Investigasi File Carving pada Media Penyimpanan Menggunakan Framework Computer Forensic Investigative Process
Abstract
One of the uses of digital storage media in the digital era that is still popular today is the use of flash drives as a means of transferring data between computer devices. Flash disks are often used as evidence in digital investigation cases. The risk of losing data is one of the main problems that society often faces. Data loss occurs for various reasons, such as user error, device failure, malware attack, or criminal acts such as hacking. The file carving technique is used to recover lost or deleted files from digital storage media with Foremost software. However, with so many file types, it is sometimes difficult to choose which file types to recover and how to ensure the authenticity of the files. This study uses the Computer Forensic Investigative Process (CFIP) Framework on a flash drive, which is used as evidence in a criminal case. Foremost software is used to perform file carving techniques on flash drives. The results showed that the data acquisition process using DC3DD succeeded in producing digital evidence with a hash value that is identical to the original file. Foremost software successfully recovered various file types, such as 9 image files with jpg file type, 5 audio files with mp3 file type, and 5 document files with pdf file type. Foremost shows a high success rate, with file carving accuracy of 90% for image files, and 62.5% for audio files and documents. The average success rate of Foremost software in returning evidence is 73.08%.
Downloads
References
A. R. Trilaksono, “Efektivitas Penggunaan Google Drive Sebagai Media Penyimpanan Di Kalangan Mahasiswa,” J. Digit. Teknol. Inf., vol. 1, no. 2, pp. 91–197, 2020, doi: 10.32502/digital.v1i2.1651.
H. Dhika, T. Akhirina, D. Mustari, and F. Destiawati, “Pemanfaatan Teknologi Cloud Computing sebagai Media Penyimpanan Data,” J. PkM Pengabdi. Kpd. Masy., vol. 2, no. 03, pp. 221–226, 2019, doi: 10.30998/jurnalpkm.v2i03.3144.
M. K. Anam and H. Ulayya, “Implementasi dan Analisa SARDrive Sebagai Media Penyimpanan Cloud,” JUITA J. Inform., vol. 8, no. 1, pp. 83–90, 2020, doi: 10.30595/juita.v8i1.5748.
A. Yudhana, I. Riadi, and S. Suharti, “Network Forensics Against Volumetric-Based Distributed Denial of Service Attacks on Cloud and the Edge Computing,” Int. J. Saf. Secur. Eng., vol. 12, no. 5, pp. 577–588, 2022, doi: 10.18280/ijsse.120505.
I. Riadi, S. Sunardi, and S. Sahiruddin, “Analisis Forensik Recovery pada Smartphone Android Menggunakan Metode National Institute Of Justice (NIJ),” J. Rekayasa Teknol. Inf., vol. 3, no. 1, p. 87, 2019, doi: 10.30872/jurti.v3i1.2292.
R. N. Dasmen and F. Kurniawan, “Digital Forensik Deleted Cyber Crime Evidence pada Pesan Instan Media Sosial,” Techno.Com, vol. 20, no. 4, pp. 527–539, 2021, doi: 10.33633/tc.v20i4.5170.
D. Frananda, . F., and H. Bakir, “Strategi Penyidik Mengatasi Kendala Dalam Mengumpulkan Alat Bukti Tindak Pidana Pornografi Melalui Media Elektronik,” UNES J. Swara Justisia, vol. 5, no. 3, pp. 210–217, 2021, doi: 10.31933/ujsj.v5i3.217.
N. Darwis, “Kriminology Pada Bidang Kebijakan ‘Cyber Security,’” J. Ilm. Huk. Dirgant., vol. 9, no. 2, pp. 24–46, 2019, doi: 10.35968/jh.v9i2.353.
W. Prasetya and P. Priyana, “Pertimbangan Hakim Atas Penghadiran Bukti Digital Forensik dalam Perkara Kejahatan Fraud,” Wajah Huk., vol. 5, no. 2, pp. 448–459, 2021, doi: 10.33087/wjh.v5i2.472.
S. Rachmie, “Peranan Ilmu Digital Forensik Terhadap Penyidikan Kasus Peretasan Website,” LITIGASI, vol. 21, no. 21, pp. 104–127, Jul. 2020, doi: 10.23969/litigasi.v21i1.2388.
A. Ganaro, “Fungsi Digital Forensik Bagi Satreskrim Polres Agam Dalam Penyidikan Tindak Pidana Judi Online,” UNES Law Rev., vol. 3, no. 2, pp. 194–200, 2021, doi: 10.31933/unesrev.v3i2.166.
A. Yudhana, A. D. Cahyo, L. Y. Sabila, A. C. Subrata, and I. Mufandi, “Spatial distribution of soil nutrient content for sustainable rice agriculture using geographic information system and Naïve Bayes classifier,” Int. J. Smart Sens. Intell. Syst., vol. 16, no. 1, pp. 1–14, 2023, doi: 10.2478/ijssis-2023-0001.
