Comparative Analysis of Cloning-Hashing Applications for Securing Digital Evidence
The development of the Internet has resulted in an increasing variety of cyber crimes. Cybercrime is closely related to digital evidence, so cybercriminals tend to delete, hide, and format all collected data to eliminate traces of digital evidence. This digital evidence is very vital in proving at trial, so it is necessary to develop applications to secure digital evidence. This study aims to compare the results of cloning and hashing in securing digital evidence and evaluate the performance of a digital forensic application developed under the name Clon-Hash Application v1 compared to applications commonly used by investigators including Autopsy, FTK Imager, md5.exe in terms of its function, the result, CPU usage. The results of the research conducted show that the cloning process is perfectly successful, as evidenced by the hash value results which are the same as paid applications and there are even several other applications that have not been able to display the hash value. Hash values in the Clon-Hash v1 application also vary from MD5, SHA1, and SHA256 which do not exist in other applications. Applications developed are better in terms of function, results, and CPU usage.
R. J. Alzahrani and A. Alzahrani, “Security analysis of ddos attacks using machine learning algorithms in networks traffic,” Electron., vol. 10, no. 23, 2021, doi: 10.3390/electronics10232919.
M. N. Faiz and W. A. Prabowo, “Comparison of Acquisition Software for Digital Forensics Purposes,” Kinet. Game Technol. Inf. Syst. Comput. Network, Comput. Electron. Control, vol. 4, no. 1, pp. 37–44, Nov. 2018, doi: 10.22219/kinetik.v4i1.687.
I. Y. Anggraini, S. Sucipto, and R. Indriati, “Cyberbullying Detection Modelling at Twitter Social Networking,” JUITA J. Inform., vol. 6, no. 2, p. 113, 2018, doi: 10.30595/juita.v6i2.3350.
W. Y. Sulistyo, I. Riadi, and A. Yudhana, “Penerapan Teknik SURF pada Forensik Citra untuk Analisa Rekayasa Foto Digital,” JUITA J. Inform., vol. 8, no. 2, p. 179, 2020, doi: 10.30595/juita.v8i2.6602.
N. Al Mutawa, J. Bryce, V. N. L. Franqueira, and A. Marrington, “Forensic investigation of cyberstalking cases using Behavioural Evidence Analysis,” in Digital Investigation, 2016, vol. 16. doi: 10.1016/j.diin.2016.01.012.
M. Riskiyadi, “Investigasi Forensik Terhadap Bukti Digital Dalam Mengungkap Cybercrime,” Cyber Secur. dan Forensik Digit., vol. 3, no. 2, pp. 12–21, 2020, doi: 10.14421/csecurity.2020.3.2.2144.
Direktorat Tindak Pidana Siber Bareskrim Polri, “Jumlah Laporan Polisi yang dibuat masyarakat,” patrolisiber.id, 2022. https://patrolisiber.id/
A. Setya and A. Suganda, “Design of Digital Evidence Collection Framework in Social Media Using SNI 27037: 2014,” JUITA J. Inform., vol. 10, no. 1, p. 127, 2022, doi: 10.30595/juita.v10i1.13149.
R. Umar, A. Yudhana, and M. N. Faiz, “Experimental analysis of web browser sessions using live forensics method,” Int. J. Electr. Comput. Eng., vol. 8, no. 5, 2018, doi: 10.11591/ijece.v8i5.pp.2951-2958.
A. F. Moussa, “Electronic evidence and its authenticity in forensic evidence,” Egypt. J. Forensic Sci., vol. 11, no. 1, p. 20, Dec. 2021, doi: 10.1186/s41935-021-00234-6.
R. Murray, “MemTri: A Memory Forensics Triage Tool using Bayesian Network and Volatility,” University of Westminster, 2016.
H. Arshad, A. Jantan, G. Keng, and A. Sahar, “A multilayered semantic framework for integrated forensic acquisition on social media,” Digit. Investig., vol. 29, pp. 147–158, 2019, doi: 10.1016/j.diin.2019.04.002.
W. Pranoto, I. Riadi, and Y. Prayudi, “Perbandingan Tools Forensics pada Fitur TRIM SSD NVMe Menggunakan Metode Live Forensics,” It J. Res. Dev., vol. 4, no. 2, pp. 135–148, 2020, doi: 10.25299/itjrd.2020.vol4(2).4615.
Republik Indonesia, Undang-Undang Republik Indonesia Nomor 19 Tahun 2016 Tentang Informasi Dan Transaksi Elektronik, no. 1. 2016, pp. 1–31. [Online]. Available: https://web.kominfo.go.id/sites/default/files/users/4761/UU 19 Tahun 2016.pdf
M. N. Faiz, W. A. Prabowo, and M. F. Sidiq, “Studi Komparasi Investigasi Digital Forensik pada Tindak Kriminal,” Journal of Informatics, Information System, Software Engineering and Applications (INISTA), vol. 1, no. 1. pp. 63–70, 2018. doi: 10.20895/INISTA.V1I1.
M. F. Sidiq and M. N. Faiz, “Review Tools Web Browser Forensics untuk Mendukung Pencarian Bukti Digital,” J. Edukasi dan Penelit. Inform., vol. 5, no. 1, pp. 67–73, 2019, doi: 10.26418/jp.v5i1.31430.
A. Ajijola, P. Zavarsky, and R. Ruhl, “A review and comparative evaluation of forensics guidelines of NIST SP 800-101 Rev.1:2014 and ISO/IEC 27037:2012,” in 2014 World Congress on Internet Security, WorldCIS 2014, 2014, pp. 66–73. doi: 10.1109/WorldCIS.2014.7028169.
U.S. Department of Justice Office of Justice Programs, “Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition,” 2001. [Online]. Available: http://www.iwar.org.uk/ecoespionage/resources/cybercrime/ecrime-scene-investigation.pdf
J. Richter, N. Kuntze, and C. Rudolph, “Securing digital evidence,” in 5th International Workshop on Systematic Approaches to Digital Forensic Engineering, SADFE 2010, 2010, pp. 119–130. doi: 10.1109/SADFE.2010.31.
M. B. Pakarti, D. H. Fudholi, and Y. Prayudi, “Manajemen Pengelolaan Bukti Digital Untuk Meningkatkan Aksesibilitas Pada Masa Pandemi Covid-19,” J. Ilm. SINUS, vol. 19, no. 1, p. 27, 2021, doi: 10.30646/sinus.v19i1.502.
A. S. Putra and Y. Prayudi, “Implementasi Multi Smart Contract pada Bukti Digital dan Chain of Custody dalam Meningkatkan Keamanan dan Integritas Bukti Digital,” JUSTINDO (Jurnal Sist. dan Teknol. Inf. Indones., vol. 6, no. 2, pp. 98–108, 2021, doi: 10.32528/justindo.v6i2.3945.
R. Umar, A. Yudhana, and M. Nur Faiz, “Experimental Analysis of Web Browser Sessions Using Live Forensics Method,” Int. J. Electr. Comput. Eng., vol. 8, no. 5, p. 2951, 2018, doi: 10.11591/ijece.v8i5.pp2951-2958.
Copyright (c) 2023 Muhammad Nur Faiz
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).