10 results on '"nist"'
Search Results
2. Header investigation for spam email forensics using framework of national institute of standards and technology
- Author
-
Mustafa Mustafa, Imam Riadi, and Rusydi Umar
- Subjects
digital forensics ,forensic e-mail ,forensic tools ,nist ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Today's technology makes communication very easy and can be used anywhere, even a distance of hundreds to thousands of kilometres is not a barrier in communicating. One of the tools or media that is widely used is via email. However, there are many disadvantages that may be obtained from the email, one of which is spamming or mail. The purpose of this research is to know the stages of spamming email analysis through header analysis. The method used in this study is the National Institute of Standards and Technology (NIST) and this method uses 4 stages, namely collection, examination, analysis, and reporting. The results of this study are expected to be able to find out the spam sender's email address, the spam email sender's IP address, and other information needed.
- Published
- 2021
- Full Text
- View/download PDF
3. Perbandingan Forensic Tools pada Instagram Menggunakan Metode NIST
- Author
-
Irhash Ainur Rafiq, Imam Riadi, and Herman
- Subjects
Android ,Forensik ,Bukti Digital ,Instagram ,NIST ,Kejahatan Digital ,Information technology ,T58.5-58.64 - Abstract
The development of communication media continues to increase with the emergence of various communication applications on smartphones, which are currently very developed from limited communication media to social media. This change in the flow of communication applications gives a new color to communication, not just exchanging messages and sounds but also exchanging videos and pictures. This development was also followed by the rise of digital crimes in the form of defamation, fraud, and hoax news by spreading posts and then deleting them after the news spread widely. This research was conducted to obtain digital evidence with the help of special applications such as Belkasoft Evidence and Axiom Magnets using the NIST method. The results of this study show that the Magnet Axiom is better with an accuracy rate of 83.3% while Belkasoft Evidence is only 50%.
- Published
- 2022
4. Analisis Media Sosial Facebook Lite dengan tools Forensik menggunakan Metode NIST
- Author
-
Rauhulloh Ayatulloh Bintang, Rusydi Umar, and Anton Yudhana
- Subjects
forensic digital ,media sosial ,nist ,mobile forensic ,Technology ,Engineering (General). Civil engineering (General) ,TA1-2040 - Abstract
Media Sosial menjadi sangat popular dikalangan masyarakat sekarang ini, dan meningkatnya jumlah penggunaan media sosial tentu saja membawa dampak baik maupun dampak buruk terhadap berlangsungnya perjalanan kehidupan manusia, contoh dari dampak buruk yaitu melakukan pencemaran nama baik atau melakukan penipuan pada media sosial. Ilmu pada Forensik digital yaitu cara untuk menangkap pelaku kejahatan pada digital yang akan diperlukan pada barang bukti dalam persidangan. Para pelaku kejahatan media sosial membutuhkan Smartphone untuk melakukan kejahatan dalam digital. Pada penelitian ini akan mengangkat barang bukti kejahatan digital pada aplikasi facebook lite menggunakan forensik. Pada penelitian ini tool forensik yang akan digunakan yaitu tools forensik MOBILEedit Forensik Pro dengan bantuan menggunakan metode National Institute Of Standars Techlogogy (NIST). NIST memiliki alur kerja yang baik untuk melakukan ekstraksi data digital forensik. Hasil penelitian akan didapatkan berupa Akun yang digunakan, Audio, Conversations, dan Images.
