Digital Forensic Tools And Techniques For Handling Digital Evidence

Authors

  • Khairunnisak Khairunnisak Universitas AMIKOM Purwokerto
  • Wahyu Widodo

DOI:

https://doi.org/10.31598/jurnalresistor.v6i1.1266

Keywords:

Digital Forensic Tool (DFT), Forensic Technique, Digital Evidence, Live Forensic, Static Forensic

Abstract

The development of information security issues in many sectors makes the skill of mastering digital forensic highly needed. Digital forensic is recently used not only to support legal proceedings but also to investigate many incidents like digital data manipulation, site hacking, and terrorism. In mastering the skill of digital forensic, investigators should have knowledge about the techniques and tools that will be used. This research is proposed to help investigators in enhancing and developing their skills in revealing the content of digital evidence with the result reviews from each area in the forensic field. The review in this study is based on the focus of the forensic area  by giving detailed information about the functions, limitations, and advantages as well as the specific techniques of forensics that leads to the techniques of live forensic or static forensic. This research also discusses the non-technical things that affect the performance of forensic investigation including operational activities, investigated activities, and legal elements. Thus, the result of this research is expected to be beneficial for helping investigators in determining the appropriate tools to investigate the digital evidence. The further research can develop the activities of anti-forensics that can hinder the investigation processes.

Downloads

Download data is not yet available.

References

J. Kävrestad, Fundamentals of Digital Forensics, Second Edi. Skovde, Sweden: Springer International Publishing, 2018.

N. Iman, A. Susanto, and R. Inggi, “Analisa Perkembangan Digital Forensik dalam Penyelidikan Cybercrime di Indonesia (Systematic Review),” J. Telekomun. dan Komput., vol. 9, no. 3, p. 186, 2020.

R. Synthiana, “Peranan Ilmu Digital Forensik Terhadap Penyidikan Kasus Peretasan Website,” J. Litigasi, vol. 21, no. 21, pp. 104–127, 2020.

M. R. B. Kencana, “Minim Jumlah, Indonesia Butuh Banyak Tenaga Ahli Digital Forensik,” Liputan 6, 2020.

Admin, “Digital Forensik,” Forensic Digital.Com, 2019. [Online]. Available: https://forensikdigital.com/digital-forensik/. [Accessed: 17-May-2022].

Admin, “UMM Buka Program Studi Keamanan Siber dan Digital Forensik,” Republika, 2020. [Online]. Available: https://www.umm.ac.id/id/arsip-koran/republika/umm-buka-program-studi-keamanan-siber-dan-digital-forensik.html. [Accessed: 21-May-2022].

Admin, “Tel-U Menjadi Kampus Pertama Dengan Program Studi S2 Digital Forensic & Cyber Security,” Telkom University, 2021. [Online]. Available: https://telkomuniversity.ac.id/tel-u-menjadi-kampus-pertama-dengan-program-studi-s2-digital-forensic-cyber-security/. [Accessed: 21-May-2022].

Direktorat Operasi Keamanan Siber, “Laporan Bulanan Publik Hasil Monitoring Keamanan Siber Maret 2022,” Jakarta, 2022.

Y. P. Asep Sudirman, Bambang Sugiantoro, “Kerangka Kerja Digital Forensic Readiness Pada Sebuah Organisasi ( Studi Kasus : Pt Waditra Reka Cipta Bandung ),” Cyber Secur. dan Forensik Digit., vol. 2, no. 2, pp. 82–88, 2019.

M. N. Al-Azhar, Digital Forensic Panduan Praktis Investigasi Komputer. Jakarta: Salemba Infotek, 2012.

H. Simaremare, R. T. Putra, and R. Abdillah, “Digital forensic static acquisition analysis for cloud environments,” Int. J. Sci. Technol. Res., vol. 8, no. 11, pp. 1712–1716, 2019.

