ANALISIS FORENSIK APLIKASI PENIPUAN BERBASIS ANDROID MENGGUNAKAN METODE NIST
DOI:
https://doi.org/10.31000/jika.v8i2.10575Abstract
Meningkatnya penggunaan aplikasi berbasis Android seiring dengan perkembangan teknologi. Salah satu permasalahan yang bisa disalah gunakan dalam tindak kejahatan dengan menanamkan malware atau phising ke dalam aplikasi Android. Aplikasi seperti Whatsapp bisa menjadi sarana bagi pelaku kejahatan untuk mengirimkan file aplikasi berbahaya ke korban. Barang bukti dalam kasus pidana, akan dilakukan analisis forensik untuk mendapatkan bukti digital, baik berupa riwayat percakapan, gambar, dokumen dan lainnya. Metode yang digunakan dalam penelitian ini menggunakan metode National Institute of Standards and Technology (NIST). Metode NIST memiliki empat tahapan untuk acuan analisis barang bukti antara lain, collection, examination, analysis, dan reporting. Tahapan penelitian yang dilakukan dimulai dari studi literatur, observasi, perancangan skenario, mempersiapkan kebutuhan penelitian, dan penerapan metode NIST. Selanjutnya mencari bukti digital berupa file aplikasi berbahaya untuk dianalisis sistem dari aplikasi tersebut. Penelitian ini menghasilkan informasi yang tersimpan di dalam database Whatsapp berupa data percakapan dan file aplikasi berbahaya. Informasi yang didapat dari aplikasi yang dianalisis tersebut yaitu aplikasi tersebut dimanipulasi seolah-olah file lain, dampak dari aplikasi yang telah dimanipulasi dapat mencuri data pribadi dari korban, berupa SMS. SMS penting bisa berupa kode OTP rekening bank milik korban.References
Achmad Iqbal Yuladi, R. I., & ... (2021). Analisis dan Perbandingan Tools Forensik Menggunakan Metode NIST dalam Penanganan Kasus Kejahatan Siber. Jurnal Teknologi Terpadu …, 8(2), 86–93. https://www.academia.edu/download/92883068/233.pdf
Afzal, A., Hussain, M., Saleem, S., Shahzad, M. K., Ho, A. T. S., & Jung, K. H. (2021). Encrypted network traffic analysis of secure instant messaging application: A case study of signal messenger app. Applied Sciences (Switzerland), 11(17). https://doi.org/10.3390/app11177789
Al-Fawa’reh, M., Saif, A., Jafar, M. T., & Elhassan, A. (2020). Malware Detection by Eating a Whole APK. 2020 15th International Conference for Internet Technology and Secured Transactions, ICITST 2020, February. https://doi.org/10.23919/ICITST51030.2020.9351333
Albarida, N. G. W. S. H. A. A. (2020). Perbandingan analisis forensik digital aplikasi whatsapp messenger menggunakan metode NIST [Politeknik Harapan Bersama Tegal]. In Politeknik Harapan Bersama Tegal (Vol. 167, Issue 1). https://perpustakaan.poltektegal.ac.id/index.php?p=show_detail&id=4209930&keywords=
Anggraini, F., Herman, H., & Yudhana, A. (2023). Akuisisi Bukti Digital Tiktok Berbasis Android Menggunakan Metode National Institute of Justice. Jurnal Teknologi Informasi Dan Ilmu Komputer, 10(1), 89–96. https://doi.org/10.25126/jtiik.20231016416
Ardiningtias, S. R. A., Sunardi, S., & Herman, H. (2021). Investigasi Digital Pada Facebook Messenger Menggunakan National Institute of Justice. Jurnal Informatika Polinema, 7(4), 19–26. https://doi.org/10.33795/jip.v7i4.709
Arista Yuliani, V., & Riadi, I. (2019). Forensic Analysis WhatsApp Mobile Application On Android-Based Smartphones Using National Institute of Standard and Technology (NIST) Framework. International Journal of Cyber-Security and Digital Forensics, 8(3), 223–231. https://doi.org/10.17781/p002615
Bintang, R. A., Umar, R., & Yudhana, A. (2020). Analisis Media Sosial Facebook Lite dengan tools Forensik menggunakan Metode NIST. Techno (Jurnal Fakultas Teknik, Universitas Muhammadiyah Purwokerto), 21(2), 125. https://doi.org/10.30595/techno.v21i2.8494
Krisnadi, D. S. I. (2020). Citra Forensik Dari Barang Bukti Elektronik Dengan Metode Physical Menggunakan Acquisition Tools Tableau Imager Dan Ftk Imager. Academia, 16. https://d1wqtxts1xzle7.cloudfront.net/64999902/Tableu_Imager_dan_FTK_Imager.pdf?1606003446=&response-content-disposition=inline%3B+filename%3DCitra_Forensik_dari_barang_bukti_elektro.pdf&Expires=1609391012&Signature=ggq3RFljWBmjsEj5dsc0ammrrNiznpH1oGNpK57
Mahendra, K. D. O., & Ari Mogi, I. K. (2021). Digital Forensic Analysis Of Michat Application On Android As Digital Proof In Handling Online Prostitution Cases. JELIKU (Jurnal Elektronik Ilmu Komputer Udayana), 9(3), 381. https://doi.org/10.24843/jlk.2021.v09.i03.p09
Muhammad Abdul Aziz, Wicaksono Yuli Sulistyo, & Sri Rahayu Astari3. (2021). Komparatif Anti Forensik Aplikasi Instant Messaging Berbasis Web Menggunakan Metode Association of Chief Police Officers (ACPO). JURISTIK (Jurnal Riset Teknologi Informasi Dan Komputer), 1(01), 8–15. https://doi.org/10.53863/juristik.v1i01.341
