Analisis Forensik Digital Memori Volatile untuk Mendapatkan Kunci Enkripsi Aplikasi Dm-Crypt
Saved in:
| Title: | Analisis Forensik Digital Memori Volatile untuk Mendapatkan Kunci Enkripsi Aplikasi Dm-Crypt |
|---|---|
| Authors: | Firdaus, Vipkas Al Hadid, Suprianto, Dodit, Agustina, Rini |
| Source: | Jurnal Sistem Komputer dan Informatika (JSON); Vol 2, No 3 (2021): Mei 2021; 283-288 ; 2685-998X ; 10.30865/json.v2i3 |
| Publisher Information: | Universitas Budi Darma |
| Publication Year: | 2021 |
| Subject Terms: | Computer Forensic, Disk Encryption, Digital Forensic, Dm-Crypt, Live Forensic Acquisition |
| Description: | Disk encryption technology is something very useful in securing data. On the other hand, disk encryption can be used by criminals to hide the digital evidence. The information in the disk will be very useful for the investigation, but if the disk on the computer evidence encrypted then it will hamper the investigation process. The conditions will certainly be a challenge for investigator cybercrime to be able to find the disk encryption key, especially if the perpetrator did not cooperate in the investigation process. The analysis of the image memory to get the encryption key will be helpful in the investigation. In the overall memory activity on the computer evidence will be recorded, using a live image memory dump on the computer evidence, the decryption keys can be recovered. This paper will discuss about forensic analysis to getting the disk encryption key on the dm-crypt is used to encrypt the disk on Linux operating system and prove that through forensic image memory on a live memory dump, key dm-crypt disk encryption can be found with a success percentage of 80%. On this paper the research will be focused on the Linux operating system with dm-crypt function to full disk encryption. |
| Document Type: | article in journal/newspaper |
| File Description: | application/pdf |
| Language: | English |
| Relation: | https://ejurnal.stmik-budidarma.ac.id/JSON/article/view/2998/2070 |
| DOI: | 10.30865/json.v2i3.2998 |
| Availability: | https://ejurnal.stmik-budidarma.ac.id/JSON/article/view/2998 https://doi.org/10.30865/json.v2i3.2998 |
| Rights: | Copyright (c) 2021 Vipkas Al Hadid Firdaus, Dodit Suprianto, Rini Agustina ; http://creativecommons.org/licenses/by/4.0 |
| Accession Number: | edsbas.B4AD4843 |
| Database: | BASE |
| FullText | Text: Availability: 0 CustomLinks: – Url: https://ejurnal.stmik-budidarma.ac.id/JSON/article/view/2998# Name: EDS - BASE (s4221598) Category: fullText Text: View record from BASE – Url: https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=EBSCO&SrcAuth=EBSCO&DestApp=WOS&ServiceName=TransferToWoS&DestLinkType=GeneralSearchSummary&Func=Links&author=Firdaus%20VAH Name: ISI Category: fullText Text: Nájsť tento článok vo Web of Science Icon: https://imagesrvr.epnet.com/ls/20docs.gif MouseOverText: Nájsť tento článok vo Web of Science |
|---|---|
| Header | DbId: edsbas DbLabel: BASE An: edsbas.B4AD4843 RelevancyScore: 919 AccessLevel: 3 PubType: Academic Journal PubTypeId: academicJournal PreciseRelevancyScore: 918.9462890625 |
| IllustrationInfo | |
| Items | – Name: Title Label: Title Group: Ti Data: Analisis Forensik Digital Memori Volatile untuk Mendapatkan Kunci Enkripsi Aplikasi Dm-Crypt – Name: Author Label: Authors Group: Au Data: <searchLink fieldCode="AR" term="%22Firdaus%2C+Vipkas+Al+Hadid%22">Firdaus, Vipkas Al Hadid</searchLink><br /><searchLink fieldCode="AR" term="%22Suprianto%2C+Dodit%22">Suprianto, Dodit</searchLink><br /><searchLink fieldCode="AR" term="%22Agustina%2C+Rini%22">Agustina, Rini</searchLink> – Name: TitleSource Label: Source Group: Src Data: Jurnal Sistem Komputer dan Informatika (JSON); Vol 2, No 3 (2021): Mei 2021; 283-288 ; 2685-998X ; 10.30865/json.v2i3 – Name: Publisher Label: Publisher Information Group: