nur widiyasono | Siliwangi university (original) (raw)

Papers by nur widiyasono

Research paper thumbnail of Enhanced Readiness Forensic Framework for the Complexity of Internet  of Things (IoT) Investigation Based on Artificial Intelligence

Journal of Advanced Research in Applied Sciences and Engineering Technology 50, Issue 1 (2025) 121-135, 2024

The growing versatility of Internet of Things devices increases the possibility of multiple attac... more The growing versatility of Internet of Things devices increases the possibility of multiple attacks occurring and being carried out continuously. The limited processing capabilities and memory capacity of Internet of Things devices pose challenges for security and forensic analysis in collecting and documenting various attacks targeting
these devices during the forensic investigation process. Thus, forensic investigative
analysis goes beyond expectations, offering a holistic understanding of the complex
consequences arising from IoT device attacks that have occurred. These issues and
challenges provide important insights into vulnerabilities, potential future threats, and
steps to effectively increase the resilience of the IoT ecosystem against the evolving
cyber-attack risk landscape. Apart from that, the large amount of IoT attack data
generated raises several problems. Such as the difficulty of quickly identifying threats
and in-depth forensic analysis of each very diverse attack. The implementation of
artificial intelligence is a very useful solution in overcoming the forensic investigation
challenges that arise due to IoT attacks with the enormous increase in data volume and
complexity. Therefore, this research aims and proposes to improve the IoT forensic
readiness framework by collecting and analyzing digital evidence in detecting various attacks from various IoT devices automatically based on an artificial intelligence approach and functioning as an early warning system. Enhanced the proposed IoT forensic readiness framework based on ISO/IEC 27043 serves as a prototype for detecting and collecting various types of attacks as potential digital evidence from various IoT devices, as well as effective forensic investigation of digital evidence with
the utilization of smart repository.

Research paper thumbnail of Investigation of Malware Redline Stealer using Static and Dynamic Analysis Method Forensic

Journal of Advanced Research in Applied Sciences and Engineering Technology48, Issue 2(2025) 49-62, 2024

Stealer is a malware variant discovered in early March 2020 by proof point analyst. Redline is fa... more Stealer is a malware variant discovered in early March 2020 by proof point analyst. Redline is famous for its ability to bypass the antivirus scan. Redline Stealer was created by hacker with the purpose to steal victim's information such as login data, password and credit card information from the browser application that used in infected computer. This research uses static and dynamic methods to analyze redline stealers. The process of static analysis is carried out by observing the malware's sample file, while dynamic analysis is carried out by monitoring malware's activity when the malware is running on the system. This research show that Redline Stealer uses the obfuscation feature based on .net, which can run only when there is an internet connection, stealing sensitive information, especially in a browser application. The conclusion of this research is Redline Stealer can be classified as a stealer malware that can steal important data on the infected system. The result of the analysis using the strings extract and decompile did not find any information because this malware uses the obfuscation feature, so the static analysis did find fewer information than the dynamic method.

Research paper thumbnail of Agricultural path detection systems using Canny-edge detection  and Hough transform

IAES International Journal of Robotics and Automation (IJRA) Vol. 13, No. 3, September 2024, pp. 247~254, 2024

Navigation is one of the crucial aspects of automation technology within the field of agriculture... more Navigation is one of the crucial aspects of automation technology within the field of agriculture, such as robotics systems or autonomous agricultural vehicles. Despite many navigation systems having been developed for agricultural land, due to their high development and component costs, these systems are difficult to access for farmers or organizations with limited capital.
In this study, the Canny-edge detection and Hough transform methods are
implemented in a path detection system on agricultural land to find an
alternative, cost-effective navigation system for autonomous farming robots or vehicles. The system is tested on ground-level view images, which are captured from a low perspective and under three different lighting conditions.
The testing and experimentation process involves adjusting the parameters of the Canny-edge detection and Hough transform methods for different lighting conditions. Subsequently, an evaluation is conducted using Intersection over Union to obtain the best accuracy results, followed by fine-tuning of the canny-edge detection and Hough transform method parameters. The identified parameters, specifically a 15×15 Gaussian kernel, low threshold of 50, high threshold of 150, Hough threshold, minimum line length of 150, and maximum line gap, have been discerned as optimal for the canny-edge and Hough transform algorithms under medium lighting conditions (G=1.0). The observed efficacy of these parameter configurations suggests the method’s viability for
implementation in path detection systems for agricultural vehicles or robots.
This underscores its potential to deliver reliable performance and navigate
seamlessly across diverse lighting scenarios within the agricultural context.