A. Faiz and R. Imam, “Forensic Analysis of Frozen Hard Drive Using Static Forensics Method,” Int. J. Comput. Sci. Inf. Secur., vol. 15, no. 1, 2017.

D. Sudyana and N. Lizarti, “Digital Evidence Acquisition System on IAAS Cloud Computing Model using Live Forensic Method,” Sci. J. Informatics, vol. 6, no. 1, pp. 125–137, 2019.

M. N. Faiz, R. Umar, and A. Yudhana, “Implementasi Live Forensics untuk Perbandingan Browser pada Keamanan Email,” JISKA (Jurnal Inform. Sunan Kalijaga), vol. 1, no. 3, p. 108, 2017.

S. R. Davies, R. Macfarlane, and W. J. Buchanan, “Evaluation of live forensic techniques in ransomware attack mitigation,” Forensic Sci. Int. Digit. Investig., vol. 33, p. 300979, 2020.

U. D. of H. Security, “System Assessment and Validation for Emergency Responders (SAVER),” United States, 2016.

K. Ghazinour, D. M. Vakharia, K. C. Kannaji, and R. Satyakumar, “A study on digital forensic tools,” in International Conference on Power, Control, Signals and Instrumentation Engineering, ICPCSI 2017, 2017, no. September, pp. 3136–3142.

F. Flandrin, W. J. Buchanan, R. Macfarlane, B. Ramsay, and A. Smales, “Evaluating Digital Forensic Tools (DFTs),” in 7th Int Conf Cybercrime Forensics Education and Training (CFET), 2014, no. January 2015, pp. 1–16.

N. Pansari and D. A. Agarwal, “A Comparative Study of Analysis and Investigation using Digital Forensics,” Int. J. Linguist. Comput. Appl., vol. 07, no. 02, pp. 16–20, 2020.

T. A. Cahyanto, M. A. Rizal, A. E. Wardoyo, and T. T. Warisaji, “Live Forensic to Identify the Digital Evidence on the Desktop-based,” J. RESTI (Rekayasa Sist. dan Teknol. Informasi), vol. 5, no. 158, pp. 213–219, 2022.

K. N. Isnaini, H. Ashari, and A. P. Kuncoro, “Analisis Forensik untuk Mendeteksi Keaslian Citra Digital Menggunakan Metode NIST,” J. Resist., vol. 3, no. 2, pp. 72–81, 2020.

A. Parveen, Z. H. Khan, and S. N. Ahmad, “Classification and evaluation of digital forensic tools,” Telkomnika (Telecommunication Comput. Electron. Control., vol. 18, no. 6, pp. 3096–3106, 2020.

I. Zuhriyanto, A. Yudhana, and I. Riadi, “Analisis Perbandingan Tools Forensic pada Aplikasi Twitter Menggunakan Metode Digital Forensics Research Workshop,” J. RESTI (Rekayasa Sist. dan Teknol. Informasi), vol. 4, no. 5, pp. 829–836, 2020.

I. Riadi, Sunardi, and P. Widiandana, “Investigasi Cyberbullying pada WhatsApp Menggunakan Digital Forensics Research Workshop,” J. RESTI (Rekayasa Sist. dan Teknol. Informasi), vol. 1, no. 3, pp. 730–735, 2017.

F. Yasin, Abdul Fadlil, and Rusydi Umar, “Identifikasi Bukti Forensik Jaringan Virtual Router Menggunakan Metode NIST,” J. RESTI (Rekayasa Sist. dan Teknol. Informasi), vol. 5, no. 1, pp. 91–98, 2021.

S. G. S. U. Rahardja, Theory and Aplication of IT Research Metodologi Penelitian Teknologi Informasi. Yogyakarta: CV ANDI OFFSET, 2011.

Hardani and Dkk, Buku Metode Penelitian Kualitatif dan Kuantitatif, 1st ed., no. April. Yogyakarta: CV Pustaka Ilmu, 2020.