PubInfo Data: Universitas Budi Darma – Name: DatePubCY Label: Publication Year Group: Date Data: 2021 – Name: Subject Label: Subject Terms Group: Su Data: <searchLink fieldCode="DE" term="%22Computer+Forensic%22">Computer Forensic</searchLink><br /><searchLink fieldCode="DE" term="%22Disk+Encryption%22">Disk Encryption</searchLink><br /><searchLink fieldCode="DE" term="%22Digital+Forensic%22">Digital Forensic</searchLink><br /><searchLink fieldCode="DE" term="%22Dm-Crypt%22">Dm-Crypt</searchLink><br /><searchLink fieldCode="DE" term="%22Live+Forensic+Acquisition%22">Live Forensic Acquisition</searchLink> – Name: Abstract Label: Description Group: Ab Data: Disk encryption technology is something very useful in securing data. On the other hand, disk encryption can be used by criminals to hide the digital evidence. The information in the disk will be very useful for the investigation, but if the disk on the computer evidence encrypted then it will hamper the investigation process. The conditions will certainly be a challenge for investigator cybercrime to be able to find the disk encryption key, especially if the perpetrator did not cooperate in the investigation process. The analysis of the image memory to get the encryption key will be helpful in the investigation. In the overall memory activity on the computer evidence will be recorded, using a live image memory dump on the computer evidence, the decryption keys can be recovered. This paper will discuss about forensic analysis to getting the disk encryption key on the dm-crypt is used to encrypt the disk on Linux operating system and prove that through forensic image memory on a live memory dump, key dm-crypt disk encryption can be found with a success percentage of 80%. On this paper the research will be focused on the Linux operating system with dm-crypt function to full disk encryption. – Name: TypeDocument Label: Document Type Group: TypDoc Data: article in journal/newspaper – Name: Format Label: File Description Group: SrcInfo Data: application/pdf – Name: Language Label: Language Group: Lang Data: English – Name: NoteTitleSource Label: Relation Group: SrcInfo Data: https://ejurnal.stmik-budidarma.ac.id/JSON/article/view/2998/2070 – Name: DOI Label: DOI Group: ID Data: 10.30865/json.v2i3.2998 – Name: URL Label: Availability Group: URL Data: https://ejurnal.stmik-budidarma.ac.id/JSON/article/view/2998<br />https://doi.org/10.30865/json.v2i3.2998 – Name: Copyright Label: Rights Group: Cpyrght Data: Copyright (c) 2021 Vipkas Al Hadid Firdaus, Dodit Suprianto, Rini Agustina ; http://creativecommons.org/licenses/by/4.0 – Name: AN Label: Accession Number Group: ID Data: edsbas.B4AD4843 |
| PLink | https://erproxy.cvtisr.sk/sfx/access?url=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edsbas&AN=edsbas.B4AD4843 |
| RecordInfo | BibRecord: BibEntity: Identifiers: – Type: doi Value: 10.30865/json.v2i3.2998 Languages: – Text: English Subjects: – SubjectFull: Computer Forensic Type: general – SubjectFull: Disk Encryption Type: general – SubjectFull: Digital Forensic Type: general – SubjectFull: Dm-Crypt Type: general – SubjectFull: Live Forensic Acquisition Type: general Titles: – TitleFull: Analisis Forensik Digital Memori Volatile untuk Mendapatkan Kunci Enkripsi Aplikasi Dm-Crypt Type: main BibRelationships: HasContributorRelationships: – PersonEntity: Name: NameFull: Firdaus, Vipkas Al Hadid – PersonEntity: Name: NameFull: Suprianto, Dodit – PersonEntity: Name: NameFull: Agustina, Rini IsPartOfRelationships: – BibEntity: Dates: – D: 01 M: 01 Type: published Y: 2021 Identifiers: – Type: issn-locals Value: edsbas – Type: issn-locals Value: edsbas.oa Titles: – TitleFull: Jurnal Sistem Komputer dan Informatika (JSON); Vol 2, No 3 (2021): Mei 2021; 283-288 ; 2685-998X ; 10.30865/json.v2i3 Type: main |
| ResultId | 1 |
Nájsť tento článok vo Web of Science