Analisis Forensik pada Email Menggunakan Metode National Institute of Standards Technology


  • Imam Riadi Universitas Ahmad Dahlan
  • Sunardi Universitas Ahmad Dahlan
  • Fitriyani Tella Nani Universitas Ahmad Dahlan



Email Spoofing, Header Email, Metode NIST, Tiga Tools, Live Forensics


Nowadays developments in information technology are growing rapidly, especially in email. Email became one that almost the whole world had. Email is one of the results of developments in information and communication. Email is widely used to exchange information by sending and receiving data, such as document files, pictures, letters, and others. So much for the crimes that often occur in emails. Email crimes that often occur among them are email spoofing. Email spoofing is a forgery that occurs in the header of the email. So, the email is sent as if it were a valid email. Email spoofing is often used in spamming activities. Crimes committed by cybercrime must leave evidence such as IP Address, sender's email, and time of sending the email. This research will do forensics on email spoofing. The research uses the Live Forensics method, where the computer is used in a powered-on state. The research also uses the NIST (National Institute of Standards Technology) research flow. The email that will be analyzed is in the email header section using 3 tools, namely tracer email analyzer, email dossier, and mail header analysis. This analysis will compare and check the accuracy of the email headers using these tools. Emails suspected of email spoofing will be proven using tools. Based on the 'form' received' and 'Message-ID' headers. Based on the results, the tool that meets the value after the analysis is tracer email analysis.


Anwar, N., & Riadi, I. (2017). Analisis Investigasi Forensik WhatsApp Messanger Smartphone Terhadap WhatsApp Berbasis Web. Jurnal Ilmiah Teknik Elektro Komputer Dan Informatika, 3(1), 1.

Chhabra, G. S., & Bajwa, D. S. (2012). Review of E-mail System, Security Protocols and Email Forensics. International Journal of Computer Science & Communication Networks, 5(3), 201–211.

Fahana, J., Umar, R., & Ridho, F. (2017). Pemanfaatan Telegram sebagai Notifikasi Serangan untuk Jaringan Forensik. QUERY: Jurnal Sistem Informasi, 1(2), 6–14.

Hoiriyah, Sugiantoro, B., & Prayudi, Y. (2016). Investigasi Forensik Pada Email Spoofing Menggunakan Metode Header Analysis. Jurnal DASI, 17(4), 20–25.

Kurniawan, A., & Prayudi, Y. (2014). Teknik Live Forensics Pada Aktivitas Zeus Malware Untuk Mendukung Investigasi Malware Forensics. HADFEX (Hacking and Digital Forensics Exposed), 1–5.

Mishra, P., Pilli, E. S., & Joshi, R. C. (2012). Forensic Analysis of E-mail Date and Time Spoofing. 2012 Third International Conference on Computer and Communication Technology, November, 309–314.

Nadzifan, A. M., Nazihullah, F., & . S. . (2018). Aplikasi untuk Deteksi Adanya Spoof pada Email. SISTEMASI, 7(3), 268.

Nugroho, N. B., Azmi, Z., & Arif, S. N. (2016). Aplikasi Keamanan Email Menggunakan Algoritma RC4. Jurnal SAINTIKOM, 15(3), 81–88.

Putra, E. N. (2016). Pengiriman E-Mail Spam Sebagai Kejahatan Cyber di Indonesia. Jurnal Cakrawala Hukum, 7(2), 169–182.

Putri, R. U., & Istiyanto, J. E. (2013). Analisis Forensik Jaringan Studi Kasus Serangan SQL Injection pada Server Universitas Gadjah Mada. IJCCS (Indonesian Journal of Computing and Cybernetics Systems), 7(1), 101–112.

Rizal, R. (2018). Network Forensics untuk Mendeteksi Serangan Flooding pada Perangkat Internet of Things (IoT). Universitas Islam Indonesia.

Sutisna, M. A. (2018). Analisa Forensik pada email spoofing. Jurnal Teknologi Terpadu, 4(1), 38–43.

Syahib, M. I., Riadi, I., & Umar, R. (2020). Akuisisi Bukti Digital Aplikasi Viber Menggunakan Metode National Institute of Standards Technology (NIST). J-SAKTI (Jurnal Sains Komputer Dan Informatika), 4(1), 170.

Yudhana, A., Riadi, I., & Anshori, I. (2018). Analisis Bukti Digital Facebook Messenger Menggunakan Metode Nist. IT Journal Research and Development, 3(1), 13–21.

Yudhana, A., Riadi, I., & Zuhriyanto, I. (2019). Analisis Live Forensics Aplikasi Media Sosial Pada Browser Menggunakan Metode Digital Forensics Research Workshop (DFRWS). TECHNO, 20(2), 125–130.




How to Cite

Riadi, I., Sunardi, & Nani, F. T. (2022). Analisis Forensik pada Email Menggunakan Metode National Institute of Standards Technology. JISKA (Jurnal Informatika Sunan Kalijaga), 7(2), 83–90.