Sukardarrumidi, Metode Penelitian-Petunjuk Praktis Untuk Peneliti Pemula. Yogyakarta: Gadjah Mada University Press, 2012.

R. F. M. Román, N. M. L. Mora, J. P. N. Vicuña, and J. I. P. Orozco, “Digital forensics tools,” Int. J. Appl. Eng. Res., vol. 11, no. 19, pp. 9754–9762, 2016.

M. Kolhe and P. Ahirao, “Live Vs Dead Computer Forensic Image Acquisition,” Int. J. Comput. Sci. Inf. Technol., vol. 8, no. 3, pp. 455–457, 2017.

S. Rahman and M. N. A. Khan, “Review of Live Forensic Analysis Techniques,” Int. J. Hybrid Inf. Technol., vol. 8, no. 2, pp. 379–388, 2015.

F. Kurniawan, “Digital Forensik Bisa Kejar Pelaku Penyebar Konten Mesum di Internet,” Sindonews, 2020. [Online]. Available: https://tekno.sindonews.com/read/224406/207/digital-forensik-bisa-kejar-pelaku-penyebar-konten-mesum-di-internet-1604830310. [Accessed: 17-May-2022].

L. N. Arunanta, “Ahli Digital Forensic Ungkap Foto Djoko Tjandra dan Pinangki Bertemu di Malaysia,” Detiknews, 2021. [Online]. Available: https://news.detik.com/berita/d-5361122/ahli-digital-forensic-ungkap-foto-djoko-tjandra-dan-pinangki-bertemu-di-malaysia. [Accessed: 17-May-2022].

A. S. Wardani, “Ini Jenis Data Pribadi Anggota Polri yang Diduga Bocor di Forum Online,” Liputan 6.com, 2021. [Online]. Available: https://www.liputan6.com/tekno/read/4714141/ini-jenis-data-pribadi-anggota-polri-yang-diduga-bocor-di-forum-online. [Accessed: 17-May-2022].

D. H. A. Putra, “Ahli Digital Forensik: Kasus Ravio, Motif Peretasan Baru di Indonesia,” Kumparan, 2020. [Online]. Available: https://kumparan.com/kumparannews/ahli-digital-forensik-kasus-ravio-motif-peretasan-baru-di-indonesia-1tK7ifuiRQG/full. [Accessed: 17-May-2022].

N. M. Achmad, “Dalam Persidangan Munarman, Ahli Digital Forensik Ungkap Isi Percakapan soal Perang Biologis, Wabah Corona hingga Baiat,” Kompas.com, 2022. [Online]. Available: https://megapolitan.kompas.com/read/2022/02/14/15372981/dalam-persidangan-munarman-ahli-digital-forensik-ungkap-isi-percakapan?page=all. [Accessed: 17-May-2022].

N. Aspinwall and L. Ave, “Forensic Acquisition of Websites (FAW) Tool Review,” 2014.

B. V Prasanthi, “Cyber Forensic Tools: A Review,” Int. J. Eng. Trends Technol., vol. 41, no. 5, pp. 266–271, 2016.

S. Sharma, K. K. Ghanshala, and S. Mohan, “Advanced Digital Forensic IoT Based Secure Communication,” Int. J. Innov. Technol. Explor. Eng., vol. 9, no. 4, pp. 664–671, 2020.

S. L. Garfinkel, “Digital media triage with bulk data analysis and bulk-extractor,” Comput. Secur., vol. 32, no. March, pp. 56–72, 2013.

Y. El Bahlouli and N. Hmina, “Digital Forensics : Development of a Forensics Appliance – Analysis and Recommendations,” Int. J. Emerg. Sci. Eng., vol. 6, no. 1, pp. 6–8, 2019.

M. Parekh and S. Jani, “Memory Forensic: Acquisition and Analysis of Memory and Its Tools Comparison,” Int. J. Eng. Technol. Manag. Res., vol. 5, no. 2, pp. 90–95, 2020.

