Analisis Forensik Aplikasi Michat Menggunakan Metode Digital Forensics Research Workshop

Galih Fanani, Imam Riadi, Anton Yudhana

Abstract


The development of information technology has had various positive and negative effects. The positive impact that information technology can have is to make it easier for people to communicate with others in the world, and the negative impact is that society is out of control when using its applications. It is an attitude that causes various crimes in the world caused by cyberspace (cybercrime) One of the most widely used instant messaging applications is Michat. The MiChat app causes cybercrime, pornography, online gambling, fraud, cyberbullying and drug trafficking. Evidence research is conducted using one of the frameworks of the digital forensic research workshop. In this framework, forensic identification, preservation, collection, investigation, analysis, and presentation phases are designed to find evidence of digital crime. The forensic tools used to collect evidence are mobility forensic express pro, a DB browser for SQLite, and oxygen forensic detective. Results are presented in the form of reports and evidence, and text chat files, contacts, images, audio, video, and web caches are generated. Forensic tools have a 100% success rate in finding evidence. Comparing the functions of the three forensic tools, the mobility forensic express pro has a processing rate of 66.7%, DB browser for SQLite has 33.3%, and oxygen forensic detective has 83.3%. Digital evidence can be used as corroborating evidence in a trial

Keywords


Digital Forensik; DFRWS; Forensik Mobile; MiChat; Smartphone

Full Text:

PDF

References


N. D. Iskuntianti, M. A. Faisal, J. Naimah, and V. F. Sanjaya, “The Influence Of Brand Image, Lifestyle, And Product Quality on Purchasing Decisions,†Journal of Business Management Review, vol. 1, no. 6, pp. 436–448, Dec. 2020, doi: 10.47153/jbmr16.752020.

J. J. Siregar, “Analisis Explotasi Keamanan … (Junita Juwita Siregar) ANALISIS EXPLOTASI KEAMANAN WEB DENIAL OF SERVICE ATTACK.â€

M. Rauf, A. Prasetio, S. Sos, and M. Si, “AKTIVITTAS KOMUNIKASI APLIKASI PENCARIAN JODOH PADA MEDIA MiChat,†2021.

J. Elektronik, I. K. Udayana, K. Dwi, O. Mahendra, I. Komang, and A. Mogi, “Digital Forensic Analysis of Michat Applications on Android as Digital Proof in Handling Online Prostitution Cases,†Jurnal Elektronik Ilmu Komputer Udayana, vol. 9, no. 3, pp. 381–390, 2021.

A. Sanchez, N. Han, and P. Jones, “Mexico: Organized Crime and Drug Trafficking Organizations Related papers T he St rat egic Implicat ions of t he Cárt el de Jalisco Nueva Generación.†[Online]. Available: www.crs.gov

A. Sanchez, N. Han, and P. Jones, “Mexico: Organized Crime and Drug Trafficking Organizations Related papers T he St rat egic Implicat ions of t he Cárt el de Jalisco Nueva Generación.†[Online]. Available: www.crs.gov

V. L. Schul’tz, V. v. Kul’ba, A. B. Shelkov, and L. v. Bogatyryova, “Scenario Analysis of Improving the Effectiveness of Cybercrime Investigation Management Problems,†IFAC-PapersOnLine, vol. 54, no. 13, pp. 155–160, 2021, doi: 10.1016/j.ifacol.2021.10.437.

N. Iman, A. Susanto, and R. Inggi, “Analisa Perkembangan Digital Forensik dalam Penyelidikan Cybercrime di Indonesia (Systematic Review),†Jurnal Telekomunikasi dan Komputer, vol. 9, no. 3, p. 186, Jan. 2020, doi: 10.22441/incomtech.v9i3.7210.

M. N. O. Sadiku, M. Tembely, and S. M. Musa, “Digital Forensics,†International Journal of Advanced Research in Computer Science and Software Engineering, vol. 7, no. 4, pp. 274–276, Apr. 2017, doi: 10.23956/ijarcsse/V7I4/01404.