Research paper thumbnail of Analisis Keamanan dan Infrastruktur serta Proses Investigasi pada Perangkat Internet of Things (IoT) menggunakan Metode End to End Digital Investigation (EEDI)

SAIS | Scientific Articles of Informatics Students, Dec 31, 2018

Research paper thumbnail of Analisis Malware Ahmyth pada Platform Android Menggunakan Metode Reverse Engineering

Generation Journal, Oct 16, 2022

Research paper thumbnail of IoT-Based Temperature Monitoring System For Smart Cage

2022 International Conference on Advanced Creative Networks and Intelligent Systems (ICACNIS)

Research paper thumbnail of Evaluating Web Scraping Performance Using XPath, CSS Selector, Regular Expression, and HTML DOM With Multiprocessing Technical Applications

JOIV : International Journal on Informatics Visualization

Data collection has become a necessity today, especially since many sources of data on the intern... more Data collection has become a necessity today, especially since many sources of data on the internet can be used for various needs. The main activity in data collection is collecting quality information that can be analyzed and used to support decisions or provide evidence. The process of retrieving data from the internet is also known as web scraping. There are various methods of web scraping that are commonly used. The amount of data scattered on the internet will be quite time-consuming if the web scraping is done on a large scale. By applying the parallel concept, the multi-processing approach can help complete a job. This study aimed to determine the performance of the web scraping method with the application of multi-processing. Testing is done by doing the process of scraping data from a predetermined target web. Four web scraping methods: CSS Selector, HTML DOM, Regex, and XPath, were selected to be used in the experiment measured based on the parameters of CPU usage, memory ...

Research paper thumbnail of Analisis Peran Komisi Pemilihan Umum (KPU) dalam Partisipasi Politik Masyarakat di Pilkada serta Meminimalisir Golput

Jurnal Ilmu Politik dan Pemerintahan

Research paper thumbnail of Analisis Efektifitas Open Shortest Path First (OSPF) Dengan dan Tanpa Menggunakan Access Control List (ACL)

Saat ini perkembangan dunia akan kebutuhan komunikasi data sangat penting secara fix (tetap), ata... more Saat ini perkembangan dunia akan kebutuhan komunikasi data sangat penting secara fix (tetap), ataupun secara mobile dalam menentukan perkembangan peradaban manusia pada berbagai lini kehidupan secara langsung dengan pertukaran informasi. Perkembangan dunia akan kebutuhan komunikasi data sangat penting secara tetap ataupun secara mobile dalam menentukan peradaban manusia pada berbagai lini kehidupan, maka dari itu diperlukan sebuah protokol dalam jaringan yang mampu mengimbangi perkembangan dunia dalam segi komunikasi jaringan. Penelitian ini menggunakan protokol Open Shortest Path First (OSPF) yang memiliki kelebihan pengaturan jaringan skala luas. Metode Acces Control List (ACL) dirasa perlu digunakan untuk menambahkan keamanan jaringan pada protokol OSPF. Penelitian ini bertujuan untuk mengetahui efektifitas dari penambahan metode ACL pada protokol OSPF, dengan media ilustrasi menggunakan cisco packet tracer dan penggunaan node sebanyak 7 buah. Hasil dari dua belas jalur pengujian...

Research paper thumbnail of Identification of Mirai Botnet in IoT Environment through Denial-of-Service Attacks for Early Warning System

JOIV : International Journal on Informatics Visualization

The development of computing technology in increasing the accessibility and agility of daily acti... more The development of computing technology in increasing the accessibility and agility of daily activities currently uses the Internet of Things (IoT). Over time, the increasing number of IoT device users impacts access and delivery of valuable data. This is the primary goal of cybercriminals to operate malicious software. In addition to the positive impact of using technology, it is also a negative impact that creates new problems in security attacks and cybercrimes. One of the most dangerous cyberattacks in the IoT environment is the Mirai botnet malware. The malware turns the user's device into a botnet to carry out Distributed Denial of Service (DDoS) attacks on other devices, which is undoubtedly very dangerous. Therefore, this study proposes a k-nearest neighbor algorithm to classify Mirai malware-type DDOS attacks on IoT device environments. The malware classification process was carried out using rapid miner machine learning by conducting four experiments using SYN, ACK, UD...

