Analisis Forensik pada Email Menggunakan Metode National Institute of Standards Technology
DOI:
https://doi.org/10.14421/jiska.2022.7.2.83-90Keywords:
Email Spoofing, Header Email, Metode NIST, Tiga Tools, Live ForensicsAbstract
Nowadays developments in information technology are growing rapidly, especially in email. Email became one that almost the whole world had. Email is one of the results of developments in information and communication. Email is widely used to exchange information by sending and receiving data, such as document files, pictures, letters, and others. So much for the crimes that often occur in emails. Email crimes that often occur among them are email spoofing. Email spoofing is a forgery that occurs in the header of the email. So, the email is sent as if it were a valid email. Email spoofing is often used in spamming activities. Crimes committed by cybercrime must leave evidence such as IP Address, sender's email, and time of sending the email. This research will do forensics on email spoofing. The research uses the Live Forensics method, where the computer is used in a powered-on state. The research also uses the NIST (National Institute of Standards Technology) research flow. The email that will be analyzed is in the email header section using 3 tools, namely tracer email analyzer, email dossier, and mail header analysis. This analysis will compare and check the accuracy of the email headers using these tools. Emails suspected of email spoofing will be proven using tools. Based on the 'form' received' and 'Message-ID' headers. Based on the results, the tool that meets the value after the analysis is tracer email analysis.
References
Anwar, N., & Riadi, I. (2017). Analisis Investigasi Forensik WhatsApp Messanger Smartphone Terhadap WhatsApp Berbasis Web. Jurnal Ilmiah Teknik Elektro Komputer Dan Informatika, 3(1), 1. https://doi.org/10.26555/jiteki.v3i1.6643
Chhabra, G. S., & Bajwa, D. S. (2012). Review of E-mail System, Security Protocols and Email Forensics. International Journal of Computer Science & Communication Networks, 5(3), 201–211.
Fahana, J., Umar, R., & Ridho, F. (2017). Pemanfaatan Telegram sebagai Notifikasi Serangan untuk Jaringan Forensik. QUERY: Jurnal Sistem Informasi, 1(2), 6–14.
Hoiriyah, Sugiantoro, B., & Prayudi, Y. (2016). Investigasi Forensik Pada Email Spoofing Menggunakan Metode Header Analysis. Jurnal DASI, 17(4), 20–25.
Kurniawan, A., & Prayudi, Y. (2014). Teknik Live Forensics Pada Aktivitas Zeus Malware Untuk Mendukung Investigasi Malware Forensics. HADFEX (Hacking and Digital Forensics Exposed), 1–5.
Mishra, P., Pilli, E. S., & Joshi, R. C. (2012). Forensic Analysis of E-mail Date and Time Spoofing. 2012 Third International Conference on Computer and Communication Technology, November, 309–314. https://doi.org/10.1109/ICCCT.2012.69
Nadzifan, A. M., Nazihullah, F., & . S. . (2018). Aplikasi untuk Deteksi Adanya Spoof pada Email. SISTEMASI, 7(3), 268. https://doi.org/10.32520/stmsi.v7i3.380
Nugroho, N. B., Azmi, Z., & Arif, S. N. (2016). Aplikasi Keamanan Email Menggunakan Algoritma RC4. Jurnal SAINTIKOM, 15(3), 81–88.
Putra, E. N. (2016). Pengiriman E-Mail Spam Sebagai Kejahatan Cyber di Indonesia. Jurnal Cakrawala Hukum, 7(2), 169–182. https://doi.org/10.26905/idjch.v7i2.1906
Putri, R. U., & Istiyanto, J. E. (2013). Analisis Forensik Jaringan Studi Kasus Serangan SQL Injection pada Server Universitas Gadjah Mada. IJCCS (Indonesian Journal of Computing and Cybernetics Systems), 7(1), 101–112. https://doi.org/10.22146/ijccs.2157
Rizal, R. (2018). Network Forensics untuk Mendeteksi Serangan Flooding pada Perangkat Internet of Things (IoT). Universitas Islam Indonesia.
Sutisna, M. A. (2018). Analisa Forensik pada email spoofing. Jurnal Teknologi Terpadu, 4(1), 38–43. https://doi.org/10.54914/jtt.v4i1.104
Syahib, M. I., Riadi, I., & Umar, R. (2020). Akuisisi Bukti Digital Aplikasi Viber Menggunakan Metode National Institute of Standards Technology (NIST). J-SAKTI (Jurnal Sains Komputer Dan Informatika), 4(1), 170. https://doi.org/10.30645/j-sakti.v4i1.196
Yudhana, A., Riadi, I., & Anshori, I. (2018). Analisis Bukti Digital Facebook Messenger Menggunakan Metode Nist. IT Journal Research and Development, 3(1), 13–21. https://doi.org/10.25299/itjrd.2018.vol3(1).1658
Yudhana, A., Riadi, I., & Zuhriyanto, I. (2019). Analisis Live Forensics Aplikasi Media Sosial Pada Browser Menggunakan Metode Digital Forensics Research Workshop (DFRWS). TECHNO, 20(2), 125–130. https://doi.org/10.30595/techno.v20i2.4594
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 Imam Riadi, Sunardi, Fitriyani Tella Nani
![Creative Commons License](http://i.creativecommons.org/l/by-nc/4.0/88x31.png)
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Authors who publish with this journal agree to the following terms as stated in http://creativecommons.org/licenses/by-nc/4.0
a. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
b. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
c. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.