I. Riadi, R. Umar, and M. Fauzan Gustafi, “Audio Forensics on Smartphone with Digital Forensics Research Workshop (DFRWS) Method,†2021.

S. L. Garfinkel, “Digital forensics research: The next 10 years,†Digital Investigation, vol. 7, no. SUPPL., 2010, doi: 10.1016/j.diin.2010.05.009.

S. Garfinkel, P. Farrell, V. Roussev, and G. Dinolt, “Bringing science to digital forensics with standardized forensic corpora,†Digital Investigation, vol. 6, no. SUPPL., 2009, doi: 10.1016/j.diin.2009.06.016.

I. Riadi, Sunardi, and P. Widiandana, “Investigasi Cyberbullying pada WhatsApp Menggunakan Digital Forensics Research Workshop,†masa berlaku mulai, vol. 1, no. 3, pp. 730–735, 2017.

R. S. C. Ieong, “FORZA - Digital forensics investigation framework that incorporate legal issues,†Digital Investigation, vol. 3, no. SUPPL., pp. 29–36, 2006, doi: 10.1016/j.diin.2006.06.004.

I. Riadi, A. Yudhana, and Putra Ferbiansyah C M, “Akuisisi Bukti Digital Pada Instagram Messenger Berbasis Android Menggunakan Metode National Institute Of Justice(NIJ),†Jurnal Teknik Informatika dan Sistem Informasi, vol. 4, no. 2, pp. 219–227, 2018.

I. Riadi and A. Dahlan, “Analisis Forensik Recovery pada Smartphone Android Menggunakan Metode National Institute Of Justice (NIJ),†JURTI, vol. 3, no. 1, 2019, [Online]. Available: www.Belkasoft.com,

I. Riadi and A. Dahlan, “Analisis Forensik Recovery pada Smartphone Android Menggunakan Metode National Institute Of Justice (NIJ),†JURTI, vol. 3, no. 1, 2019, [Online]. Available: www.Belkasoft.com,

A. Yudhana, R. Umar, and A. Ahmadi, “Akuisisi Data Forensik Google Drive Pada Android Dengan Metode National Institute of Justice (NIJ),†2018.

H. Nurhairani and I. Riadi, “Analysis Mobile Forensics on Twitter Application using the National Institute of Justice (NIJ) Method,†2019.

A. G. Smith, “Risk Factors and Indicators Associated With Radicalization to Terrorism in the United States: What Research Sponsored by the National Institute of Justice Tells Us,†2018.

V. A. Yuliani and I. Riadi, “Forensic Analysis WhatsApp Mobile Application On Android-Based Smartphones Using National Institute of Standard and Technology (NIST) Framework,†2019.

H. Trisnasenjaya and I. Riadi, “Forensic Analysis of Android-based WhatsApp Messenger Against Fraud Crime Using The National Institute of Standard and Technology Framework,†2019.

I. Riadi, R. Umar, and M. Fauzan Gustafi, “Audio Forensics on Smartphone with Digital Forensics Research Workshop (DFRWS) Method,†2021.

A. Yudhana, I. Riadi, I. Zuhriyanto, and A. Dahlan, “Analisis Live Forensics Aplikasi Media Sosial Pada Browser Menggunakan Metode Digital Forensics Research Workshop (DFRWS),†vol. 20, no. 2, pp. 125–130, 2019, [Online]. Available: http://jurnalnasional.ump.ac.id/index.php/Techno

I. Riadi, R. Umar, and M. A. Aziz, “Forensik Web Layanan Instant Messaging Menggunakan Metode Association of Chief Police Officers (ACPO),†Mobile and Forensics, vol. 1, no. 1, p. 30, Sep. 2019, doi: 10.12928/mf.v1i1.705.

