ANALISIS FORENSIK DIGITAL PADA SKYPE BERBASIS WINDOWS 10 MENGGUNAKAN FRAMEWORK ACPO

Main Article Content

Muhammad Rizki Setyawan
Hermansa Hermansa
Muh. Fadli Hasa

Abstract

Crime in the world is increasing every year. This is supported by the ease with which people get technology devices and increasingly widespread internet access. The Skype application is one of the tools that can be used to commit cyber crimes. This is due to the increasing number of users. Therefore, in dealing with crimes in cyberspace, digital forensic methods are needed to find digital evidence. This study aims to compare the results of forensic analysis on the Skype application based on Windows 10 with static forensic methods and the Association of Chief Police Officers (ACPO) framework. The results obtained are that Autopsy managed to obtain digital evidence in the form of 15 contact persons, 1 text message, and 9 image files with a performance percentage of 48%. Meanwhile, the Belkasoft Evidence Center forensic tool managed to get digital evidence of 15 contact persons, 2 text messages and the image file could not be found with a performance percentage of 32%. From these results, it can be concluded that Autopsy has a better performance than Belkasoft in finding deleted digital evidencex.

Article Details

How to Cite
Rizki Setyawan, M., Hermansa, H., & Fadli Hasa, M. (2022). ANALISIS FORENSIK DIGITAL PADA SKYPE BERBASIS WINDOWS 10 MENGGUNAKAN FRAMEWORK ACPO. JURNAL ILMIAH BETRIK : Besemah Teknologi Informasi Dan Komputer, 13(2), 111-119. https://doi.org/10.36050/betrik.v13i2.469
Section
Articles

References

[1] I. Riadi, A. Fadlil, and A. Fauzan, “Evidence Gathering and Identification of LINE Messenger on Android Device,” Int. J. Comput. Sci. Inf. Secur. (IJCSIS), vol. 16, no. June, pp. 201–205, 2018.
[2] M. R. Setyawan, A. Yudhana, and A. Fadlil, “Akuisisi Data Pada Skype Messenger Menggunakan Metode National Institute Of Justice,” Syst. Inf. Syst. Informatics Journal., vol. 5, no. 2, pp. 13–18, 2019, doi: 10.29080/systemic.v5i2.724.
[3] M. S. Chang and C. Y. Chang, “Forensic analysis of LINE messenger on android,” J. Comput., vol. 29, no. 1, pp. 11–20, 2018, doi: 10.3966/199115992018012901002.
[4] M. S. Asyaky, N. Widiyasono, and R. Gunawan, “Analisis dan Perbandingan Bukti Digital Aplikasi Instant Messenger Pada Android,” Sink. J. Penelit. Tek. Inform., vol. 3, no. 1, pp. 220–231, 2018.
[5] E. Chintia, R. Nadiah, H. N. Ramadhani, Z. F. Haedar, A. Febriansyah, and N. A. Rakhmawati S.Kom., M.Sc.Eng, “Kasus Kejahatan Siber yang Paling Banyak Terjadi di Indonesia dan Penanganannya,” J. Inf. Eng. Educ. Technol., vol. 2, no. 2, p. 65, 2019, doi: 10.26740/jieet.v2n2.p65-69.
[6] A. Yudhana, I. Riadi, and F. Ridho, “DDoS classification using neural network and naïve bayes methods for network forensics,” Int. J. Adv. Comput. Sci. Appl., vol. 9, no. 11, pp. 177–183, 2018, doi: 10.14569/ijacsa.2018.091125.
[7] D. T. Yuwono, A. Fadlil, and Sunardi, “Perbandingan Kinerja Perangkat Lunak Forensik untuk File Carving dengan Metode NIST,” J. Teknol. dan Sist. Komput., vol. 7, no. July, pp. 89–92, 2019, doi: 10.14710/jtsiskom.7.3.2019.89-92.
[8] Sunardi, I. Riadi, and M. H. Akbar, “Penerapan Metode Static Forensics untuk Ekstraksi File Steganografi,” Rekayasa Sist. dan Teknol. Inf. (RESTI ), vol. 4, no. 3, pp. 576–583, 2020.
[9] R. Umar, A. Yudhana, and M. N. Faiz, “Experimental Analysis of Web Browser Sessions Using Live Forensics Method,” Int. J. Electr. Comput. Eng., vol. 8, no. 5, pp. 2951–2958, 2018, doi: 10.11591/ijece.v8i5.pp2951-2958.
[10] C. Rogers, “Mobile Forensics: an Overview, Tools, Future trends and Challenges from Law Enforcement perspective,” Disabil. Soc., vol. 30, no. 9, pp. 1439–1443, 2015, doi: 10.1080/09687599.2015.1112139.
[11] A. Yudhana, I. Riadi, and I. Anshori, “Analisis Bukti Digital Facebook Messenger Menggunakan Metode Nist,” It J. Res. Dev., vol. 3, no. 1, p. 13, 2018, doi: 10.25299/itjrd.2018.vol3(1).1658.
[12] T. D. Larasati and B. C. Hidayanto, “Analisis Live Forensics Untuk Perbandingan Aplikasi Instant Messenger Pada Sistem Operasi Windows 10,” Sesindo, vol. 6, no. November, pp. 456–256, 2017.
[13] I. Riadi, S. Sunardi, and M. E. Rauli, “Identifikasi Bukti Digital WhatsApp pada Sistem Operasi Proprietary Menggunakan Live Forensics,” J. Tek. Elektro, vol. 10, no. 1, pp. 18–22, Jun. 2018, doi: 10.15294/jte.v10i1.14070.
[14] A. Yudhana, I. Riadi, and I. Zuhriyanto, “Analisis Live Forensics Aplikasi Media Sosial Pada Browser Menggunakan Metode Digital Forensics Research Workshop (DFRWS),” TECHNO, vol. 20, no. 2, pp. 125–130, 2019, doi: 10.30595/techno.v20i2.4594.
[15] I. Riadi, R. Umar, and M. A. Aziz, “Forensik Web Layanan Instant Messaging Menggunakan Metode Association of Chief Police Officers (ACPO),” Mob. Forensics, vol. 1, no. 1, p. 30, 2019, doi: 10.12928/mf.v1i1.705.
[16] I. Riadi, A. Yudhana, and M. C. F. Putra, “Forensic Tool Comparison on Instagram Digital Evidence Based on Android with The NIST Method,” Sci. J. Informatics, vol. 5, no. 2, pp. 235–247, 2018.