CFP last date
20 December 2024
Reseach Article

Forensic Analysis of Web-based Instant Messenger Applications using National Institute of Justice Method

by Larassaty Chandra Pakaya, Imam Riadi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 185 - Number 35
Year of Publication: 2023
Authors: Larassaty Chandra Pakaya, Imam Riadi
10.5120/ijca2023923145

Larassaty Chandra Pakaya, Imam Riadi . Forensic Analysis of Web-based Instant Messenger Applications using National Institute of Justice Method. International Journal of Computer Applications. 185, 35 ( Sep 2023), 44-51. DOI=10.5120/ijca2023923145

@article{ 10.5120/ijca2023923145,
author = { Larassaty Chandra Pakaya, Imam Riadi },
title = { Forensic Analysis of Web-based Instant Messenger Applications using National Institute of Justice Method },
journal = { International Journal of Computer Applications },
issue_date = { Sep 2023 },
volume = { 185 },
number = { 35 },
month = { Sep },
year = { 2023 },
issn = { 0975-8887 },
pages = { 44-51 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume185/number35/32919-2023923145/ },
doi = { 10.5120/ijca2023923145 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:27:53.724408+05:30
%A Larassaty Chandra Pakaya
%A Imam Riadi
%T Forensic Analysis of Web-based Instant Messenger Applications using National Institute of Justice Method
%J International Journal of Computer Applications
%@ 0975-8887
%V 185
%N 35
%P 44-51
%D 2023
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Currently, instant messenger applications are not only available in the form of applications on smartphones but can also be accessed through a web browser, one of which is Telegram Web. Using Telegram as a web platform provides convenience to its users. However, with this convenience, potential vulnerabilities can attract the attention of digital criminals or cybercrime. Therefore, this research aims to investigate forensic digital crimes related to web-based Telegram running on the Google Chrome browser using the National Institute of Justice (NIJ) Method and several forensic tools such as FTK Imager, Browser History Capturer, Browser History Examiner, and OSForensics. The results of this study are in the form of the perpetrator's telephone number obtained using Browser History Examiner,45 chats between the victim and the perpetrator that were deleted and the perpetrator's account obtained using FTK Imager, and images contained in the victim and perpetrator's chat such as two proof of transfer and three screenshots of tasks given by the perpetrator obtained using OSForensics.

