include identification, preservation, collection, examination, analysis, and presentation in finding digital evidence of crime using the MOBILedit Forensic Express software and Belkasoft Evidence Center. Digital evidence sought on smartphones can be found using case scenarios and 16 variables that have been created so that digital proof in the form of smartphone specifications, Twitter accounts, application versions, conversations in the way of messages and status. This study's results indicate that MOBILedit Forensic Express digital forensic software is better with an accuracy rate of 85.75% while Belkasoft Evidence Center is 43.75%.
Downloads
References
M. I. Syahib et al., “Analisis Forensik Digital Aplikasi Beetalk Untuk Penanganan Cybercrime Menggunakan Metode Nist,” Semin. Nas. Inform. 2018 (semnasIF 2018), vol. 2018, no. November, pp. 134–139, 2018.
A. Eleyan and M. S. Anwar, “Multiresolution Edge Detection Using Particle Swarm Optimization,” Int. J. Eng. Sci. Appl., vol. 1, no. 1, pp. 11–17, 2017, doi: 10.1109/CCAA.2017.8229843.
A. A. Agus and Riskawati, “PENANGANAN KASUS CYBER CRIME DI KOTA MAKASSAR ( Studi Pada Kantor Kepolisian Resort Kota Besar Makassar ),” vol. XI, no. April, pp. 20–29, 2016.
T. D. Larasati and B. C. Hidayanto, “Analisis Live Forensics Untuk Perbandingan Aplikasi Instant Messenger Pada Sistem Operasi Windows 10,” Semin. Nas. Sist. Inf. Indones. 6 Novemb. 2017, no. November, 2017.
T. Rochmadi, I. Riadi, and Y. Prayudi, “Live Forensics for Anti-Forensics Analysis on Private Portable Web Browser,” Int. J. Comput. Appl., vol. 164, no. 8, pp. 31–37, 2017, doi: 10.5120/ijca2017913717.
I. Riadi, A. Yudhana, and W. Y. Sulistyo, “Analisis Perbandingan Nilai Kualitas Citra pada Metode Deteksi Tepi,” Rekayasa Sist. dan Teknol. Inf., vol. 4, no. 2, pp. 345–351, 2020.
Handrizal, “Analisis Perbandingan Toolkit Puran File Recovery , Glary Undelete Dan Recovery Untuk Digital Forensik,” J. sains Komput. Inform., no. 1, pp. 84–94, 2017.
M. R. Wankhade and N. M. Wagdarikar, “Feature Extraction of Edge Detected Images,” Int. J. Comput. Sci. Mob. Comput., vol. 6, no. 6, pp. 336–345, 2017.
N. Anwar and I. Riadi, “Analisis Investigasi Forensik WhatsApp Messenger Smartphone Terhadap WhatsApp Berbasis Web,” J. Ilmu Tek. Elektro Komput. dan Inform., vol. 3, no. 1, 2017, doi: 10.26555/jiteki.v3i1.6643.
I. Zuhriyanto, A. Yudhana, and I. Riadi, “Perancangan Digital Forensik Pada Aplikasi Twitter Menggunakan Metode Live Forensics,” vol. 2018, no. November, pp. 86–91, 2018.
I. Riadi, R. Umar, and I. M. Nasrulloh, “Analisis Forensik Digital Pada Frozen Solid State Drive Dengan Metode National Institute of Justice (Nij),” ELINVO (Electronics, Informatics, Vocat. Educ., vol. 3, no. 1, pp. 70–82, 2018, doi: 10.21831/elinvo.v3i1.19308.
A. L. Suryana, R. R. El Akbar, and N. Widiyasono, “Investigasi Email Spoofing dengan Metode Digital Forensics Research Workshop ( DFRWS ),” J. Edukasi dan Penelit. Inform., vol. 2, no. 2, pp. 111–117, 2016.
A. C. K. Wardana, R. Pedrason, and T. B. Prasetyo, “Implementasi Digital Forensik Brunei Darussalam Dalam Membangun Keamanan Siber,” pp. 1–22, 2017.
A. Yudhana, R. Umar, and F. M. Ayudewi, “The Monitoring of Corn Sprouts Growth Using the Region Growing Methods,” J. Phys. Conf. Ser., vol. 1373, no. 1, 2019, doi: 10.1088/1742-6596/1373/1/012054.
I. Riadi, A. Yudhana, M. Caesar, and F. Putra, “Forensic Tool Comparison on Instagram Digital Evidence Based on Android with The NIST Method,” vol. 5, no. 2, pp. 235–247, 2018.
Y. N. Kunang and A. Khristian, “Implementasi Prosedur Forensik untuk Analisis Artefak Whatsapp pada Ponsel Android,” Annu. Res. Semin. 2016, vol. 2, no. 1, pp. 59–68, 2016.
W. A. Mukti, S. U. Masruroh, and D. Khairani, “Analisa Dan Perbandingan Bukti Forensik Aplikasi Media Sosial,” J. Tek. Inform., vol. 10, no. 1, pp. 73–84, 2017, doi: 10.15408/JTI.V10I1.5617.
F. G. Hikmatyar, “Digital Forensic Analysis on Android Smartphones for Handling Cybercrime Cases,” vol. 7, no. 2, pp. 19–22, 2018.
M. Parekh and S. Jani, “Memory Forensic : Acquisition And Analysis Of Memory And Its Tools Comparison,” Communiacation, Integr. Networks Signal Process. 2018, vol. 5, no. 2: SE : February 2018, pp. 90–95, 2018, doi: 10.5281/zenodo.1198968.
I. Riadi, R. Umar, and A. Firdonsyah, “Forensic Tools Performance Analysis on Android-Based Blackberry Messenger using NIST Measurements,” Int. J. Electr. Comput. Eng., vol. 8, no. 5, pp. 3991–4003, 2018, doi: 10.11591/ijece.v8i5.pp3991-4003.
Copyright (c) 2020 Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi)
This work is licensed under a Creative Commons Attribution 4.0 International License.
Copyright in each article belongs to the author
- The author acknowledges that the RESTI Journal (System Engineering and Information Technology) is the first publisher to publish with a license Creative Commons Attribution 4.0 International License.
- Authors can enter writing separately, arrange the non-exclusive distribution of manuscripts that have been published in this journal into other versions (eg sent to the author's institutional repository, publication in a book, etc.), by acknowledging that the manuscript has been published for the first time in the RESTI (Rekayasa Sistem dan Teknologi Informasi) journal ;