Signature File Analysis Using The National Institute Standard Technology Method Base on Digital Forensic Concepts

Authors

  • Randi Rizal Teknik Informatika, Universitas Perjuangan Tasikmalaya
  • Ruuhwan Ruuhwan Teknik Informatika, Universitas Perjuangan Tasikmalaya
  • Septian Chandra Teknik Informatika, Universitas Perjuangan Tasikmalaya

DOI:

https://doi.org/10.32493/informatika.v5i3.6073

Keywords:

digital evidence, digital forensics, signature file, investigation process, winhex

Abstract

The number of crimes committed by utilizing advances in information technology such as information leakage, embezzlement of money in banks, credit card fraud, pornography, terrorism, drug trafficking and many more are definitely related to the name digital data. File signatures or magic numbers are one of the forensic science techniques that assist in processing this digital data. The method used in this research is the National Institute Standards Technology method to analyze the authenticity of digital data and the method of proof to obtain valid evidence during the identification process of data or file content. This research is presented in the form of an analysis of the use of signature files in investigations to determine the type of file in the case of leaking company information xyz, the research stage uses evidence handling procedures in the laboratory. Contributions made after conducting a series of case investigations using signature files have been successfully carried out using the Access Data FTK Imager application version 4.2.0 and WinHex version 18.6. Signature files can be used for case investigations in identifying and verifying file types so that files that have been modified can be restored and can be read by the operating system by checking file types through hexadecimal values in the header file (file prefix) that show the characteristics of each type file so that the file type can be found and the file can be read by the operating system.

References

Du, X., Le-Khac, N. A., & Scanlon, M. (2017). Evaluation of digital forensic process models with respect to digital forensics as a service. European Conference on Information Warfare and Security, ECCWS, 573–581.

Europol. (2017). Crime in the age of technology. Europol Unclassified - Basic Protection Level.

Harran, M., Farrelly, W., & Curran, K. (2018). A method for verifying integrity & authenticating digital media. Applied Computing and Informatics, 14(2), 145–158. https://doi.org/10.1016/j.aci.2017.05.006

Khan, M. A., Nasir, A., Ali, M. N., & Farooq, U. (2016). Crime Detection using Digital Forensic Technology. International Journal of Computer Science and Information Security (IJCSIS), 14(10), 487–506.

Maslin, N. M., Consultant, P., & Ltd, S. S. (2018). Impact of Modern Technology. HF Communications:, 3, 33–35. https://doi.org/10.4324/9780203168899_chapter_10

Noroozi, E., Daud, S. M., & Sabouhi, A. (2015). Secure Digital Signature Schemes based on Hash Functions. International Journal of Computer Engineering and Sciences, 1(1), 27. https://doi.org/10.26472/ijces.v1i1.18

Nugis, R. (2018). Forensic Data Properties of Digital Signature BDOC and ASiC-E Files on Classic Disk Drives.

Ramadani, S., Siahaan, A. P. U., Sutrisno, Ritonga, S., Amelia, W. R., Dalimunthe, H., & Munthe, R. (2018). Impact of Cybercrime on Technological and Financial Developments. International Journal For Research in Multidisciplinary Field, 4(10), 341–344.

Riadi, I., Yudhana, A., & Putra, M. C. F. (2018). Akuisisi Bukti Digital Pada Instagram Messenger Berbasis Android Menggunakan Metode National Institute of Justice (Nij). Jurnal Teknik Informatika Dan Sistem Informasi, 4(2), 219–227. https://doi.org/10.28932/jutisi.v4i2.769

Ruuhwan, R., Riadi, I., & Prayudi, Y. (2017). Evaluation of integrated digital forensics investigation framework for the investigation of smartphones using soft system methodology. International Journal of Electrical and Computer Engineering, 7(5), 2806–2817. https://doi.org/10.11591/ijece.v7i5.pp2806-2817

Sammes, T., & Jenkinson, B. (2007). Forensic Coputing A Practionier’s Guide.

Sitompul, O. S., Handoko, A., & Rahmat, R. F. (2018). File reconstruction in digital forensic. Telkomnika (Telecommunication Computing Electronics and Control), 16(2), 776–794. https://doi.org/10.12928/TELKOMNIKA.v16i2.8230

Umar, R., Riadi, I., & Muthohirin, B. F. (2019). Live forensics of tools on android devices for email forensics. Telkomnika (Telecommunication Computing Electronics and Control), 17(4), 1803–1809. https://doi.org/10.12928/TELKOMNIKA.v17i4.11748

Yudhana, A., Riadi, I., & Anshori, I. (2018). Analisis Bukti Digital Facebook Messenger Menggunakan Metode Nist. It Journal Research and Development, 3(1), 13–21. https://doi.org/10.25299/itjrd.2018.vol3(1).1658

Downloads

Published

2020-09-30