S. Qureshi, S. Tunio, F. Akhtar, A. Wajahat, A. Nazir, and F. Ullah, “Network Forensics: A Comprehensive Review of Tools and Techniques,” Int. J. Adv. Comput. Sci. Appl., vol. 12, no. 5, pp. 879–887, 2021.

P. Kaur and N. Misra, “A Methodical Review on Network traffic monitoring and Analysis tools,” JAC A J. Compos. Theory, vol. 12, no. 9, pp. 1964–1968, 2019.

J. Dykstra and A. T. Sherman, “Design and implementation of FROST: Digital forensic tools for the OpenStack cloud computing platform,” Proc. Digit. Forensic Res. Conf. DFRWS 2013 USA, vol. 10, pp. S87–S95, 2013.

M. Patidar and P. Bansal, “Cloud Forensics: An Overall Research Perspective,” in International Journal of Scientific Research in Network Security and Communication, 2018, vol. 6, no. 2, pp. 5–10.

S. Naaz and F. Ahmad, “Comparitive Study of Cloud Forensics Tools,” New York, 2016.

A. Ghafarian, A. Mady, and K. Park, “An Empirical Analysis of Email Forensics Tools,” Int. J. Netw. Secur. Its Appl., vol. 12, no. 3, pp. 39–57, 2020.

Mrityunjay, U. Chauhan, and S. Gupta, “Novel Approach for Email Forensics,” Int. J. Eng. Res. Technol., vol. 5, no. 10, pp. 1–6, 2017.

M. Tariq Banday, “Techniques and Tools for Forensic Investigation of E-mail,” Int. J. Netw. Secur. Its Appl., vol. 3, no. 6, pp. 227–241, 2011.

T. Hadianto, W. Prasetyo, and R. B. Bahaweres, “Studi Banding Email Forensic Tools,” Stud. Inform. J. Sist. Inf., vol. 10, no. 1, pp. 53–61, 2017.

A. Khan, “COMPARATIVE STUDY OF VARIOUS DIGITAL FORENSICS LOGICAL ACQUISITION TOOLS FOR ANDROID SMARTPHONE’S INTERNAL MEMORY: A CASE STUDY OF SAMSUNG GALAXY S5 AND S6,” Int. J. Adv. Res. Comput. Sci., vol. 9, no. 1, pp. 357–369, Feb. 2018.

O. Osho and S. O. Ohida, “Comparative Evaluation of Mobile Forensic Tools,” Int. J. Inf. Technol. Comput. Sci., vol. 8, no. 1, pp. 74–83, Jan. 2016.

I. Riadi, A. Fadlil, and A. Fauzan, “A Study of Mobile Forensic Tools Evaluation on Android-Based LINE Messenger,” Int. J. Adv. Comput. Sci. Appl., vol. 9, no. 10, pp. 201–206, 2018.

M. Khyati Gajjar and P. Sharma, “Android based Mobile Forensic and Comparison using various Tools,” Int. Res. J. Eng. Technol., vol. 7, no. 4, pp. 1399–1404, 2020.

H. H. Lwin, W. P. Aung, and K. K. Lin, “Comparative Analysis of Android Mobile Forensics Tools,” in 2020 IEEE Conference on Computer Applications(ICCA), 2020, pp. 1–6.

A. Menahil, W. Iqbal, M. Iftikhar, W. Bin Shahid, K. Mansoor, and S. Rubab, “Forensic Analysis of Social Networking Applications on an Android Smartphone,” Wirel. Commun. Mob. Comput., vol. 2021, 2021.

Downloads

Published

2023-04-30

How to Cite

Khairunnisak, K., & Widodo, W. (2023). Digital Forensic Tools And Techniques For Handling Digital Evidence. Jurnal RESISTOR (Rekayasa Sistem Komputer), 6(1), 1-11. https://doi.org/10.31598/jurnalresistor.v6i1.1266