D. Teguh Yuwono, S. Juhairiah, and S. Sonedi, “Analisis File Carving Pada File System Dengan Metode National Institute Of Standards And Technology (NIST),” Pros. SNRT (Seminar Nas. Ris. Ter., vol. 4, no. 1, pp. 85–92, 2019.
A. K. Pratama, C. Carudin, and D. Yusup, “Analisis Perbandingan Perangkat Lunak Forensik Digital untuk File Carving dalam Mengungkap Barang Bukti Digital,” JUSTINDO (Jurnal Sist. dan Teknol. Inf. Indones., vol. 6, no. 2, pp. 109–120, 2021, doi: 10.32528/justindo.v6i2.5101.
D. T. Yuwono, A. Fadlil, and S. Sunardi, “Performance Comparison of Forensic Software for Carving Files using NIST Method,” J. Teknol. dan Sist. Komput., vol. 7, no. 3, pp. 89–92, Jul. 2019, doi: 10.14710/jtsiskom.7.3.2019.89-92.
I. Riadi, A. Yudhana, and G. P. I. Fanani, “Mobile Forensic Tools for Digital Crime Investigation: Comparison and Evaluation,” Int. J. Saf. Secur. Eng., vol. 13, no. 1, pp. 11–19, Feb. 2023, doi: 10.18280/ijsse.130102.
D. T. Yuwono and Yunanri, “Analisis Perbandingan File Carving Dengan Metode NIST,” J. Sains Komput. dan Teknol. Inf., vol. 2, no. 2, pp. 1–6, 2020, doi: 10.33084/jsakti.v2i2.1472.
M. I. Syahib, I. Riadi, and R. Umar, “Akuisisi Bukti Digital Aplikasi Viber Menggunakan Metode National Institute of Standards Technology (NIST),” J-SAKTI (Jurnal Sains Komput. dan Inform., vol. 4, no. 1, pp. 170–178, 2020, doi: 10.30645/j-sakti.v4i1.196.
M. R. D. Qibriya, A. Ambarwati, and K. E. Susilo, “Analisis Forensik Digital Pada Aplikasi Instant Messaging Di Smartphone Berbasis Android Untuk Bukti Digital,” J. Teknol. Inf., vol. 5, no. 2, pp. 114–121, 2021, doi: 10.36294/jurti.v5i2.2200.
R. Umar, A. Yudhana, and M. N. Fadillah, “Perbandingan Tools Forensik pada Aplikasi Dompet Digital,” JIKO (Jurnal Inform. dan Komputer), vol. 6, no. 2, pp. 242–250, Sep. 2022, doi: 10.26798/jiko.v6i2.621.
I. Wahyudi, A. Muntasa, M. Yusuf, and A. Hamzah, “Mengungkap Dan Menguji Keaslian Bukti Digital Pada Kejahatan Cybercrime Dengan Metode Digital Forensic Research Workshop,” J. Apl. Teknol. Inf. dan Manaj., vol. 2, no. 2, pp. 120–127, 2021, doi: 10.31102/jatim.v2i2.1068.
I. P. Wiratama, A. Suharso, and C. Rozikin, “Akuisisi Bukti Digital Dan Deteksi Keaslian Citra Pada Whatsapp Menggunakan Metode NIST Dan ELA,” J. Sains Komput. Inform., vol. 5, no. 2, pp. 712–726, 2021, doi: 10.30645/j-sakti.v5i2.370.
H. Herman, A. Yudhana, and F. Anggraini, “Acquisition of Android-Based TikTok Digital Evidence Using the National Institute of Justice Method,” J. Teknol. Inf. dan Ilmu Komput., vol. 10, no. 1, pp. 89–96, 2023, doi: 10.25126/jtiik.2023106416.
A. Yudhana, R. Umar, and A. B. Fawait, “Decision Making Using the MABAC Method to Determine the Leading Small and Medium Industry Centers in Yogyakarta,” Ingénierie des systèmes d Inf., vol. 27, no. 6, pp. 887–893, 2022, doi: 10.18280/isi.270604.
R. Y. Prasongko, A. Yudhana, and I. Riadi, “Analysis of the Use of the ACPO (Association of Chief Police Officer) Method in WhatsApp Forensics,” J. Sains Komput. Inform. (J-SAKTI, vol. 6, no. 2, pp. 1112–1120, 2022, doi: 10.30645/j-sakti.v6i2.520.
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Investigasi File Carving pada Media Penyimpanan Menggunakan Framework Computer Forensic Investigative Process
Pages: 472-479
Copyright (c) 2024 La Jupriadi Fakhri, Imam Riadi, Anton Yudhana

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).






















