CFP last date
20 December 2024
Reseach Article

Web Forensics on Tiktok Services using National Institute of Standards and Technology Method

by Herdin Asmara Timor, Imam Riadi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 185 - Number 36
Year of Publication: 2023
Authors: Herdin Asmara Timor, Imam Riadi
10.5120/ijca2023923157

Herdin Asmara Timor, Imam Riadi . Web Forensics on Tiktok Services using National Institute of Standards and Technology Method. International Journal of Computer Applications. 185, 36 ( Oct 2023), 40-46. DOI=10.5120/ijca2023923157

@article{ 10.5120/ijca2023923157,
author = { Herdin Asmara Timor, Imam Riadi },
title = { Web Forensics on Tiktok Services using National Institute of Standards and Technology Method },
journal = { International Journal of Computer Applications },
issue_date = { Oct 2023 },
volume = { 185 },
number = { 36 },
month = { Oct },
year = { 2023 },
issn = { 0975-8887 },
pages = { 40-46 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume185/number36/32925-2023923157/ },
doi = { 10.5120/ijca2023923157 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:27:57.779603+05:30
%A Herdin Asmara Timor
%A Imam Riadi
%T Web Forensics on Tiktok Services using National Institute of Standards and Technology Method
%J International Journal of Computer Applications
%@ 0975-8887
%V 185
%N 36
%P 40-46
%D 2023
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Users use tiktok to share photos and videos, comment, and also features to like a video that is uploaded. More and more people use tiktok, but more and more irresponsible users whose accounts are used to torture others online. As a result, cyberbullying is still rampant on tiktok the investigation process in cyberbullying situations and to find the necessary seven digital evidence. The initial stage is the collection stage, where evidence such as files, documents, data, and physical evidence is collected. The examination stage is the stage of examining the data obtained from the previous location. The analysis stage is the stage of reviewing the data obtained from the last step the analysis stage, where the examination results are analyzed in depth. Finally, the reporting stage is the preparation of a report containing the results of the analysis that has been carried out. Tools FTK imager digital evidence of captions usernames of tiktok actors. Tools video cache view digital evidence of deleted video posts, content, and videos that have become images. tools browser history capturer digital evidence in the form of date, time of occurrence, and web browser. Tools browsing history view digital proof of activity history, namely date and time, caption uploads and web types, and user names. On tiktok, every action leaves a digital trail. Investigators can follow and collect evidence of various activities, such as captions, images, and posted videos.

