Metode Live Memory Acquisition untuk Pencarian Artefak Digital Perangkat Memori Laptop Berdasarkan Simulasi Kasus Kejahatan Siber

Keywords: Live Memory Acquisition, Digital Artifact, Device Memory Analysis, Social Media Investigation, Cybercrime

Abstract

Information technology's hardware and software are constantly evolving. The rise in cybercrime cases is consistent with this trend. While operating systems can be hacked, personal data can be stolen and encrypted, making it impossible for users to access the information. Cybercriminals are using social media data to target personal information currently. Users' usernames, passwords, and other personal information can be stored in a device's memory, as well as browser cookies. Pre-analysis, analysis, and post-analysis are the three stages of the research process. "Live Memory Acquisition" is the proper method for obtaining data from a device's memory. There is digital evidence in the form of an email address, a password, Facebook, and PayPal accounts as well as a link URL discovered in the analysis of the results of the acquisition of artifact one. The results of the artifact 2 acquisition did not reveal any passwords. There was no evidence of email or Facebook passwords in the analysis of artifact 3 acquisition results, but the overall data test results showed that the total number of test results on artifact 1 was 100%, 57.14% on artifact 2, and 71.42% on artifact 3.

Downloads

Download data is not yet available.

References

N. Al Mutawa, J. Bryce, V. N. L. Franqueira, and A. Marrington, “Forensic investigation of cyberstalking cases using behavioural evidence analysis,” DFRWS 2016 EU - Proc. 3rd Annu. DFRWS Eur., vol. 16, pp. S96–S103, 2016, doi: 10.1016/j.diin.2016.01.012.

T. A. Cahyanto and Y. Prayudi, “Investigasi Forensika Pada Log Web Server untuk Menemukan Bukti Digital Terkait dengan Serangan Menggunakan Metode Hidden Markov Models,” Snati, pp. 15–19, 2014.

T. A. Cahyanto, V. Wahanggara, and D. Ramadana, “Analisis dan Deteksi Malware Menggunakan Metode Malware Analisis Dinamis dan Malware Analisis Statis,” Justindo, J. Sist. Teknol. Inf. Indones., vol. 2, no. 1, pp. 19–30, 2017, Accessed: Jan. 30, 2018. [Online]. Available: http://jurnal.unmuhjember.ac.id/index.php/JUSTINDO/article/view/1037.

E. Chintia, R. Nadiah, H. N. Ramadhani, Z. F. Haedar, A. Febriansyah, and N. A. Rakhmawati S.Kom., M.Sc.Eng, “Kasus Kejahatan Siber yang Paling Banyak Terjadi di Indonesia dan Penanganannya,” J. Inf. Eng. Educ. Technol., vol. 2, no. 2, p. 65, 2019, doi: 10.26740/jieet.v2n2.p65-69.

“Digital Forensics, Part 2: Live Memory Acquisition and Analysis.” https://www.hackers-arise.com/post/2016/09/27/digital-forensics-part-2-live-memory-acquisition-and-analysis (accessed Jan. 31, 2020).

R. A. K. N. Bintang, R. Umar, and U. Yudhana, “Perancangan perbandingan live forensics pada keamanan media sosial Instagram, Facebook dan Twitter di Windows 10,” Pros. SNST ke-9 Tahun 2018 Fak. Tek. Univ. Wahid Hasyim, pp. 125–128, 2018.

D. S. Yudhistira, “Metode Live Forensics Untuk Analisis Random Access Memory Pada Perangkat Laptop,” 2018.

T. Rochmadi, I. Riadi, and Y. Prayudi, “Live Forensics for Anti-Forensics Analysis on Private Portable Web Browser,” Int. J. Comput. Appl., vol. 164, no. 8, pp. 31–37, 2017, doi: 10.5120/ijca2017913717.

R. Umar, A. Yudhana, and M. Nur Faiz, “Analisis Kinerja Metode Live Forensics Untuk Investigasi Random Access Memory Pada Sistem Proprietary,” Pros. Konf. Nas. Ke- 4 Asos. Progr. Pascasarj. Perguru. Tinggi Muhammadiyah, pp. 207–211, 2016.

T. D. Larasati and B. C. Hidayanto, “Analisis Live Forensics Untuk Perbandingan Aplikasi Instant Messenger Pada Sistem Operasi Windows 10,” 2017.

Published
2021-12-16
How to Cite
Yaqin, M. A., Cahyanto, T. A., & Fitriyah, N. Q. (2021). Metode Live Memory Acquisition untuk Pencarian Artefak Digital Perangkat Memori Laptop Berdasarkan Simulasi Kasus Kejahatan Siber. BIOS : Jurnal Teknologi Informasi Dan Rekayasa Komputer, 2(2), 87-94. https://doi.org/10.37148/bios.v2i2.28
Section
Articles