- Published
- 2020
- Full Text
- View/download PDF
5. Kriptografi Audio MP3 Menggunakan RSA dan Transposisi Kolom
- Author
-
Cinantya Paramita and Usman Sudibyo
- Subjects
business.industry ,Computer science ,Cryptography ,Extension (predicate logic) ,MP3, RSA, transposisi, kriptografi ,Information technology ,Encryption ,computer.software_genre ,Trial and error ,T58.5-58.64 ,Variety (cybernetics) ,Systems engineering ,mp3, rsa, transposition, cryptography ,TA168 ,Operating system ,NIST ,business ,Internet of Things ,computer ,Key size - Abstract
Mp3 is one form of audio file extension that is widely used today. With a variety of uses in a variety of mp3 systems become one of the audio extensions that are commonly found in technology systems of the Internet of Things era. However, with the many uses of the .mp3 file extension, there is a new problem, namely the security of the data itself. From these problems, the author aims to examine the security of the mp3 file by designing cryptographic science-based applications. The cryptographic algorithm used in the application is a combination of the asymmetric RSA 2048 algorithm and symmetric columnic transpositions. RSA 2048 algorithm was chosen because it has a key length in accordance with NIST standards in securing data. By combining the two algorithms, the application system will have the ability to manage mp3 files and encrypt mp3 files with the results of data that cannot be played like mp3 files in general. This application system will be developed by prototype method which is the best method in developing a system with trial and error in algorithm development.  , Mp3 merupakan salah satu bentuk ekstensi file audio yang banyak digunakan saat ini. Dengan beragam penggunaan dalam beragam sistem mp3 menjadi salah satu ekstensi audio yang banyak ditemui dalam sistem – sistem teknologi era Internet Of Things. Tetapi, dengan banyaknya kegunaan dari file berekstensi .mp3 terdapat masalah baru yaitu keamanan dari data itu sendiri. Dari permasalahan tersebut, penulis bertujuan untuk meneliti tentang pengamanan dari file mp3 tersebut dengan merancang aplikasi berbasis ilmu kriptografi. Algoritma kriptografi yang digunakan dalam aplikasi tersebut merupakan algoritma kombinasi dari algoritma asimetris RSA 2048 dan simetris transposisi kolumnar. Algoritma RSA 2048 dipilih karena memiliki panjang kunci yang sesuai dengan standar NIST dalam pengamanan suatu data. Dengan menggabungkan kedua algoritma tersebut, sistem aplikasi akan memiliki kemampuan untuk mengelola file mp3 dan mengenkripsi file mp3 dengan hasil data yang tidak dapat di putar layaknya file mp3 pada umumnya. Sistem aplikasi ini akan dikembangan dengan metode prototype yang menjadi metode terbaik dalam mengembangkan sistem dengan trial dan error dalam pengembangan algoritma.
- Published
- 2021
- Full Text
- View/download PDF
6. Penerapan Metode Localization Tampering dan Hashing untuk Deteksi Rekayasa Video Digital
- Author
-
Alfiansyah Imanda Putra Alfian, Rusydi Umar, and Abdul Fadlil
- Subjects
business.industry ,Computer science ,Frame (networking) ,Hash function ,Process (computing) ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Centroid ,Information technology ,T58.5-58.64 ,Systems engineering ,TA168 ,Histogram ,Metric (mathematics) ,forensics, video, localization tampering, manipulation ,NIST ,Computer vision ,Noise (video) ,Artificial intelligence ,Forensik,Video, Localization Tampering, Rekayasa ,business - Abstract
The development of digital video technology which is increasingly advanced makes digital video engineering crimes prone to occur. The change in digital video has changed information communication, and it is easy to use in digital crime. One way to solve this digital crime case is to use the NIST (National Institute of Standards and Technology) method for video forensics. The initial stage is carried out by collecting data and carrying out the process of extracting the collected results. A local hash and noise algorithm can then be used to analyze the resulting results, which will detect any digital video interference or manipulation at each video frame, and perform hash analysis to detect the authenticity of the video. In digital video engineering, histogram analysis can be performed by calculating the histogram value metric, which is used to compare the histogram values of the original video and video noise and make graphical comparisons. The results of the difference in frame analysis show that the results of the video show that the 2nd to 7th frames experience an attack while the histogram calculation of the original video centroid value and video tampering results in different values in the third frame, namely with a value of 124.318 and the 7th frame of the video experiencing a difference in the value of 105,966 videos. tampering and 107,456 in the original video. Hash analysis on video tampering results in an invalid SHA-1 hash, this can prove that the video has been manipulated., Perkembangan teknologi video digital yang semakin maju membuat kejahatan rekayasa video digital rawan terjadi. Perubahan video digital membuat informasi yang disampaikan menjadi berubah dan sangat rawan dimanfaatkan menjadi aksi kejahatan digital. Salah satu cara untuk mengatasi kasus kejahatan digital ini adalah dengan menggunakan digital forensik seperti metode NIST (National Institute of Standards and Technology). Tahapan awal yang dilakukan akuisisi data dan melakukan proses ekstraksi hasil akuisisi tersebut. Hasil yang sudah di dapat selanjutnya dianalisis menggunakan algoritma Localization Tampering dan Hashing, algoritma ini untuk mendeteksi adanya perusakan atau manipulasi video digital pada tiap frame dan analisis hash untuk mendeteksi keaslian video. Dalam rekayasa video digital, analisis histogram dapat dilakukan dengan menghitung metrik nilai histogram, yang digunakan untuk membandingkan nilai histogram pada video asli dan video tampering serta membuat perbandingan grafik. Hasil perbedaan analisis frame menunjukan hasil video bahwa frame ke 2 sampai 7 mengalami attack sedangkan pada perhitungan histogram nilai centroid video asli dan video tampering manghasilkan nilai yang berbeda pada frame ke tiga yaitu dengan nilai 124.318 dan frame ke 7 video mengalami perbedaan nilai yaitu sebesar 105.966 video tampering dan 107.456 di video asli. Analisis hash pada video tampering menghasilkan hash SHA-1 tidak valid, hal Ini dapat membuktikan bahwa video tersebut telah dimanipulasi.