Research paper thumbnail of Implementasi Algoritma Discrete Cosine Transform Untuk Kompresi Citra Pada Marker-Based Tracking Augmented Reality

Computatio : Journal of Computer Science and Information Systems

Image compression with lossy techniques removes some information so it does not match the data re... more Image compression with lossy techniques removes some information so it does not match the data received. This research was conducted to determine differences in the quality of original and compressed images, specifically on mark-based tracking. Image compression is done by implementing the Discrete Cosine Transform algorithm in the MATLAB program. DCT image compression test results can compress images up to 26% of the original size without significantly reducing image quality. The assessment results shown by the markers, in Vuforia, there was no change in star ratings, while in ARCore, there was an increase in the rating of 5-40 quality scores.DCT algorithm can be applied to image compression in marker-based tracking, especially in improving the quality of markers in ARCore.AbstrakKompresi citra dengan teknik lossy menghilangkan beberapa informasi sehingga tidak persis seperti data aslinya. Penelitian ini dilakukan untuk mengetahui perbedaan kualitas citra asli dan terkompresi, khus...

Research paper thumbnail of Analisis Usability Dan User Experience Aplikasi Konsultasi Kesehetan Online Menggunakan System Usability Scale Dan User Experience Questionnaire

Jurnal Siliwangi Seri Sains dan Teknologi, May 30, 2021

Research paper thumbnail of पशच म र जसथ न म ट डड परक प एव न यतरण क उप य

Krishi sewa online magazine, 2021

Research paper thumbnail of Analisis Digital Forensik pada File Steganography (Studi kasus : Peredaran Narkoba)

Jurnal Teknik Informatika dan Sistem Informasi, 2017

Research paper thumbnail of Analisis Infeksi Malware Pada Perangkat Android Dengan Metode Hybrid Analysis

JIF: Jurnal Imiah Informatika, Oct 2, 2019

Research paper thumbnail of Implementasi Multi-Objective Optimazation on Basis of Ratio Analysis (Moora) Pada Sistem Informasi Geografis Rekomendasi Pemilihan Sekolah

Jurnal Siliwangi Seri Sains dan Teknologi, Dec 30, 2020

Research paper thumbnail of Implementasi Location Based Service pada Aplikasi Pannic Button Berbasis Android

SAIS | Scientific Articles of Informatics Students, Jun 30, 2019

Research paper thumbnail of Analisis dan Perbandingan Bukti Digital Aplikasi Instant Messenger pada Android

SinkrOn, 2018

Perkembangan jumlah pengguna aplikasi Instant Messenger (IM) yang sangat pesat menyebabkan naikny... more Perkembangan jumlah pengguna aplikasi Instant Messenger (IM) yang sangat pesat menyebabkan naiknya potensi tindakan kriminal dilakukan melalui aplikasi IM. Fitur keamanan data aplikasi IM yang ditujukan untuk melindungi privasi penggunanya, digunakan oleh pelaku kriminal untuk menyembunyikan bukti digital dari aktivitas kriminalnya. Penelitian ini membahas mengenai analisa dan perbandingan bukti digital dari aplikasi IM pada Android yang telah diunduh sebanyak 500 juta orang di Play Store, yaitu WhatsApp, Telegram, Line, dan IMO. Proses analisa dilakukan pada bukti digital dari penggunaan fitur yang ada di aplikasi IM, sehingga proses pengumpulan data dibantu dengan simulasi dari beberapa skenario yang berpotensi terjadi dalam tindakan kriminal. Teknik akuisisi data dilakukan dengan metode physical imaging untuk mendapatkan akses penuh pada memori smartphone. Hasil analisa disimpulkan dalam bentuk tabel perbandingan yang dapat dirujuk oleh investigator forensik ketika melakukan inve...