References
  1. P. S. Azwir and N. Nurbaiti, "Analysis of the Effect of Social Media as a Promotional Media of PT Media Swara Prima, Rantau Rapat," JIKEM: Journal of Computer Science, Economics and Management, vol. 2, no. 2, pp. 3233-3243, 2022.
  2. 
  3. 
  4. M. A. Rizaty, "Indonesia's Tiktok Users are the Second Largest in the World," dataindonesia.id, 2022.
  5. 
  6. 
  7. D. Yuliana, T. Yuniati, and B. P. Zen, "Analysis of Digital Evidence of Cyberbullying on Social Media using the National Institute of Standard and Technology (Nist) 800-101 Method," LEDGER: Journal of Informatics and Information Technology, vol. 1, no. 3, pp. 113-123, 2022, doi: 10.20895/ledger.v1i3.812..
  8. 
  9. 
  10. A. Nofiyan and M. Mushlihudin, "Forensic Analysis of Web Phishing using the National Institute Of Standards And Technology (NIST) Method," JSTIE (Undergraduate Journal of Informatics Engineering) (E-Journal), vol. 8, no. 2, p. 53, 2020, doi: 10.12928/jstie.v8i2.16697.
  11. 
  12. 
  13. M. Riskiyadi, "Forensic Investigation of Digital Evidence in Uncovering Cybercrime," Cyber Security and Digital Forensics, vol. 3, no. 2, pp. 12-21, 2020, doi: 10.14421/csecurity.2020.3.2.2144.
  14. 
  15. 
  16. M. A. Aziz, I. Riadi, and R. Umar, "Web-based Line Messenger Forensic Analysis using the National Institute Of Justice (NIJ) Framework," National Seminar Informatics UPN "Veteran" Yogyakarta, vol. 2018, no. November, pp. 51-57, 2018.
  17. 
  18. 
  19. I. Riadi, R. Umar, and M. A. Aziz, "Instant Messaging Service Web Forensics using the Association of Chief Police Officers (ACPO) Method," Mobile and Forensics, vol. 1, no. 1, p. 30, 2019, doi: 10.12928/mf.v1i1.705.
  20. 
  21. 
  22. S. D. Utami, C. Carudin, and A. A. Ridha, "Live Forensic Analysis on Whatsapp Web to Prove Electronic Transaction Fraud Cases," Cyber Security and Digital Forensics, vol. 4, no. 1, pp. 24-32, 2021, doi: 10.14421/csecurity.2021.4.1.2416.
  23. 
  24. 
  25. T. Pandela and I. Riadi, "Browser Forensics on Web-based Tiktok Applications," Int J Comput Appl, vol. 175, no. 34, pp. 47-52, 2020, doi: 10.5120/ijca2020920897..
  26. 
  27. 
  28. T. Irawan and I. Riadi, "Mobile Forensic Signal Instant Messenger Services in Case of Web Phishing using National Institute of Standards and Technology Method," Int J Comput Appl, vol. 184, no. 32, pp. 30-40, 2022, doi: 10.5120/ijca2022922394.
  29. 
  30. 
  31. I. Gilbert Rian Mailangkay, E. Zakharia, A. Hadi, T. Informatika, and S. Palangka Raya, "Comparative Analysis of Tiktok Lite Digital Evidence using the National Institute of Justice Method," Journal of Computer Science & Informatics (J-SAKTI, vol. 6, no. 2, pp. 661-670, 2022.
  32. 
  33. 
  34. R. N. Dasmen and F. Kurniawan, "Digital Forensics of Deleted Cyber Crime Evidence on Social Media Instant MessagesDigital Forensics of Deleted Cyber Crime Evidence on Social Media Instant Messages," Techno.Com, vol. 20, no. 4, pp. 527-539, 2021, doi: 10.33633/tc.v20i4.5170.
  35. 
  36. 
  37. A. Andria, "Digital Forensics of Web-Based Information Systems," JAMI: Journal of Indonesian Young Experts, vol. 2, no. 2, pp. 33-44, 2021, doi: 10.46510/Jami.v2i2.73.
  38. 
  39. 
  40. M. Fitriana, K. A. AR, and J. M. Marsya, "Application of the National Institute of Standards and Technology (Nist) Method in Digital Forensic Analysis for Handling Cyber Crime," Cyberspace: Journal of Information Technology Education, vol. 4, no. 1, p. 29, 2020, doi: 10.22373/cj.v4i1.7241.
  41. 
  42. 
  43. T. F. Efendi, R. Rahmadi, and Y. Prayudi, "System Design for Physical Evidence Management and Chain of Custody (CoC) in Digital Forensics Laboratory Storage," Journal of Informatics Technology and Management, vol. 6, no. 2, pp. 53-63, 2020, doi: 10.26905/jtmi.v6i2.4177.
  44. 
  45. 
  46. P. D. Wibowo, Satriyo; Nugroho, "CoC, Key to Digital Evidence Accepted by the Court," detik.com, 2018.
  47. 
  48. 
  49. P. A. Mahatmavidya, "Understanding the Meaning, Purpose, Types as well as Examples of Acquisitions," mekari.com, 2022.
  50. 
  51. 
  52. Muhammad Abdul Aziz, Wicaksono Yuli Sulistyo, and Sri Rahayu Astari3, "Comparative Anti Forensics of Web-Based Instant Messaging Applications using the Association of Chief Police Officers (ACPO) Method," JURISTIK (Journal of Information Technology and Computer Research), vol. 1, no. 01, pp. 8-15, 2021, doi: 10.53863/juristic.v1i01.341.
  53. 
  54. 
  55. I. Wahyudi, A. Muntasa, M. Yusuf, and A. Hamzah, "Revealing and Testing the Authenticity of Digital Evidence in Cybercrime Crimes with the Digital Forensic Research Workshop Method," Journal of Information Technology Applications and Management (JATIM), vol. 2, no. 2, pp. 120-127, 2021, doi: 10.31102/jatim.v2i2.1068.
  56. 
  57. 
  58. P. Widiandana, Imam Riadi, and Sunardi, "Implementation of the Jaccard Method on WhatsApp Messenger Cyberbullying Investigation Analysis using the National Institute of Standards and Technology Framework," Journal of RESTI (Systems Engineering and Information Technology), vol. 4, no. 6, 2020, doi: 10.29207/resti.v4i6.2635.
  59. 
  60. 
  61. M. S. Simanjuntak and J. Panjaitan, "Analysis of Data Recovery using Software," Journal of Universal Computer Informatics Engineering, vol. 1, no. 1, pp. 26-32, 2021.
  62. 
  63. 
  64. F. Natsir, "Forensic Analysis of Content and Timestamp on Tiktok Application," STRING (Unit Tulisan Riset dan Inovasi Teknologi), vol. 6, no. 2, p. 203, 2021, doi: 10.30998/string.v6i2.11454.
  65. 
  66. 
  67. M. F. Sidiq and M. N. Faiz, "Review of Web Browser Forensics Tools to Support Digital Evidence Search," Journal of Informatics Education and Research (JEPIN), vol. 5, no. 1, p. 67, 2019, doi: 10.26418/jp.v5i1.31430.
  68. 
  69. 
  70. B. Actoriano, U. A. Dahlan, I. Riadi, and U. A. Dahlan, "Forensic Investigation on Whatsapp Web using the Integrated Digital Forensic Investigation Framework Version 2," International Journal of Cyber Security and Digital Forensics (IJCSDF), no. September, 2018.
  71. 
  72. 
  73. E. Hakimah, K. Dewi, A. Suharso, and C. Rozikin, "Cosine Similarity Implementation In Investigation Analysis," CyberSecurity and Digital Forensics, vol. 5, no. 1, pp. 12-22, 2022.
  74. 
  75. 
  76. T. Rochmadi, "Live Forensics for Anti Forensic Analysis on Web Browser Case Study Browzar," Indonesian Journal of Business Intelligence (IJUBI), vol. 1, no. 1, p. 32, 2019, doi: 10.21927/ijubi.v1i1.878.
  77. 
  78. 
  79. I. Zuhriyanto, A. Yudhana, and I. Riadi, "Digital Forensics Design on Twitter Application using Live Forensics Method," National Seminar on Informatics 2008 (semnasIF 2008), vol. 2018, no. November, pp. 86-91, 2018.
  80. 
  81. 
Index Terms

Computer Science
Information Sciences

Keywords

Bullying Forensic Digital National Institute of Standards and Technology TikTok