HYBRID ACQUISITION PADA FORENSIK DIGITAL BERBASIS ISO/IEC 27037:2012 MENGGUNAKAN PORT MIRRORING DAN SINGLE BOARD COMPUTER
DOI:
https://doi.org/10.24076/joism.2023v5i1.1157Keywords:
cybercrime, digital forensics, network forensics, hybrid acquisition, routerAbstract
Badan Siber dan Sandi Negara (BSSN) memaparkan bahwa Indonesia memiliki anomali lalu lintas sebesar 1,6 Miliar. Anomali lalu lintas terbesar berasal dari BotNet. Hal ini termasuk dalam kejahatan dunia maya dengan kategori kejahatan komputer karena pelaku dan korban berada dalam sistem dan jaringan komputer. Untuk menyelidiki kejahatan dunia maya, pendekatan forensik jaringan dapat digunakan dengan memperoleh bukti digital berupa lalu lintas jaringan. Tidak hanya lalu lintas jaringan yang diperoleh dengan menggunakan tangkapan lalu lintas jaringan, tetapi juga menggunakan perangkat berbiaya rendah seperti Raspberry Pi. Maka pada artikel ini diusulkan akuisisi hybrid yaitu melakukan akuisisi parsial pada sisi perangkat Router dalam hal ini Router Mikrotik dan akuisisi fisik pada kartu memori Raspberry Pi yang berfungsi untuk merekam sistem pendeteksi trafik berbahaya. Metode akuisisi hybrid sangat cocok diterapkan pada sistem komputer dan jaringan untuk menyelidiki kejahatan dunia maya, seperti anomali lalu lintas, cryptomining, pencuri malware, dan pembobolan data.
Downloads
References
R. Raodia, “Pengaruh Perkembangan Teknologi Terhadap Terjadinya Kejahatan Mayantara (Cybercrime),” Jurisprud. Jur. Ilmu Huk. Fak. Syariah Dan Huk., vol. 6, no. 2, pp. 230–239, 2019.
D. P. I. Kusuma, N. H. Maulida, and D. Hariyadi, “Evaluasi Potensi Celah Keamanan SQL Injection Menggunakan Nearest Neighbor pada Security-Software Development Life Cycle,” J. Repos., vol. 2, no. 9, pp. 1273–1280, 2020.
D. A. Effendy, K. Kusrini, and S. Sudarmawan, “Classification of intrusion detection system (IDS) based on computer network,” in 2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE), IEEE, 2017, pp. 90–94.
G. Dhillon, “What to do before and after a cybersecurity breach,” Am. Univ. Wash. DC Kogod Cybersecurity Gov. Cent., 2015.
P. Satam, “A methodology to design intrusion detection systems (IDS) for IoT/networking protocols,” PhD Thesis, The University of Arizona, 2019.
P. I. Priyadarsini and G. Anuradha, “A novel ensemble modeling for intrusion detection system,” Int. J. Electr. Comput. Eng., vol. 10, no. 2, p. 1963, 2020.
D. Hariyadi, C. B. Setiawan, and B. Setiyadi, “Pengembangan Sistem Pemantauan dan Deteksi Serangan pada Ekosistem Rumah Cerdas,” J. Komtika Komputasi Dan Inform., vol. 5, no. 2, pp. 132–139, 2021.
H. Hudzaifah, A. Sularsa, and D. R. Suchendra, “Membangun Sistem Monitoring Malicious Traffic Di Jaringan Dengan Maltrail,” EProceedings Appl. Sci., vol. 4, no. 3, 2018.
R. W. Shiddiq, Implementasi Sensor Maltrail dan Fail2Ban Untuk Mendeteksi dan Mencegah Serangan Malware Pada Jaringan Server Diskominfo Sumedang Dengan Push Notifikasi. Universitas Telkom, D3 Teknologi Telekomunikasi, 2021. Accessed: Apr. 23, 2023. [Online]. Available: https://repository.telkomuniversity.ac.id/pustaka/174726/implementasi-sensor-maltrail-dan-fail2ban-untuk-mendeteksi-dan-mencegah-serangan-malware-pada-jaringan-server-diskominfo-sumedang-dengan-push-notifikasi.html
McAfee, “Integrating SIEM into Your Threat Hunting Strategy,” TechRepublic, Apr. 20, 2023. https://www.techrepublic.com/resource-library/whitepapers/integrating-siem-into-your-threat-hunting-strategy/ (accessed Apr. 23, 2023).
D. Hariyadi, H. Wijayanto, and I. D. Sari, “Analisis Barang Bukti Digital Aplikasi Paziim pada Ponsel Cerdas Android dengan Pendekatan Logical Acquisition,” Cyber Secur. Dan Forensik Digit., vol. 2, no. 2, pp. 52–56, 2019.