- Published
- 2021
7. Acquisition of Digital evidence Android-Based Viber Messenger App
- Author
-
Muhammad Irwan Syahib, Rusydi Umar, and Imam Riadi
- Subjects
lcsh:T58.5-58.64 ,Computer science ,business.industry ,lcsh:Information technology ,Instant messenger ,Digital forensics ,Internet privacy ,lcsh:TA168 ,Workflow ,Digital evidence ,lcsh:Systems engineering ,NIST ,viber, nist, digital forensic, mobile forensic, digital evidence ,Social media ,Viber, NIST, Forensik Digital, Mobile Forensik, Bukti Digital ,Android (operating system) ,business - Abstract
Viber is one of the most popular social media in the Instant Messenger application category that can be used to send text messages, make voice calls, send picture messages and video messages to other users. As many as 260 million people around the world have used this application. Increasing the number of viber users certainly brings positive and negative impacts, one of the negative impacts of this application is the use of digital forensic crime. This research simulates and removes digital crime evidence from the viber application on Android smartphones using the National Institute of Standards Technology (NIST) method, which is a method that has work guidelines on forensic policy and process standards to ensure each investigator follows the workflow the same so that their work is documented and the results can be accounted for. This study uses three forensic tools, MOBILedit Forensic Express, Belkasoft and Autopsy. The results in this study show that MOBILedit Forensic Express gets digital evidence with a percentage of 100% in getting accounts, contacts, pictures and videos. While proof of digital chat is only 50%. Belkasoft gets digital evidence with a percentage of 100% in getting accounts, contacts, pictures and videos. While proof of digital chat is only 50%. For Autopsy does not give the expected results in the extraction process, in other words the Autopsy application gives zero results. It can be concluded that MOBILedit Forensic Express and Belkasoft have a good performance compared to Autopsy and thus this research has been completed and succeeded in accordance with the expected goals., Viber merupakan salah satu media sosial yang popular untuk kategori aplikasi Instant Messenger yang dapat digunakan untuk mengirim pesan teks, melakukan panggilan suara, mengirim pesan gambar dan pesan berupa video kepada sesama penggunanya. Sebanyak 260 juta orang di seluruh dunia telah menggunakan aplikasi ini. Peningkatan jumlah pengguna viber tentu membawa dampak positif dan juga negatif, salah satu dampak negative aplikasi ini adalah penggunaan dalam hal melakukan kejahatan forensik digital. Penelitian ini melakukan simulasi dan pengangkatan barang bukti kejahatan digital dari aplikasi viber pada smartphone Android dengan menggunakan metode National Institute of Standards Technology (NIST) yang merupakan salah satu metode yang memiliki panduan kerja pada kebijakan dan standar proses forensik untuk menjamin setiap investigator mengikuti alur kerja yang sama sehingga pekerjaan mereka terdokumentasikan dan hasilnya dapat dipertanggung jawabkan. Penelitian ini menggunakan tiga alat forensik, MOBILedit Forensic Express, Belkasoft dan Autopsy. Hasil dalam penelitian ini menujukan bahwa MOBILedit Forensic Express mendapatkan hasil bukti digital dengan persentase berupa 100% dalam mendapatkan akun, kontak, gambar dan video. Sedangkan bukti digital chat hanya 50%. Belkasoft mendapatkan hasil bukti digital dengan persentase 100% dalam mendapatkan akun, kontak, gambar dan video. Sedangkan bukti digital chat hanya 50%. Untuk Autopsy tidak memberikan hasil yang diharapkan dalam poses ekstraksi, dengan kata lain aplikasi Autopsy memberikan hasil nol (zero result). Dapat disimpulkan bahwa MOBILedit Forensic Express dan Belkasoft memiliki kinerja yang baik dibandingkan dengan Autopsy dan dengan demikian penelitian ini telah selesai dan berhasil sesuai dengan tujuan yang diharapkan.
