Analisis Forensik pada Email Menggunakan Metode National Institute of Standards Technology

Authors

  • Imam Riadi Universitas Ahmad Dahlan
  • Sunardi Universitas Ahmad Dahlan
  • Fitriyani Tella Nani Universitas Ahmad Dahlan

DOI:

https://doi.org/10.14421/jiska.2022.7.2.83-90

Keywords:

Email Spoofing, Header Email, Metode NIST, Tiga Tools, Live Forensics

Abstract

Nowadays developments in information technology are growing rapidly, especially in email. Email became one that almost the whole world had. Email is one of the results of developments in information and communication. Email is widely used to exchange information by sending and receiving data, such as document files, pictures, letters, and others. So much for the crimes that often occur in emails. Email crimes that often occur among them are email spoofing. Email spoofing is a forgery that occurs in the header of the email. So, the email is sent as if it were a valid email. Email spoofing is often used in spamming activities. Crimes committed by cybercrime must leave evidence such as IP Address, sender's email, and time of sending the email. This research will do forensics on email spoofing. The research uses the Live Forensics method, where the computer is used in a powered-on state. The research also uses the NIST (National Institute of Standards Technology) research flow. The email that will be analyzed is in the email header section using 3 tools, namely tracer email analyzer, email dossier, and mail header analysis. This analysis will compare and check the accuracy of the email headers using these tools. Emails suspected of email spoofing will be proven using tools. Based on the 'form' received' and 'Message-ID' headers. Based on the results, the tool that meets the value after the analysis is tracer email analysis.

References

Anwar, N., & Riadi, I. (2017). Analisis Investigasi Forensik WhatsApp Messanger Smartphone Terhadap WhatsApp Berbasis Web. Jurnal Ilmiah Teknik Elektro Komputer Dan Informatika, 3(1), 1. https://doi.org/10.26555/jiteki.v3i1.6643

Chhabra, G. S., & Bajwa, D. S. (2012). Review of E-mail System, Security Protocols and Email Forensics. International Journal of Computer Science & Communication Networks, 5(3), 201–211.

Fahana, J., Umar, R., & Ridho, F. (2017). Pemanfaatan Telegram sebagai Notifikasi Serangan untuk Jaringan Forensik. QUERY: Jurnal Sistem Informasi, 1(2), 6–14.

Hoiriyah, Sugiantoro, B., & Prayudi, Y. (2016). Investigasi Forensik Pada Email Spoofing Menggunakan Metode Header Analysis. Jurnal DASI, 17(4), 20–25.

Kurniawan, A., & Prayudi, Y. (2014). Teknik Live Forensics Pada Aktivitas Zeus Malware Untuk Mendukung Investigasi Malware Forensics. HADFEX (Hacking and Digital Forensics Exposed), 1–5.

Mishra, P., Pilli, E. S., & Joshi, R. C. (2012). Forensic Analysis of E-mail Date and Time Spoofing. 2012 Third International Conference on Computer and Communication Technology, November, 309–314. https://doi.org/10.1109/ICCCT.2012.69

Nadzifan, A. M., Nazihullah, F., & . S. . (2018). Aplikasi untuk Deteksi Adanya Spoof pada Email. SISTEMASI, 7(3), 268. https://doi.org/10.32520/stmsi.v7i3.380

Nugroho, N. B., Azmi, Z., & Arif, S. N. (2016). Aplikasi Keamanan Email Menggunakan Algoritma RC4. Jurnal SAINTIKOM, 15(3), 81–88.

Putra, E. N. (2016). Pengiriman E-Mail Spam Sebagai Kejahatan Cyber di Indonesia. Jurnal Cakrawala Hukum, 7(2), 169–182. https://doi.org/10.26905/idjch.v7i2.1906

Putri, R. U., & Istiyanto, J. E. (2013). Analisis Forensik Jaringan Studi Kasus Serangan SQL Injection pada Server Universitas Gadjah Mada. IJCCS (Indonesian Journal of Computing and Cybernetics Systems), 7(1), 101–112. https://doi.org/10.22146/ijccs.2157

Rizal, R. (2018). Network Forensics untuk Mendeteksi Serangan Flooding pada Perangkat Internet of Things (IoT). Universitas Islam Indonesia.

Sutisna, M. A. (2018). Analisa Forensik pada email spoofing. Jurnal Teknologi Terpadu, 4(1), 38–43. https://doi.org/10.54914/jtt.v4i1.104

Syahib, M. I., Riadi, I., & Umar, R. (2020). Akuisisi Bukti Digital Aplikasi Viber Menggunakan Metode National Institute of Standards Technology (NIST). J-SAKTI (Jurnal Sains Komputer Dan Informatika), 4(1), 170. https://doi.org/10.30645/j-sakti.v4i1.196

Yudhana, A., Riadi, I., & Anshori, I. (2018). Analisis Bukti Digital Facebook Messenger Menggunakan Metode Nist. IT Journal Research and Development, 3(1), 13–21. https://doi.org/10.25299/itjrd.2018.vol3(1).1658

Yudhana, A., Riadi, I., & Zuhriyanto, I. (2019). Analisis Live Forensics Aplikasi Media Sosial Pada Browser Menggunakan Metode Digital Forensics Research Workshop (DFRWS). TECHNO, 20(2), 125–130. https://doi.org/10.30595/techno.v20i2.4594

Downloads

Published

2022-05-25

How to Cite

Riadi, I., Sunardi, & Nani, F. T. (2022). Analisis Forensik pada Email Menggunakan Metode National Institute of Standards Technology. JISKA (Jurnal Informatika Sunan Kalijaga), 7(2), 83–90. https://doi.org/10.14421/jiska.2022.7.2.83-90

Issue

Section

Articles