Research paper thumbnail of Memory Volatile Forensik untuk Deteksi Malware Menggunakan Algoritma Machine Learning Forensic Volatile Memory for Malware Detection Using Machine Learning Algoritm

Article history: Diterima xx-xx-xx Diperbaiki xx-xx-xx Disetujui xx-xx-xx Forensik dari volatile ... more Article history: Diterima xx-xx-xx Diperbaiki xx-xx-xx Disetujui xx-xx-xx Forensik dari volatile memory memainkan peran penting dalam penyelidikan cybercrime. Akuisisi RAM Memori atau istilah lain dump RAM dapat membantu penyelidik forensik dalam mengambil banyak informasi yang berkaitan dengan kejahatan. Ada berbagai alat yang tersedia untuk analisis RAM termasuk Volatilitas, yang saat ini mendominasi alat RAM forensik open-source. Telah terjadi bahwa banyak penyelidik forensik berpikir bahwa mereka mungkin memiliki malware dalam dump RAM. Dan, jika mereka benar-benar ada, mereka masih belum mampu menganalisis Malware, jadi sulit bagi mereka untuk menganalisis kemungkinan malware dalam dump RAM. Ketersediaan alat-alat seperti Volatilitas memungkinkan penyelidik forensik untuk mengidentifikasi dan menghubungkan berbagai komponen untuk menyimpulkan apakah kejahatan itu dilakukan dengan menggunakan malware atau tidak. Namun, penggunaan volatilitas membutuhkan pengetahuan tentang perin...

Research paper thumbnail of Memory Volatile Forensik untuk mendeteksi malware menggunakan algoritma machine learning

Forensics from volatile memory plays an important role in the investigation of cyber crime. The a... more Forensics from volatile memory plays an important role in the investigation of cyber crime. The acquisition of RAM Memory or other terms of RAM dump can assist forensic investigators in retrieving much of the information related to crime. There are various tools available for RAM analysis including Volatility, which currently dominates open source forensic RAM tools. It has happened that many forensic investigators are thinking that they probably have malware in the RAM dump. And, if they do exist, they're still not very capable Malware Analysts, so it's hard for them to analyze the possibilities of malware in a RAM dump. The availability of tools such as Volatility allows forensic investigators to identify and link the various components to conclude whether the crime was committed using malware or not. However, the use of volatility requires knowledge of basic commands as well as static malware analysis. This work is done to assist forensic investigators in detecting and an...

Research paper thumbnail of Enhanced Readiness Forensic Framework for the Complexity of Internet  of Things (IoT) Investigation Based on Artificial Intelligence

Journal of Advanced Research in Applied Sciences and Engineering Technology 50, Issue 1 (2025) 121-135, 2024

The growing versatility of Internet of Things devices increases the possibility of multiple attac... more The growing versatility of Internet of Things devices increases the possibility of multiple attacks occurring and being carried out continuously. The limited processing capabilities and memory capacity of Internet of Things devices pose challenges for security and forensic analysis in collecting and documenting various attacks targeting
these devices during the forensic investigation process. Thus, forensic investigative
analysis goes beyond expectations, offering a holistic understanding of the complex
consequences arising from IoT device attacks that have occurred. These issues and
challenges provide important insights into vulnerabilities, potential future threats, and
steps to effectively increase the resilience of the IoT ecosystem against the evolving
cyber-attack risk landscape. Apart from that, the large amount of IoT attack data
generated raises several problems. Such as the difficulty of quickly identifying threats
and in-depth forensic analysis of each very diverse attack. The implementation of
artificial intelligence is a very useful solution in overcoming the forensic investigation
challenges that arise due to IoT attacks with the enormous increase in data volume and
complexity. Therefore, this research aims and proposes to improve the IoT forensic
readiness framework by collecting and analyzing digital evidence in detecting various attacks from various IoT devices automatically based on an artificial intelligence approach and functioning as an early warning system. Enhanced the proposed IoT forensic readiness framework based on ISO/IEC 27043 serves as a prototype for detecting and collecting various types of attacks as potential digital evidence from various IoT devices, as well as effective forensic investigation of digital evidence with
the utilization of smart repository.