References
  1. G. Maulana Zamroni, R. Umar, and I. Riadi, “Forensic Analysis of Android-based Instant Messenger Applications,” 2016. [Online]. Available: http://ars.ilkom.unsri.ac.id
  2. S. K. Dirjen et al., “SINTA Accredited Rank 2 Comparative Web-based Instant Messenger Vulnerability Using the Association of Chief Police Officers Method," validity period starts, vol. 1, no. 3, pp. 813–819, 2017.
  3. I. Riadi, R. Umar, and M. A. Aziz, “Instant Messenger Service Web Forensics Using the Association of Chief Police Officers (ACPO) Method,” vol. 1, no. 1, pp. 1–10, 2019.
  4. I. G. Ngurah, G. Wicaksanaa, and I. K. G. Suhartanaa, “Forensic Analysis of Desktop-based Telegram Applications using the National Institute of Justice Methods (NIJ),” vol. 8, no. 4, pp. 381–385, 2020.
  5. “The Instant Messenger App with the Most Users in the World 2022 - GoodStats." https://goodstats.id/article/aplikasi-pesan-instan-with-users-most-in-the-world-2022-3tggF (accessed Nov. 30, 2022).
  6. M. S. Chang and C. Y. Chang, “Forensic analysis of LINE messenger on android,” Journal of Computers (Taiwan), vol. 29, no. 1, pp. 11–20, Feb. 2018, doi: 10.3966/199115992018012901002.
  7. “Movie Piracy on Telegram is Rampant, Kominfo is Ready to Block." https://inet.detik.com/law-and-policy/d- 5384975/marathon-movie-piracy-on-telegram-kominfo- ready-to-block (accessed Nov. 30, 2022).
  8. I. Riadi, A. Fadlil, and A. Fauzan, “Evidence Gathering and Identification of LINE Messenger on Android Device.” [Online]. Available: https://sites.google.com/site/ijcsis/
  9. I. Anshori, K. E. Setya Putri, and U. Ghoni, “Analysis of Digital Evidence of Facebook Messenger Applications on Android Smartphones Using the NIJ Method,” IT Journal Research and Development, vol. 5, no. 2, pp. 118–134, 2020, doi: 10.25299/itjrd.2021.vol5(2).4664.
  10. S. Rachmie, “Digital Website,” vol. 21, no. 1, pp. 104–127, 2020.
  11. S. Rizki, “Digital Forensic Analysis in revealing Cyber Crimes at the Preliminary Evidentiary Stage Cyber crimes that are growing rapidly require the Government to immediately make countermeasures in terms of laws and regulations,” vol. 2, no. November, pp. 780–787, 2018.
  12. Aaron. Philipp, David. Cowen, and C. Davis, “Hacking exposed computer forensics : secrets & solutions,” p. 518, 2010.
  13. Casey, Digital Evidence and Computer Crime. 2011. doi: 10.4018/978-1-59904-379-1.ch015.
  14. F. Sulianta, Komputer Forensik. 2008.
  15. I. Riadi, R. Umar, and I. M. Nasrulloh, “Digital Forensic Analysis of Frozen Solid State Drive with National Institute of Justice (NIJ) Method,” Elinvo (Electronics, Informatics, and Vocational Education), vol. 3, no. 1, pp. 70–82, 2018, doi: 10.21831/elinvo.v3i1.19308.
  16. M. L. Ardiansyah, “Let's Know the Advantages and Disadvantages of the Telegram Application!,” Carisinyal, 2021.
  17. M. G. Adiwibawa, L. Ariyani, and A. Saputra, “"Utilization of Telegram Bot for Automation of Payroll and Employee Information at PT MCS,” Journal of Research and Application of Informatics Students (JRAMI), vol. 2, no. 01, 2021, doi: 10.30998/jrami.v2i01.746.
  18. A. A. Gillespie, Cybercrime: key issues and debates. Taylor and Francis, 2019. doi: 10.4324/9781351010283.
  19. Z. Malihah and A. Alfiasari, “Cyberbullying Behavior in Adolescents and Its Relationship with Self-Control and Parental Communication," Journal of Family and Consumer Sciences,” Journal of Family and Consumer Sciences, vol. 11, no. 2, pp. 145–156, 2018, doi: 10.24156/jikk.2018.11.2.145.
  20. T. Rochmadi and Y. Prayudi, “Live Forensics for Anti-Forensics Analysis on Private Portable Web Browser,” 2017.
  21. S. M. Cloud, “Google Chrome,” Retrieved Oct, 2008, doi: 10.1016/S1754-4548(09)70096-8.
  22. S. Azizah, S. A. Ramadhona, and K. W. Gustitio, “"Digital Evidence Analysis on Telegram Messenger Using the NIST Framework," Repositor Journal, vol. 2, no. 10, pp. 1400–1405, 2020, doi: 10.22219/repositor.v2i10.1066.
  23. J. Panjaitan, A. C. Sitepu, A. Teknik, and D. Serdang, “Performance Analysis of Forensic Acquisition Tools to Create File Imaging in It Forensic Problems,” Julyxxxx, vol. x, No.x, no. 2, p. 2021, 2021.
  24. “Browser History Capturer - Free tool to capture web browser history.” https://www.foxtonforensics.com/browser-history-capturer/ (accessed Nov. 30, 2022).
  25. “PassMark OSForensics - Digital investigation.” https://www.osforensics.com/ (accessed Aug. 01, 2023).
Index Terms

Computer Science
Information Sciences

Keywords

Cybercrime Digital Evidence Google Chrome National Institute of Justice (NIJ) Telegram