Live Forensics Analysis of Line App on Proprietary Operating System
Abstract views: 80

Live Forensics Analysis of Line App on Proprietary Operating System

Imam Riadi, Sunardi Sunardi, Muhamad Ermansyah Rauli

Abstract

 The development of computer technology is increasing rapidly. This has positive and negative effects. One of the negative effects that occurred was the use of Line applications to conduct online shop fraud. Line is one of the instant messenger applications that can be used on computers, especially on Windows 8.1 operating system computers. Applications that run on the computer leave traces of data on Random Access Memory (RAM). Data left in RAM can be obtained using digital forensic techniques, namely live forensics which is used when the computer is running and connected to the internet. This study aims to find digital evidence regarding cases of online shop fraud using the National Institute of Standards and Technology (NIST) method. Digital evidence can be obtained using forensic tools, namely RamCapturer, FTK Imager and Winhex. RamCapturer is used to acquire data in RAM, FTK Imager is used for imaging and Winhex is used to analyze data that has been taken. The results obtained in this study were conversational recordings consisting of conversation time, conversation content and conversation status which could be digital evidence in uncovering the online shop fraud crime that occurred.

Keywords

Line, Live Forensics, Digital Evidence

Full Text:

PDF

References

[1] M. S. Chang and C. Y. Chang, “Forensic Analysis of LINE Messenger on Android,” Journal of Computer, vol. 29, no. 1, pp. 11–20, 2018.

[2] R. Umar, I. Riadi, and G. Maulana, “A Comparative Study of Forensic Tools for WhatsApp Analysis using NIST Measurements, ”International Journal of Advanced Computer Science and Applications (IJACSA), vol. 8, no. 12, pp. 69–75, 2017.

[3] A. T. Kabakus and R. Kara, “Survey of Instant Messaging Applications Encryption Methods,” European Journal of Science and Technology, vol. 2, pp. 112–117, 2015.

[4] I. Riadi, Sunardi, and A. Firdonsyah,"Forensic Investigation Technique on Android’s Blackberry Messenger using NIST Framework," International Journal of Cyber-Security and Digital Forensics (IJCSDF) and The Society of Digital Information and Wireless Communications (SDIWC), vol. 6, no. 4, pp. 198–205, 2017.

[5] I. Riadi, A. Fadlil, and A. Fauzan, “A Study of Mobile Forensic Tools Evaluation on Android-Based LINE Messenger,” International Journal of Advanced Computer Science and Applications (IJACSA), vol. 9, no. 10, pp. 201–206, 2018.

[6] “Statista,” https://www.statista.com/statistics/258749/most-popular-global-mobile-messenger-apps/. .

[7] H. K. Mann and G. S. Chhabra, “Volatile Memory Forensics: A Legal Perspective,” International Journal of Computer Applications, vol. 155, pp. 975–8887, 2016.

[8] D. S. Yudhistira, I. Riadi, and Y. Prayudi, “Live Forensics Analysis Method For Random Access Memory On Laptop Devices,” International Journal of Computer Science and Information Security (IJCSIS), vol. 16, pp. 188–192, 2018.

[9] T. Rochmadi, I. Riadi, and Y. Prayudi, “Live Forensics for Anti-Forensics Analysis on Private Portable Web Browser,” International Journal of Computer Applications, vol. 164, pp. 31–37, 2017.

[10] K. Sreelakshmi and P. Sugathan, “Significance of Residual Artifacts from Random Access Memory,” International Journal of Science and Research, vol. 5, pp. 2013–2016, 2016.

[11] M. P. Aji, I. Riadi, and A. Lutfhi, “The Digital Forensic Analysis of Snapchat Application Using XML Records,” Journal of Theoretical and Applied Information Technology, vol. 95, pp. 4992–5002, 2017.

[12] R. Ruuhwan, I. Riadi, and Y. Prayudi, “Evaluation of Integrated Digital Forensics Investigation Framework for The Investigation of Smartphones Using Soft System Methodology,” International Journal of Electrical and Computer Engineering, vol. 7, pp. 2806–2817, 2017.

[13] M. I. Mazdadi, I. Riadi, and A. Luthfi, “Live Forensics on RouterOS using API Services to Investigate Network Attacks,” International Journal of Computer Science and Information Security, vol. 15, pp. 406–410, 2017.

[14] I. Riadi, A. Yudhana, and M. C. F. Putra, “Forensic Tool Comparison on Instagram Digital Evidence Based on Android with The NIST Method,” Scientific Journal of Informatics, vol. 5, no. 2, pp. 235–247, 2018.

[15] R. Umar, I. Riadi, and G. M. Zamroni, “Mobile Forensic Tools Evaluation for Digital Crime Investigation,” International. Journal on Advanced Science Engineering Information Technology, vol. 8, no. 3, p. 949, 2018.

[16] A. Kurniawan, I. Riadi, and A. Luthfi, “Forensic Analysis and Prevent of Cross Site Scripting in Single Victim Attack Using Open Web Application Security Project (OWASP) Framework,” Journal of Theoretical and Appied. Information Technology, vol. 95, no. 6, pp. 1363–1371, 2017.

[17] A. Majeed, H. Zia, R. Imran, and S. Saleem, “Forensic Analysis Social Media Apps in Windows 10,” 2015 12th International Conference High-Capacity Opt. Networks Enabling/Emerging Technol. HONET-ICT 2015, vol. 10, pp. 37–45, 2016.

[18] R. Dave, N. R. Mistry, and M. S. Dahiya, “Volatile Memory Based Forensic Artifacts & Analysis,” International Journal for Research in Applied Science and Engineering Technology, vol. 2, pp. 120–124, 2014.

[19] I. Riadi, R. Umar, and A. Firdonsyah, “Identification Of Digital Evidence On Android’s Blackberry Messenger Using NIST Mobile Forensics Method,” International Journal of Computer Science and Information Security, vol. 15, pp. 3–8, 2017.

[20] “EpochConverter,” https://www.epochconverter.com/.

Refbacks

  • There are currently no refbacks.

Referencing Software:

Checked by:

Supervised by:

Statistic:

View My Stats


Creative Commons License Kinetik : Game Technology, Information System, Computer Network, Computing, Electronics, and Control by http://kinetik.umm.ac.id is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.