Research paper thumbnail of Investigation of Malware Redline Stealer using Static and Dynamic Analysis Method Forensic

Journal of Advanced Research in Applied Sciences and Engineering Technology48, Issue 2(2025) 49-62, 2024

Stealer is a malware variant discovered in early March 2020 by proof point analyst. Redline is fa... more Stealer is a malware variant discovered in early March 2020 by proof point analyst. Redline is famous for its ability to bypass the antivirus scan. Redline Stealer was created by hacker with the purpose to steal victim's information such as login data, password and credit card information from the browser application that used in infected computer. This research uses static and dynamic methods to analyze redline stealers. The process of static analysis is carried out by observing the malware's sample file, while dynamic analysis is carried out by monitoring malware's activity when the malware is running on the system. This research show that Redline Stealer uses the obfuscation feature based on .net, which can run only when there is an internet connection, stealing sensitive information, especially in a browser application. The conclusion of this research is Redline Stealer can be classified as a stealer malware that can steal important data on the infected system. The result of the analysis using the strings extract and decompile did not find any information because this malware uses the obfuscation feature, so the static analysis did find fewer information than the dynamic method.

Research paper thumbnail of Agricultural path detection systems using Canny-edge detection  and Hough transform

IAES International Journal of Robotics and Automation (IJRA) Vol. 13, No. 3, September 2024, pp. 247~254, 2024

Navigation is one of the crucial aspects of automation technology within the field of agriculture... more Navigation is one of the crucial aspects of automation technology within the field of agriculture, such as robotics systems or autonomous agricultural vehicles. Despite many navigation systems having been developed for agricultural land, due to their high development and component costs, these systems are difficult to access for farmers or organizations with limited capital.
In this study, the Canny-edge detection and Hough transform methods are
implemented in a path detection system on agricultural land to find an
alternative, cost-effective navigation system for autonomous farming robots or vehicles. The system is tested on ground-level view images, which are captured from a low perspective and under three different lighting conditions.
The testing and experimentation process involves adjusting the parameters of the Canny-edge detection and Hough transform methods for different lighting conditions. Subsequently, an evaluation is conducted using Intersection over Union to obtain the best accuracy results, followed by fine-tuning of the canny-edge detection and Hough transform method parameters. The identified parameters, specifically a 15×15 Gaussian kernel, low threshold of 50, high threshold of 150, Hough threshold, minimum line length of 150, and maximum line gap, have been discerned as optimal for the canny-edge and Hough transform algorithms under medium lighting conditions (G=1.0). The observed efficacy of these parameter configurations suggests the method’s viability for
implementation in path detection systems for agricultural vehicles or robots.
This underscores its potential to deliver reliable performance and navigate
seamlessly across diverse lighting scenarios within the agricultural context.

Research paper thumbnail of Analisis Keamanan dan Infrastruktur serta Proses Investigasi pada Perangkat Internet of Things (IoT) menggunakan Metode End to End Digital Investigation (EEDI)

SAIS | Scientific Articles of Informatics Students, Dec 31, 2018

Research paper thumbnail of Analisis Malware Ahmyth pada Platform Android Menggunakan Metode Reverse Engineering

Generation Journal, Oct 16, 2022

Research paper thumbnail of IoT-Based Temperature Monitoring System For Smart Cage

2022 International Conference on Advanced Creative Networks and Intelligent Systems (ICACNIS)

Research paper thumbnail of Evaluating Web Scraping Performance Using XPath, CSS Selector, Regular Expression, and HTML DOM With Multiprocessing Technical Applications

JOIV : International Journal on Informatics Visualization

Data collection has become a necessity today, especially since many sources of data on the intern... more Data collection has become a necessity today, especially since many sources of data on the internet can be used for various needs. The main activity in data collection is collecting quality information that can be analyzed and used to support decisions or provide evidence. The process of retrieving data from the internet is also known as web scraping. There are various methods of web scraping that are commonly used. The amount of data scattered on the internet will be quite time-consuming if the web scraping is done on a large scale. By applying the parallel concept, the multi-processing approach can help complete a job. This study aimed to determine the performance of the web scraping method with the application of multi-processing. Testing is done by doing the process of scraping data from a predetermined target web. Four web scraping methods: CSS Selector, HTML DOM, Regex, and XPath, were selected to be used in the experiment measured based on the parameters of CPU usage, memory ...

