Analisis Forensik pada Email Menggunakan Metode National Institute of Standards Technology

Nowadays developments in information technology are growing rapidly, especially in email. Email became one that almost the whole world had. Email is one of the results of developments in information and communication. Email is widely used to exchange information by sending and receiving data, such...

Full description

Bibliographic Details
Main Authors: Imam Riadi, Sunardi, Fitriyani Tella Nani
Format: Article
Language:English
Published: Universitas Islam Negeri Sunan Kalijaga Yogyakarta 2022-05-01
Series:JISKA (Jurnal Informatika Sunan Kalijaga)
Subjects:
Online Access:http://ejournal.uin-suka.ac.id/saintek/JISKA/article/view/3009
_version_ 1797756816169369600
author Imam Riadi
Sunardi
Fitriyani Tella Nani
author_facet Imam Riadi
Sunardi
Fitriyani Tella Nani
author_sort Imam Riadi
collection DOAJ
description Nowadays developments in information technology are growing rapidly, especially in email. Email became one that almost the whole world had. Email is one of the results of developments in information and communication. Email is widely used to exchange information by sending and receiving data, such as document files, pictures, letters, and others. So much for the crimes that often occur in emails. Email crimes that often occur among them are email spoofing. Email spoofing is a forgery that occurs in the header of the email. So, the email is sent as if it were a valid email. Email spoofing is often used in spamming activities. Crimes committed by cybercrime must leave evidence such as IP Address, sender's email, and time of sending the email. This research will do forensics on email spoofing. The research uses the Live Forensics method, where the computer is used in a powered-on state. The research also uses the NIST (National Institute of Standards Technology) research flow. The email that will be analyzed is in the email header section using 3 tools, namely tracer email analyzer, email dossier, and mail header analysis. This analysis will compare and check the accuracy of the email headers using these tools. Emails suspected of email spoofing will be proven using tools. Based on the 'form' received' and 'Message-ID' headers. Based on the results, the tool that meets the value after the analysis is tracer email analysis.
first_indexed 2024-03-12T18:07:04Z
format Article
id doaj.art-1471b5ad32ae4721a2edebc76e0bd0d2
institution Directory Open Access Journal
issn 2527-5836
2528-0074
language English
last_indexed 2024-03-12T18:07:04Z
publishDate 2022-05-01
publisher Universitas Islam Negeri Sunan Kalijaga Yogyakarta
record_format Article
series JISKA (Jurnal Informatika Sunan Kalijaga)
spelling doaj.art-1471b5ad32ae4721a2edebc76e0bd0d22023-08-02T09:27:56ZengUniversitas Islam Negeri Sunan Kalijaga YogyakartaJISKA (Jurnal Informatika Sunan Kalijaga)2527-58362528-00742022-05-0172Analisis Forensik pada Email Menggunakan Metode National Institute of Standards TechnologyImam Riadi0Sunardi1Fitriyani Tella Nani2Universitas Ahmad DahlanUniversitas Ahmad DahlanUniversitas Ahmad Dahlan Nowadays developments in information technology are growing rapidly, especially in email. Email became one that almost the whole world had. Email is one of the results of developments in information and communication. Email is widely used to exchange information by sending and receiving data, such as document files, pictures, letters, and others. So much for the crimes that often occur in emails. Email crimes that often occur among them are email spoofing. Email spoofing is a forgery that occurs in the header of the email. So, the email is sent as if it were a valid email. Email spoofing is often used in spamming activities. Crimes committed by cybercrime must leave evidence such as IP Address, sender's email, and time of sending the email. This research will do forensics on email spoofing. The research uses the Live Forensics method, where the computer is used in a powered-on state. The research also uses the NIST (National Institute of Standards Technology) research flow. The email that will be analyzed is in the email header section using 3 tools, namely tracer email analyzer, email dossier, and mail header analysis. This analysis will compare and check the accuracy of the email headers using these tools. Emails suspected of email spoofing will be proven using tools. Based on the 'form' received' and 'Message-ID' headers. Based on the results, the tool that meets the value after the analysis is tracer email analysis. http://ejournal.uin-suka.ac.id/saintek/JISKA/article/view/3009Email SpoofingHeader EmailMetode NISTTiga ToolsLive Forensics
spellingShingle Imam Riadi
Sunardi
Fitriyani Tella Nani
Analisis Forensik pada Email Menggunakan Metode National Institute of Standards Technology
JISKA (Jurnal Informatika Sunan Kalijaga)
Email Spoofing
Header Email
Metode NIST
Tiga Tools
Live Forensics
title Analisis Forensik pada Email Menggunakan Metode National Institute of Standards Technology
title_full Analisis Forensik pada Email Menggunakan Metode National Institute of Standards Technology
title_fullStr Analisis Forensik pada Email Menggunakan Metode National Institute of Standards Technology
title_full_unstemmed Analisis Forensik pada Email Menggunakan Metode National Institute of Standards Technology
title_short Analisis Forensik pada Email Menggunakan Metode National Institute of Standards Technology
title_sort analisis forensik pada email menggunakan metode national institute of standards technology
topic Email Spoofing
Header Email
Metode NIST
Tiga Tools
Live Forensics
url http://ejournal.uin-suka.ac.id/saintek/JISKA/article/view/3009
work_keys_str_mv AT imamriadi analisisforensikpadaemailmenggunakanmetodenationalinstituteofstandardstechnology
AT sunardi analisisforensikpadaemailmenggunakanmetodenationalinstituteofstandardstechnology
AT fitriyanitellanani analisisforensikpadaemailmenggunakanmetodenationalinstituteofstandardstechnology