Analisis Perbandingan Tools Forensic Pada Aplikasi Facebook Messenger Menggunakan Metode National Institute of Standards Technology (NIST)
DOI:
https://doi.org/10.37859/jf.v15i3.10862
Abstract
Therapid development of digital technology has driven a significant increase in internet and social media use across all levels of society. This situation not only facilitates communication and information exchange but also opens up opportunities for various forms of cybercrime. One social media platform frequently exploited in cybercrime activities is Facebook, particularly through its instant messaging feature. Therefore, a systematic and standardized digital forensic investigation process is needed to accurately obtain and analyze digital evidence. This study aims to analyze the application of digital forensic stages using the National Institute of Standards and Technology (NIST) method on the Facebook social media platform. The research method used is acase study with a digital forensic approach based on the NIST framework, which includes the stages of collection, examination, analysis, and reporting. The process of acquiring and analyzing digital evidence was carried out on an Android-based smartphone device using two forensic tools, namely Magnet AXIOM and MOBILedit Forensic. The results of the study indicate that MOBILedit Forensic has better data acquisition capabilities, especially in extracting application artifacts and image data relevant to the case. Meanwhile, Magnet AXIOM demonstrates superiority in aspects of data analysis, result visualization, and integration with other forensic platforms. Based on the results of the comparison, MOBILedit Forensic is recommended as a more effective digital forensic tool for the investigation process on Android devices, especially in handling cybercrime cases involving social media applications.
Downloads
References
L. H. Wei, O. C. Huat, and R. Thurasamy, “The impact of social media communication on consumer-based brand equity and purchasing intent in a pandemic,” International Marketing Review, vol. 40, no. 5, pp. 1213–1244, Dec. 2023, doi: 10.1108/IMR-12-2021-0353.
“1114-Other-2419-1-10-20210530”.
W. Presthus and D. M. Vatne, “A Survey on Facebook Users and Information Privacy,” in Procedia Computer Science, Elsevier B.V., 2019, pp. 39–47. doi: 10.1016/j.procs.2019.12.152.
“IT Security Economics 2022 Executive summary.”
Soni, E. Ramadhan, and D. Mualfah, “Investigasi Bukti Digital Aplikasi WeChat Menggunakan Framework Integrated Digital Forensics Proses Model (IDFPM) Berbasis SNI 27037 : 2014,” Jurnal INTEK, vol. 4, no. 1, pp. 25–31, 2021.
V. U. Sameer, I. Dali, and R. Naskar, “A deep learning based digital forensic solution to blind source identification of Facebook images,” … on Information Systems Security, 2018, doi: 10.1007/978-3-030-05171-6_15.
Statista, “Average consumer spend on mobile apps per smartphone as of 3rd quarter 2023.pdf,” 2023.
L. A. Arram and M. Moreb, “Cyber Security In Mobile Apps And User CIA,” 2021 International Conference on …, 2021, [Online]. Available: https://ieeexplore.ieee.org/abstract/document/9491657/
M. Kambar, A. Esmaeilzadeh, Y. Kim, and ..., “A survey on mobile malware detection methods using machine learning,” 2022 IEEE 12th …, 2022, [Online]. Available: https://ieeexplore.ieee.org/abstract/document/9720753/
N. Atanassov and M. M. Chowdhury, “Mobile Device Threat: Malware,” 2021 IEEE International …, 2021, [Online]. Available: https://ieeexplore.ieee.org/abstract/document/9491845/
M. I. Syahib, I. Riadi, and R. Umar, “Akuisisi Bukti Digital Aplikasi Viber Menggunakan Metode National Institute of Standards Technology (NIST),” J-SAKTI (Jurnal Sains Komputer dan Informatika), vol. 4, no. 1, p. 170, 2020, doi: 10.30645/j-sakti.v4i1.196.
R. Hayami, I. Komputer, U. M. Riau, and M. Forensik, “Jurnal Computer Science and Information Technology ( CoSciTech ) Akuisisi Bukti Digital Pada Aplikasi Michat di Smartphone Menggunakan Metode National Acquisition of Digital Evidence on the MiChat Application on Smartphones Using the National Institute of,” vol. 3, no. 3, pp. 283–290, 2022.