Research paper thumbnail of Analisis Peran Komisi Pemilihan Umum (KPU) dalam Partisipasi Politik Masyarakat di Pilkada serta Meminimalisir Golput

Jurnal Ilmu Politik dan Pemerintahan

Research paper thumbnail of Analisis Efektifitas Open Shortest Path First (OSPF) Dengan dan Tanpa Menggunakan Access Control List (ACL)

Saat ini perkembangan dunia akan kebutuhan komunikasi data sangat penting secara fix (tetap), ata... more Saat ini perkembangan dunia akan kebutuhan komunikasi data sangat penting secara fix (tetap), ataupun secara mobile dalam menentukan perkembangan peradaban manusia pada berbagai lini kehidupan secara langsung dengan pertukaran informasi. Perkembangan dunia akan kebutuhan komunikasi data sangat penting secara tetap ataupun secara mobile dalam menentukan peradaban manusia pada berbagai lini kehidupan, maka dari itu diperlukan sebuah protokol dalam jaringan yang mampu mengimbangi perkembangan dunia dalam segi komunikasi jaringan. Penelitian ini menggunakan protokol Open Shortest Path First (OSPF) yang memiliki kelebihan pengaturan jaringan skala luas. Metode Acces Control List (ACL) dirasa perlu digunakan untuk menambahkan keamanan jaringan pada protokol OSPF. Penelitian ini bertujuan untuk mengetahui efektifitas dari penambahan metode ACL pada protokol OSPF, dengan media ilustrasi menggunakan cisco packet tracer dan penggunaan node sebanyak 7 buah. Hasil dari dua belas jalur pengujian...

Research paper thumbnail of Identification of Mirai Botnet in IoT Environment through Denial-of-Service Attacks for Early Warning System

JOIV : International Journal on Informatics Visualization

The development of computing technology in increasing the accessibility and agility of daily acti... more The development of computing technology in increasing the accessibility and agility of daily activities currently uses the Internet of Things (IoT). Over time, the increasing number of IoT device users impacts access and delivery of valuable data. This is the primary goal of cybercriminals to operate malicious software. In addition to the positive impact of using technology, it is also a negative impact that creates new problems in security attacks and cybercrimes. One of the most dangerous cyberattacks in the IoT environment is the Mirai botnet malware. The malware turns the user's device into a botnet to carry out Distributed Denial of Service (DDoS) attacks on other devices, which is undoubtedly very dangerous. Therefore, this study proposes a k-nearest neighbor algorithm to classify Mirai malware-type DDOS attacks on IoT device environments. The malware classification process was carried out using rapid miner machine learning by conducting four experiments using SYN, ACK, UD...

Research paper thumbnail of Implementasi Algoritma Discrete Cosine Transform Untuk Kompresi Citra Pada Marker-Based Tracking Augmented Reality

Computatio : Journal of Computer Science and Information Systems

Image compression with lossy techniques removes some information so it does not match the data re... more Image compression with lossy techniques removes some information so it does not match the data received. This research was conducted to determine differences in the quality of original and compressed images, specifically on mark-based tracking. Image compression is done by implementing the Discrete Cosine Transform algorithm in the MATLAB program. DCT image compression test results can compress images up to 26% of the original size without significantly reducing image quality. The assessment results shown by the markers, in Vuforia, there was no change in star ratings, while in ARCore, there was an increase in the rating of 5-40 quality scores.DCT algorithm can be applied to image compression in marker-based tracking, especially in improving the quality of markers in ARCore.AbstrakKompresi citra dengan teknik lossy menghilangkan beberapa informasi sehingga tidak persis seperti data aslinya. Penelitian ini dilakukan untuk mengetahui perbedaan kualitas citra asli dan terkompresi, khus...

Research paper thumbnail of Analisis Usability Dan User Experience Aplikasi Konsultasi Kesehetan Online Menggunakan System Usability Scale Dan User Experience Questionnaire

Jurnal Siliwangi Seri Sains dan Teknologi, May 30, 2021

Research paper thumbnail of पशच म र जसथ न म ट डड परक प एव न यतरण क उप य

Krishi sewa online magazine, 2021

Research paper thumbnail of Analisis Digital Forensik pada File Steganography (Studi kasus : Peredaran Narkoba)

Jurnal Teknik Informatika dan Sistem Informasi, 2017

Research paper thumbnail of Analisis Infeksi Malware Pada Perangkat Android Dengan Metode Hybrid Analysis