H. Lallie and L. Pimlott, “Applying the ACPO Principles in Public Cloud Forensic Investigations,†Journal of Digital Forensics, Security and Law, 2012, doi: 10.15394/jdfsl.2012.1113.

K. A. Latif, R. Hammad, T. T. Sujaka, K. Marzuki, and A. S. Anas, “Forensic Whatsapp Investigation Analysis on Bluestack Simulator Device Using Live Forensic Method With ACPO Standard,†International Journal of Information System & Technology Akreditasi, vol. 5, no. 3, pp. 331–338, 2021.

R. #1, I. Riadi, and Y. Prayudi, “Penerapan Integrated Digital Forensic Investigation Framework v2 (IDFIF) pada Proses Investigasi Smartphone,†2016.

M. R. Setyawan, A. Yudhana, and A. Fadlil, “Data Acquisition On Messenger Skype Using The National Institute Of Justice Method,†Systemic: Information System and Informatics Journal, vol. 5, no. 2, pp. 13–18, Mar. 2020, doi: 10.29080/systemic.v5i2.724.

A. Yudhana, R. Umar, and A. Ahmadi, “Akuisisi Data Forensik Google Drive Pada Android Dengan Metode National Institute of Justice (NIJ).â€

I. Riadi, A. Yudhana, M. Caesar, and F. Putra, “Forensic Tool Comparison on Instagram Digital Evidence Based on Android with The NIST Method,†Scientific Journal of Informatics, vol. 5, no. 2, pp. 2407–7658, 2018, [Online]. Available: http://journal.unnes.ac.id/nju/index.php/sji

A. Yudhana, I. Riadi, and I. Anshori, “Analisis Bukti Digital Facebook Messenger Menggunakan Metode Nist,†IT JOURNAL RESEARCH AND DEVELOPMENT, vol. 3, no. 1, pp. 13–21, Aug. 2018, doi: 10.25299/itjrd.2018.vol3(1).1658.

A. Yudhana, I. Riadi, and I. Zuhriyanto, “Analisis Live Forensics Aplikasi Media Sosial Pada Browser Menggunakan Metode Digital Forensics Research Workshop (DFRWS),†vol. 20, no. 2, pp. 125–130, 2019, [Online]. Available: http://jurnalnasional.ump.ac.id/index.php/Techno

R. Umar, A. Yudhana, and M. Nur Faiz, “Experimental Analysis of Web Browser Sessions Using Live Forensics Method,†International Journal of Electrical and Computer Engineering (IJECE), vol. 8, no. 5, p. 2951, Oct. 2018, doi: 10.11591/ijece.v8i5.pp2951-2958.

I. Riadi, R. Umar, and M. A. Aziz, “Forensik Web Layanan Instant Messaging Menggunakan Metode Association of Chief Police Officers (ACPO),†Mobile and Forensics, vol. 1, no. 1, p. 30, Sep. 2019, doi: 10.12928/mf.v1i1.705.

A. Yudhana, I. Riadi, and F. Ridho, “DDoS Classification Using Neural Network and Naïve Bayes Methods for Network Forensics,†International Journal of Advanced Computer Science and Applications, vol. 9, no. 11, 2018, doi: 10.14569/IJACSA.2018.091125.

A. Yudhana, A. Fadlil, and E. Prianto, “Performance Analysis of Hashing Methods on the Employment of App,†International Journal of Electrical and Computer Engineering (IJECE), vol. 8, no. 5, p. 3512, Oct. 2018, doi: 10.11591/ijece.v8i5.pp3512-3522.




DOI: https://doi.org/10.30865/mib.v6i2.3946

Refbacks

  • There are currently no refbacks.


Copyright (c) 2022 JURNAL MEDIA INFORMATIKA BUDIDARMA

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.



JURNAL MEDIA INFORMATIKA BUDIDARMA
Universitas Budi Darma
Secretariat: Sisingamangaraja No. 338 Telp 061-7875998
Email: mib.stmikbd@gmail.com

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.