D. Hariyadi, F. E. Nastiti, and F. N. Aini, “Framework for acquisition of cctv evidence based on acpo and sni iso/iec 27037: 2014,” in Int. Conf. Informatics Dev, 2018.
D. Hariyadi, M. Kusuma, and A. Sholeh, “Digital Forensics Investigation on Xiaomi Smart Router Using SNI ISO/IEC 27037: 2014 and NIST SP 800-86 Framework,” in International Conference on Science and Engineering (ICSE-UIN-SUKA 2021), Atlantis Press, 2021, pp. 143–147.
A. R. Supriyono, B. Sugiantoro, and Y. Prayudi, “Eksplorasi Bukti Digital Pada Smart Router Menggunakan Metode Live Forensics,” J. Infotekmesin, vol. 10, no. 2, pp. 38–45, 2019.
M. Najib, B. Purnomosidi D.P, and M. A. Nugroho, “IMPLEMENTASI SECURITY AUDITOR UNTUK STANDARDISASI INSTALASI SERVER PADA LAYANAN SAAS MENGGUNAKAN CIS BENCHMARK,” Cyber Secur. Dan Forensik Digit., vol. 5, no. 2, pp. 83–88, Jan. 2023, doi: 10.14421/csecurity.2022.5.2.3929.
BSSN, “Laporan Tahunan Monitoring Keamanan Siber Tahun 2021 | bssn.go.id,” 2021. https://bssn.go.id/laporan-tahunan-monitoring-keamanan-siber-tahun-2021/ (accessed Apr. 23, 2023).
R. Sahtyawan, “PENERAPAN ZERO ENTRY HACKING DIDALAM SECURITY MISCONFIGURATION PADA VAPT (VULNERABILITY ASSESSMENT AND PENETRATION TESTING),” J. Inf. Syst. Manag. JOISM, vol. 1, no. 1, Art. no. 1, Jul. 2019, doi: 10.24076/joism.2019v1i1.18.
European Union Agency for Cybersecurity., Introduction to network forensics: analysis of an airport third party VPN connection compromise toolset?: document for students. LU: Publications Office, 2019. Accessed: Apr. 23, 2023. [Online]. Available: https://data.europa.eu/doi/10.2824/995110
J. Bullock and J. T. Parker, Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework. John Wiley & Sons, 2017.
Sudarshan, “Malicious Traffic Detection System using Publicly Available Blacklist’s,” Int. J. Eng. Adv. Technol., vol. 8, no. 6S, pp. 356–361, Sep. 2019, doi: 10.35940/ijeat.F1075.0886S19.
H. Alamsyah and A. Al Akbar, “Analisa Keamanan Jaringan Menggunakan Network Intrusion Detection and Prevention System,” JOINTECS J. Inf. Technol. Comput. Sci., vol. 5, no. 1, pp. 17–24, 2020.
R. A. Ramadhan, P. R. Setiawan, and D. Hariyadi, “Digital Forensic Investigation for Non-Volatile Memory Architecture by Hybrid Evaluation Based on ISO/IEC 27037: 2012 and NIST SP800-86 Framework,” IT J. Res. Dev., vol. 6, no. 2, pp. 162–168, 2022.
I. Riadi, R. Umar, and A. Firdonsyah, “Forensic tools performance analysis on android-based blackberry messenger using NIST measurements,” Int J Electr Comput Eng, vol. 8, no. 5, pp. 3991–4003, 2018.
S. C. Sathe and N. M. Dongre, “Data acquisition techniques in mobile forensics,” in 2018 2nd international conference on inventive systems and control (icisc), IEEE, 2018, pp. 280–286.
A. Sa`di, R. Andriani, and T. Taufikurrahman, “PERANCANGAN SISTEM AUTENTIKASI WIRELLESS HOTSPOT BERBASIS RADIUS MENGGUNAKAN MIKROTIK,” J. Inf. Syst. Manag. JOISM, vol. 4, no. 2, Art. no. 2, Jan. 2023, doi: 10.24076/joism.2023v4i2.953.
F. Daryabar, A. Dehghantanha, B. Eterovic-Soric, and K.-K. R. Choo, “Forensic investigation of OneDrive, Box, GoogleDrive and Dropbox applications on Android and iOS devices,” Aust. J. Forensic Sci., vol. 48, no. 6, pp. 615–642, 2016.
B. Actoriano and I. Riadi, “Forensic Investigation on WhatsApp Web Using Framework Integrated Digital Forensic Investigation Framework Version 2,” Int. J. Cyber-Secur. Digit. Forensics IJCSDF, vol. 7, no. 4, pp. 410–419, 2018.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Journal of Information System Management (JOISM)

This work is licensed under a Creative Commons Attribution 4.0 International License.