Riadi, I., Umar, R., & Nasrulloh, I. M. (2018). Analisis Forensik Digital Pada Frozen Solid State Drive Dengan Metode National Institute of Justice (Nij). Elinvo (Electronics, Informatics, and Vocational Education), 3(1), 70–82. https://doi.org/10.21831/elinvo.v3i1.19308
Riadi, I., Yudhana, A., & Barra, M. Al. (2021). Forensik Mobile pada Layanan Media Sosial LinkedIn. JISKA (Jurnal Informatika Sunan Kalijaga), 6(1), 9–20. https://doi.org/10.14421/jiska.2021.61-02
Rifqi, M., Ismail, S. J. I., Rizal, M. F., Studi, P., Teknologi, D., & Telkom, U. (2023). Analisis Forensik Untuk Penanganan Cyber Crime Pada Aplikasi Whatsapp Menggunakan Metode National Institute of Standard and Technology ( Nist Sp 800-86 ). E-Proceeding of Applied Science, 9(6), 3017–3022.
Saputra, A. D., & Borman, R. I. (2020). Sistem Informasi Pelayanan Jasa Foto Berbasis Android (Studi Kasus: Ace Photography Way Kanan). Jurnal Teknologi Dan Sistem Informasi, 1(2), 87–94. https://doi.org/10.33365/jtsi.v1i2.420
Setyawan, M. R., Yudhana, A., & Fadlil, A. (2020). Data Acquisition On Messenger Skype Using The National Institute Of Justice Method. Systemic: Information System and Informatics Journal, 5(2), 13–18. https://doi.org/10.29080/systemic.v5i2.724
Yudhana, A., Riadi, I., & Anshori, I. (2018). Analisis Bukti Digital Facebook Messenger Menggunakan Metode Nist. It Journal Research and Development, 3(1), 13–21. https://doi.org/10.25299/itjrd.2018.vol3(1).1658
Zamroni, G. M., & Riadi, I. (2019). Instant Messaging Forensic Analysis on Android Operating System. Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control, 4(2), 137–148. https://doi.org/10.22219/kinetik.v4i2.735
Downloads
Published
Issue
Section
License
License and Copyright Agreement
In submitting the manuscript to the journal, the authors certify that:
- They are authorized by their co-authors to enter into these arrangements.
- That it is not under consideration for publication elsewhere,
- That its publication has been approved by all the author(s) and by the responsible authorities – tacitly or explicitly – of the institutes where the work has been carried out.
- They secure the right to reproduce any material that has already been published or copyrighted elsewhere.
- They agree to the following license and copyright agreement.
Copyright
Authors who publish with International Journal of Advances in Intelligent Informatics agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (CC BY-SA 4.0) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.Â
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
Licensing for Data Publication
International Journal of Advances in Intelligent Informatics use a variety of waivers and licenses, that are specifically designed for and appropriate for the treatment of data:
Open Data Commons Attribution License, http://www.opendatacommons.org/licenses/by/1.0/ (default)
Creative Commons CC-Zero Waiver, http://creativecommons.org/publicdomain/zero/1.0/
Open Data Commons Public Domain Dedication and Licence, http://www.opendatacommons.org/licenses/pddl/1-0/
Other data publishing licenses may be allowed as exceptions (subject to approval by the editor on a case-by-case basis) and should be justified with a written statement from the author, which will be published with the article.
Open Data and Software Publishing and Sharing
The journal strives to maximize the replicability of the research published in it. Authors are thus required to share all data, code or protocols underlying the research reported in their articles. Exceptions are permitted but have to be justified in a written public statement accompanying the article.
Datasets and software should be deposited and permanently archived inappropriate, trusted, general, or domain-specific repositories (please consult http://service.re3data.org and/or software repositories such as GitHub, GitLab, Bioinformatics.org, or equivalent). The associated persistent identifiers (e.g. DOI, or others) of the dataset(s) must be included in the data or software resources section of the article. Reference(s) to datasets and software should also be included in the reference list of the article with DOIs (where available). Where no domain-specific data repository exists, authors should deposit their datasets in a general repository such as ZENODO, Dryad, Dataverse, or others.
Small data may also be published as data files or packages supplementary to a research article, however, the authors should prefer in all cases a deposition in data repositories.