- Published
- 2021
- Full Text
- View/download PDF
8. Analysis of Skype Digital Evidence Recovery based on Android Smartphones Using the NIST Framework
- Author
-
Muhammad Rizki Setyawan, Anton Yudhana, and Abdul Fadlil
- Subjects
nist ,Database ,lcsh:T58.5-58.64 ,business.industry ,Computer science ,lcsh:Information technology ,Digital forensics ,digital forensics ,Commit ,computer.software_genre ,Data recovery ,lcsh:TA168 ,Cybercrime ,recovery ,Digital evidence ,lcsh:Systems engineering ,cybercrime ,Data_FILES ,Erasure ,NIST ,skype ,Android (operating system) ,business ,computer - Abstract
Cybercrime is an activity utilizing electronic devices and network technology as tools or media to commit crimes. One of them uses the Skype application that is installed on the smartphone. In finding evidence from a cybercrime case, a forensic activity known as digital forensic must be carried out. This study aims to recover digital evidence that has been erased using the NIST framework and forensic tools such as Oxygen and Belkasoft. The results of digital evidence recovery from smartphone Samsung J2 in the removal scenario via the application manager, the Oxygen tool cannot recover deleted data and the percentage of success using Belkasoft is 26%. While the results of data recovery with the manual removal method the percentage of success using Oxygen was 63% and Belkasoft was 44%. Digital evidence recovery results from smartphones Andromax A on the erase scenario through the application manager, Oxygen and Belkasoft tools cannot recover deleted data. While manual removal of Oxygen by 61% and Belkasoft cannot restore data. It can be concluded the results of data recovery from both smartphones that are used according to the erasure method through the application manager, Belkasoft has better performance than Oxygen, and data recovery according to the method of erasing manually, Oxygen has better performance than Belkasoft.
- Published
- 2020
9. PENERAPANA METODE NATIONAL INSTITUTE OF STANDARS AND TECHNOLOGY (NIST) DALAM ANALISIS FORENSIK DIGITAL UNTUK PENANGANAN CYBER CRIME
- Author
-
Khairan Ar Ar, Jiwa Malem Marsya, and Mulia Fitriana
- Subjects
Computer science ,lcsh:T ,media_common.quotation_subject ,Digital forensics ,lcsh:Q300-390 ,lcsh:Technology ,World Wide Web ,Digital evidence ,Backup ,digital forensic, cyber crime, whatsapp ,General Health Professions ,NIST ,Pornography ,ComputingMilieux_COMPUTERSANDSOCIETY ,Conversation ,Session (computer science) ,Suspect ,lcsh:Cybernetics ,media_common - Abstract
The development of technology is currently developing very quickly, this is directly proportional to releasing cyber crime. One crime that often occurs is the case of Pornography. This application is done using one of the very popular Instant Messenger (IM) applications, the WhatsApp application. But after the crime is committed next or sending evidence in the form of conversations, video recordings, images and others committed by the suspect using the WhatsApp application. Therefore, this study proposes to find evidence related to digital pornography. This research produced a forensic procedure in conducting an investigation of the WhatsApp application to obtain previously published evidence containing a conversation session, a list of contact numbers, a profile photo of the victim and others. This research was conducted by reading a backup file of the encrypted WhatsApp application database that stores the conversation session that has been released. This research uses the method (National Institute of Standards and Technology (NIST). This digital evidence can be obtained using one of the forensic tools namely WhtasApp Viewer. The results obtained in this study contain WhatsApp contents that have been available which can be found digitally in uncovering the crime of pornography that is happen.
- Published
- 2020
10. Live Forensics Analysis of Line App on Proprietary Operating System
- Author
-
Sunardi Sunardi, Muhamad Ermansyah Rauli, and Imam Riadi
- Subjects
lcsh:Computer engineering. Computer hardware ,Computer science ,business.industry ,media_common.quotation_subject ,Digital forensics ,line, live forensics, digital evidence ,lcsh:TK7885-7895 ,computer.software_genre ,Live forensics ,Digital evidence ,Operating system ,NIST ,Conversation ,The Internet ,Line (text file) ,business ,computer ,media_common ,Computer technology - Abstract
The development of computer technology is increasing rapidly. This has positive and negative effects. One of the negative effects that occurred was the use of Line applications to conduct online shop fraud. Line is one of the instant messenger applications that can be used on computers, especially on Windows 8.1 operating system computers. Applications that run on the computer leave traces of data on Random Access Memory (RAM). Data left in RAM can be obtained using digital forensic techniques, namely live forensics which is used when the computer is running and connected to the internet. This study aims to find digital evidence regarding cases of online shop fraud using the National Institute of Standards and Technology (NIST) method. Digital evidence can be obtained using forensic tools, namely RamCapturer, FTK Imager and Winhex. RamCapturer is used to acquire data in RAM, FTK Imager is used for imaging and Winhex is used to analyze data that has been taken. The results obtained in this study were conversational recordings consisting of conversation time, conversation content and conversation status which could be digital evidence in uncovering the online shop fraud crime that occurred.
- Published
- 2019
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.