JIF: Jurnal Imiah Informatika, Oct 2, 2019

Research paper thumbnail of Implementasi Multi-Objective Optimazation on Basis of Ratio Analysis (Moora) Pada Sistem Informasi Geografis Rekomendasi Pemilihan Sekolah

Jurnal Siliwangi Seri Sains dan Teknologi, Dec 30, 2020

Research paper thumbnail of Implementasi Location Based Service pada Aplikasi Pannic Button Berbasis Android

SAIS | Scientific Articles of Informatics Students, Jun 30, 2019

Research paper thumbnail of Analisis dan Perbandingan Bukti Digital Aplikasi Instant Messenger pada Android

SinkrOn, 2018

Perkembangan jumlah pengguna aplikasi Instant Messenger (IM) yang sangat pesat menyebabkan naikny... more Perkembangan jumlah pengguna aplikasi Instant Messenger (IM) yang sangat pesat menyebabkan naiknya potensi tindakan kriminal dilakukan melalui aplikasi IM. Fitur keamanan data aplikasi IM yang ditujukan untuk melindungi privasi penggunanya, digunakan oleh pelaku kriminal untuk menyembunyikan bukti digital dari aktivitas kriminalnya. Penelitian ini membahas mengenai analisa dan perbandingan bukti digital dari aplikasi IM pada Android yang telah diunduh sebanyak 500 juta orang di Play Store, yaitu WhatsApp, Telegram, Line, dan IMO. Proses analisa dilakukan pada bukti digital dari penggunaan fitur yang ada di aplikasi IM, sehingga proses pengumpulan data dibantu dengan simulasi dari beberapa skenario yang berpotensi terjadi dalam tindakan kriminal. Teknik akuisisi data dilakukan dengan metode physical imaging untuk mendapatkan akses penuh pada memori smartphone. Hasil analisa disimpulkan dalam bentuk tabel perbandingan yang dapat dirujuk oleh investigator forensik ketika melakukan inve...

Research paper thumbnail of Memory Volatile Forensik untuk Deteksi Malware Menggunakan Algoritma Machine Learning Forensic Volatile Memory for Malware Detection Using Machine Learning Algoritm

Article history: Diterima xx-xx-xx Diperbaiki xx-xx-xx Disetujui xx-xx-xx Forensik dari volatile ... more Article history: Diterima xx-xx-xx Diperbaiki xx-xx-xx Disetujui xx-xx-xx Forensik dari volatile memory memainkan peran penting dalam penyelidikan cybercrime. Akuisisi RAM Memori atau istilah lain dump RAM dapat membantu penyelidik forensik dalam mengambil banyak informasi yang berkaitan dengan kejahatan. Ada berbagai alat yang tersedia untuk analisis RAM termasuk Volatilitas, yang saat ini mendominasi alat RAM forensik open-source. Telah terjadi bahwa banyak penyelidik forensik berpikir bahwa mereka mungkin memiliki malware dalam dump RAM. Dan, jika mereka benar-benar ada, mereka masih belum mampu menganalisis Malware, jadi sulit bagi mereka untuk menganalisis kemungkinan malware dalam dump RAM. Ketersediaan alat-alat seperti Volatilitas memungkinkan penyelidik forensik untuk mengidentifikasi dan menghubungkan berbagai komponen untuk menyimpulkan apakah kejahatan itu dilakukan dengan menggunakan malware atau tidak. Namun, penggunaan volatilitas membutuhkan pengetahuan tentang perin...

Research paper thumbnail of Memory Volatile Forensik untuk mendeteksi malware menggunakan algoritma machine learning

Forensics from volatile memory plays an important role in the investigation of cyber crime. The a... more Forensics from volatile memory plays an important role in the investigation of cyber crime. The acquisition of RAM Memory or other terms of RAM dump can assist forensic investigators in retrieving much of the information related to crime. There are various tools available for RAM analysis including Volatility, which currently dominates open source forensic RAM tools. It has happened that many forensic investigators are thinking that they probably have malware in the RAM dump. And, if they do exist, they're still not very capable Malware Analysts, so it's hard for them to analyze the possibilities of malware in a RAM dump. The availability of tools such as Volatility allows forensic investigators to identify and link the various components to conclude whether the crime was committed using malware or not. However, the use of volatility requires knowledge of basic commands as well as static malware analysis. This work is done to assist forensic investigators in detecting and an...