ANALISIS FORENSIC BERBASIS WEB PHISING MENGGUNAKAN METODE NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
Abstract
According to the Indonesian Internet Domain Name Manager (PANDI) for the past five years there have been 16,468 phishing reports that occurred in the .id domain. For the spread of phishing, other than via email, criminals spread phishing link addresses using messaging applications such as WhatsApp, Viber, Telegram and Hangouts. According to Kaspersky, from December 2020 to May 2021, 91242 phishing link addresses were shared. In Indonesia, it was detected that there were 738 addresses of phishing links on WhatApp and 39 that were shared via Telegram. To catch phishing perpetrators, they still collided with evidence that must be presented in court. This evidence includes the DNS used by phishers (phishers), IP addresses, and the identity of the attacker. The purpose of this study is to be able to prove internet crimes in the form of evidence that can be obtained using the National Institute of Standards and Technology (NIST) method. The National Institute of Standards and Technology (NIST) method can analyze the review process or digital traces of internet crime/fraud cases and display digital evidence. The stages of this research include collection using the Wireshark application, examination using Hashcalc, analysis, and reporting. The results of this study are that the Anova test results get a significant value of 0.548 > 0.05, which means that the technique of the National Institute of Standards and Technology method can analyze web-based forensics for phishing.
Downloads
References
[2]. Eka Purwiantono, F., & Tjahyanto, A. (2017). Model Klasifikasi Untuk Deteksi Situs Phising Di Indonesia. 156. https://doi.org/10.13140/RG.2.2.29627.52003
[3]. Elanda, A., & Buana, R. L. (2021). Analisis Manajemen Risiko Infrastruktur Dengan Metode NIST (National Institute of Standards and Technology) SP 800-30 (Studi Kasus : STMIK Rosma). Elkom : Jurnal Elektronika Dan Komputer, 14(1), 141–151. https://doi.org/10.51903/elkom.v14i1.387
[4]. Halim, Z. (2017). Prediksi Website Pemancing Informasi Penting Phising Menggunakan Support Vector Machine (SVM). Information System for Educators and Professionals, 2(1), 71–82. http://download.portalgaruda.org/article.php?article=535068&val=10928&title= Prediksi Website Pemancing Informasi Penting Phising Menggunakan Support Vector Machine (SVM)
[5]. Imam Riadi, Abdul Fadlil, & Muhammad Immawan Aulia. (2020). Investigasi Bukti Digital Optical Drive Menggunakan Metode National Institute of Standard and Technology (NIST). Jurnal RESTI (Rekayasa Sistem Dan Teknologi Informasi), 4(5), 820–828. https://doi.org/10.29207/resti.v4i5.2224
[6]. Nist, A., Dan, S. R. M., Dengan, S. R. M., M, T. R., Yusuf, S., Bahan, P., & Ptbin, N. (n.d.). Analisis nist srm 1633b dan srm 1646a dengan metode aan dalam rangka ujibanding antar laboratorium. 149–160.
[7]. Nofiyan, A., & Mushlihudin, M. (2020). Analisis Forensik pada Web Phishing Menggunakan Metode National Institute Of Standards And Technology (NIST). JSTIE (Jurnal Sarjana Teknik Informatika) (E-Journal), 8(2), 53. https://doi.org/10.12928/jstie.v8i2.16697
[8]. Purhanta. (2010). PENGUMPULAN DATA DAN INSTRUMEN PENELITIAN Penelitian. Http://Etheses.Uin-Malang.Ac.Id/1670/7/11510004_Bab_3.Pdf, 1–7.
[9]. Raco, J. (2018). Metode penelitian kualitatif: jenis, karakteristik dan keunggulannya. https://doi.org/10.31219/osf.io/m zuj
[10]. Riadi, I., & Umar, R. (2017). Identification Of Digital Evidence On Android ’ s. International Journal of Computer Science and Information Security, 15(5), 3–8.