I. Riadi, A. Yudhana, M. Caesar, and F. Putra, “1490-Article Text-2859-1-10-20190413,” Akuisisi Bukti Digital Pada Instagram Messenger Berbasis Android Menggunakan Metode National Institute Of Justice (NIJ), vol. 4, pp. 219–227, 2018.
M. Schofield, “Comparison of malware classification methods using convolutional neural network based on api call stream,” International Journal of Network Security &Its …, 2021, [Online]. Available: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3822934
A. A. Baso, P. Ariani, and A. Astuti, “The 5 th International Conference on Entrepreneurship Wired to Change: The Role of Digital Messaging in Boosting EV Awareness Among Indonesian Millennials.”
D. Mualfah, Muhammad Iqbal Syam, and Baidarus, “Analisis perbandingan tools mobile forensic menggunakan metode national institute of justice (NIJ),” Jurnal CoSciTech (Computer Science and Information Technology), vol. 4, no. 1, pp. 283–292, May 2023, doi: 10.37859/coscitech.v4i1.4767.
D. A. Ramadhan and R. A. Arrasyid, “Implementation of Live Forensic Method on Fusion Hard Disk Drive (HDD) and Solid State Drive (SSD) RAID 0 Configuration TRIM Features,” 2024.
D. Mualfah and I. Riadi, “Network Forensics For Detecting Flooding Attack On Web Server,” 2017. [Online]. Available: https://sites.google.com/site/ijcsis/
D. Mualfah and R. A. Ramadhan, “Analisis Digital Forensik Rekaman Kamera CCTV Menggunakan Metode NIST (National Institute of Standards Technology),” IT Journal Research and Development, vol. 5, no. 2, pp. 171–182, 2020, doi: 10.25299/itjrd.2021.vol5(2).5731.
R. A. Ramadhan, D. Mualfah, and D. Hariyadi, “Digital Forensics: Acquisition and Analysis on CCTV Digital Evidence using Static Forensic Method based on ISO /IEC 27037:2014,” no. ICoSET 2019, pp. 85–89, 2020, doi: 10.5220/0009120400850089.
F. T. Admojo, S. Risnanto, A. W. Windiawati, M. Innuddin, and D. Mualfah, “Comparison of Naïve Bayes and Random Forest Algorithm in Webtoon Application Sentiment Analysis,” Innovation in Research of Informatics (INNOVATICS), vol. 6, no. 1, pp. 23–28, 2024, doi: 10.37058/innovatics.v6i1.10636.
D. Mualfah, Y. Fatma, and R. A. Ramadhan, “Anti-forensics: The image asymmetry key and single layer perceptron for digital data security,” in Journal of Physics: Conference Series, Institute of Physics Publishing, May 2020. doi: 10.1088/1742-6596/1517/1/012106.
R. R. Hanaputra et al., “Identifikasi Digital Evidence dalam Transaction Fraud pada WhatsApp Desktop berdasarkan NIST SP 800-86: Studi Kasus Bisnis Properti”.
I. Riadi and T. Ruslan, “Analisis Forensik Digital Pada Whatsapp Dan Facebook Menggunakan Metode NIST”.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Desti Mualfah, Febri Israndi, Rizdqi Akbar Ramadhan

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Copyright Notice
An author who publishes in the Jurnal FASILKOM (teknologi inFormASi dan ILmu KOMputer) agrees to the following terms:
- Author retains the copyright and grants the journal the right of first publication of the work simultaneously licensed under the Creative Commons Attribution-ShareAlike 4.0 License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal
- Author is able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book) with the acknowledgement of its initial publication in this journal.
- Author is permitted and encouraged to post his/her work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of the published work (See The Effect of Open Access).
Read more about the Creative Commons Attribution-ShareAlike 4.0 Licence here: https://creativecommons.org/licenses/by-sa/4.0/.










_(1).png)



