CFP last date
20 December 2024
Reseach Article

Forensic Browser of Twitter based on Web Services

by Revani Saputra, Imam Riadi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 175 - Number 29
Year of Publication: 2020
Authors: Revani Saputra, Imam Riadi
10.5120/ijca2020920832

Revani Saputra, Imam Riadi . Forensic Browser of Twitter based on Web Services. International Journal of Computer Applications. 175, 29 ( Nov 2020), 34-39. DOI=10.5120/ijca2020920832

@article{ 10.5120/ijca2020920832,
author = { Revani Saputra, Imam Riadi },
title = { Forensic Browser of Twitter based on Web Services },
journal = { International Journal of Computer Applications },
issue_date = { Nov 2020 },
volume = { 175 },
number = { 29 },
month = { Nov },
year = { 2020 },
issn = { 0975-8887 },
pages = { 34-39 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume175/number29/31636-2020920832/ },
doi = { 10.5120/ijca2020920832 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:39:49.674783+05:30
%A Revani Saputra
%A Imam Riadi
%T Forensic Browser of Twitter based on Web Services
%J International Journal of Computer Applications
%@ 0975-8887
%V 175
%N 29
%P 34-39
%D 2020
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Twitter is a social media that can be accessed through smartphones and desktops. The large number of users makes Twitter inseparable from crimes including pornography, online gambling and hate speech. In this study, the steps used are collection, examination and analysis. This study uses a laptop as an object that is scenario in a state of opening Twitter via the Google Chrome browser with two modes, namely public mode and private mode. The research used the help of forensic tools, namely ftk imager, dumpIT, belkasoft ram capturer, XhD, browser history viewer, browser history capturer, and cached video viewer. This research produces digital evidence with google chrome browser in public mode and google chrome browser in private mode. In the condition of using the browser in public mode with indicators in the form of text posts, link posts, images, and videos, the research succeeded in getting all the evidence that was sought. Meanwhile, in the private mode google chrome browser managed to get evidence with a success of 50%, namely in the form of text posts and link posts. While the remaining 50% is not found for private mode browsers, namely in image posts and video posts.

References
  1. WeAreSocial, & Hootsuite. Digital Report in 2019. Identified 22 October 2019, from https://wearesocial.com/blog/2019/01/global-digital-report-2019
  2. Nurhairani, H., & Riadi, I. (2019). Analysis Mobile Forensics on Twitter Application using the National Institute of Justice (NIJ) Method. International Journal of Computer Applications, 177 (27), 35–42. https://doi.org/10.5120/ijca2019919749
  3. Nurhairani, H., & Riadi, I. (2019). Analysis Mobile Forensics on Twitter Application using the National Institute of Justice (NIJ) Method. International Journal of Computer Applications, 177 (27), 35–42. https://doi.org/10.5120/ijca2019919749
  4. Ketaren, E. 2016. Cybercrime, Cyber ​​Space, and Cyber ​​Law. Times, 5 (2), 35–42. Retrieved from http://stmik-time.ac.id/ejournal/index.php/jurnalTIMES/article/viewFile/556/126
  5. Raka, ZD 2019. Spread of Illegal Content on Social Media (Case Study: Pornography on Bigo Live Application). 4 (1), 75–84. https://doi.org/.1037//0033-2909.I26.1.78
  6. Ahmad, MS 2017. Live Forensic Investigation from User's Side to Analyze Evil Twin-Based Man In The Middle Attack. Cell, 136 (4), 615–628. https://doi.org/10.1016/j.cell.2009.01.043
  7. Bintang, RAKN, Umar, R., & Yudhana, U. 2018. Designing a live forensics comparison on social media security Instagram, Facebook and Twitter on Windows 10. Proceedings of the 9th SNST 2018, Faculty of Engineering, Wahid Hasyim University, 125–128.
  8. Faiz, MN, Umar, R., & Yudhana, A. 2017. Implementation of Live Forensics for Browser Comparison on Email Security. JISKA (Journal of Informatics Sunan Kalijaga), 1 (3), 108. https://doi.org/10.14421/jiska.2017.13-02
  9. Yudhana, A., Riadi, I., & Zuhriyanto, I. 2019. Live Forensics Analysis of Social Media Applications in Browsers Using the Digital Forensics Research Workshop (DFRWS) Method. 20 (2), 125–130
  10. Larasati, TD 2017. Live Forensics Analysis For Comparison of Instant Messenger Applications (Line, Facebook, and Telegram) on Windows 10 Operating System.
  11. Wijaya, ES, & Subagyo, T. (2018). Analysis of Digital Evidence on Android Random Access Memory Using Live Forensic Method.
  12. Muhammad said Hasibuan. (2010). Design and Implementation of E-Journals as Improving Journal Services in Regional Kopertis 2. National Seminar on Information Technology Applications, 2010 (Snati), 46–50.
  13. Setiawan, D., Setiawan, R., Karunia, R., & Wicaksana, IWS (2007). Comparing Web Browser Performance. Gunadarma University, 1 (1), 1–6.
  14. WeAreSocial, & Hootsuite. Digital Report in 2019. Identified 22 October 2019, from https://wearesocial.com/blog/2019/01/global-digital-report-2019
  15. Saifulloh, M., & Ernanda, A. 2018. Communication Privacy Management for Adolescent Alter Ego Account Users on Twitter. WACANA, Scientific Journal of Communication Sciences, 17 (2), 235. https://doi.org/10.32509/wacana.v17i2.652
  16. Ahmad, MS 2017. Live Forensic Investigation from User's Side to Analyze Evil Twin-Based Man In The Middle Attack. Cell, 136 (4), 615–628. https://doi.org/10.1016/j.cell.2009.01.043
  17. Marini, S. 2018. Digital Forensic Study in Regulation in Indonesia. National Seminar on Energy & Technology, 103–106.
  18. Wahanggara, V., & Prayudi, Y. (2015). System Call Based Malicious Software Detection System for Classification of Digital Evidence Using Support Vector Machine Method. SENTRA (National Seminar on Technology and Engineering), 1–8.
  19. Faiz, MN, Prabowo, WA, & Sidiq, MF (2018). Digital Forensic Investigation Comparative Study on Crime. Journal of Informatics, Information Systems, Software Engineering and Applications (INISTA), 1 (1), 54–62. https://doi.org/10.20895/INISTA.V1I1
  20. Law of the Republic of Indonesia Number 44 of 2008 concerning Pornography. (2008). 3 (2), 54–67. Retrieved from http://repositorio.unan.edu.ni/2986/1/5624.pdf
  21. Raka, ZD (2019). Distribution Of Illegal Content In Social Media (Case Study: Pornography On Bigo Live Application). 4 (1), 75–84. https://doi.org/.1037//0033-2909.I26.1.78
Index Terms

Computer Science
Information Sciences

Keywords

Forensics Web Browsers Pornography Twitter