Forensik Internet Of Things pada Device Level berbasis Embedded System
DOI:
https://doi.org/10.25126/jtiik.2019661828Abstrak
Perangkat Internet of Things (IoT) merupakan perangkat cerdas yang memiliki interkoneksi dengan jaringan internet global. Investigasi kasus yang menyangkut perangkat IoT akan menjadi tantangan tersendiri bagi investigator forensik. Keberagaman jenis perangkat dan teknologi akan memunculkan tantangan baru bagi investigator forensik. Dalam penelitian ini dititikberatkan forensik di level internal device perangkat IoT. Belum banyak bahkan belum penulis temukan penelitian sejenis yang fokus dalam analisis forensik perangkat IoT pada level device. Penelitian yang sudah dilakukan sebelumnya lebih banyak pada level jaringan dan level cloud server perangkat IoT. Pada penelitian ini dibangun environment perangkat IoT berupa prototype smart home sebagai media penelitian dan kajian tentang forensik level device. Pada penelitian ini digunakan analisis model forensik yang meliputi collection, examination, analysis, dan reporting dalam investigasi forensik untuk menemukan bukti digital. Penelitian ini berhasil mengungkap benar-benar ada serangan berupa injeksi malware terhadap perangkat IoT yang memiliki sistem operasi Raspbian, Fedberry dan Ubuntu Mate. Pengungkapan fakta kasus mengalami kesulitan pada perangkat IoT yang memiliki sistem operasi Kali Linux. Ditemukan 1 IP Address komputer penyerang yang diduga kuat menanamkan malware dan mengganggu sistem kerja perangkat IoT.
Abstract
The Internet of Things (IoT) is an smart device that has interconnection with global internet networks. Investigating cases involving IoT devices will be a challenge for forensic investigators. The diversity of types of equipment and technology will create new challenges for forensic investigators. In this study focused on forensics at the IoT device's internal device level, there have not been many similar research that focuses on forensic analysis of IoT devices at the device level. Previous research has been done more at the network level and cloud level of IoT device's. In this study an IoT environment was built a smart home prototype as a object for research and studies on forensic level devices. This study, using forensic model analysis which includes collection, examination, analysis, and reporting in finding digital evidence. This study successfully revealed that there was really an attack in the form of malware injection against IoT devices that have Raspbian, Fedberry and Ubuntu Mate operating systems. Disclosure of the fact that the case has difficulties with IoT devices that have the Kali Linux operating system. Found 1 IP Address of an attacker's computer that is allegedly strongly infusing malware and interfering with the work system of IoT devices.
Downloads
Referensi
AKBAR, S. R., HENRYRANU, B., HANDONO, M. T., & BASUKI, A.,2017. Implementasi Purwarupa Perangkat Rumah Cerdas Pervasif Berbasis Protokol Universal Plug And Play (UPnP) Dan Raspberry Pi General Purpose Input/Output (GPIO). Jurnal Teknologi Informasi Dan Ilmu Komputer, 2(2), 116. https://doi.org/10.25126/jtiik.201522143
ALBANNA, F., & RIADI, I., 2017. Forensic Analysis of Frozen Hard Drive Using Static Forensics Method. International Journal of Computer Science and Information Security, 15(1), 173–178. https://doi.org/10.13140/RG.2.1.2967.0003
BOZTAS, A., RIETHOVEN, A. R. J., & ROELOFFS, M., 2015. Smart TV forensics: Digital traces on televisions. Digital Investigation, 12(S1), S72–S80. https://doi.org/10.1016/j.diin.2015.01.012
JEONG, D., PARK, J., LEE, S., & KANG, C., 2015. Investigation methodology of a virtual desktop infrastructure for IoT. Journal of Applied Mathematics, 2015. https://doi.org/10.1155/2015/689870
KEBANDE, V. R., & RAY, I., 2016. A generic digital forensic investigation framework for Internet of Things (IoT). Proceedings - 2016 IEEE 4th International Conference on Future Internet of Things and Cloud, FiCloud 2016, 356–362.
zhttps://doi.org/10.1109/FiCloud.2016.57
LIU, J., 2015. IoT Forensics Issues strategies and challenges. 12 IDF Annual Conference.
MASYKUR, F., & PRASETIYOWATI, F., 2017. Aplikasi Rumah Pintar (Smart Home) Pengendali Peralatan Elektronik Rumah Tangga Berbasis Web. Jurnal Teknologi Informasi Dan Ilmu Komputer, 3(1), 51. https://doi.org/10.25126/jtiik.201631156
MEFFERT, C. S., CLARK, D. R., BAGGILI, I., BREITINGER, F., MEFFERT, C., & CLARK, D., 2017. Digital Commons @ New Haven Forensic State Acquisition from Internet of Things (FSAIoT): A General Framework and Practical Approach for IoT Forensics through IoT Device State Acquisition Forensic State Acquisition from Internet of Things (FSAIoT): A gener, 2017. Retrieved from http://digitalcommons.newhaven.edu/%0Ahttps://doi.org/10.1145/3098954.3104053
ORIWOH, E., JAZANI, D., EPIPHANIOU, G., & SANT, P., 2013. Internet of Things Forensics: Challenges and Approaches. Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, (December), 608–615. https://doi.org/10.4108/icst.collaboratecom.2013.254159
OSMAN, Y., OSEI, A., & NARENDRA, B. C., 2016). A Review of Prospects and Challenges of Internet of Things. International Journal of Computer Applications, 139(April), 33–39. https://doi.org/10.5120/ijca2016909390
PERUMAL, S., MD NORWAWI, N., & RAMAN, V., 2015. Internet of Things(IoT) digital forensic investigation model: Top-down forensic approach methodology. 2015 5th International Conference on Digital Information Processing and Communications, ICDIPC 2015, 19–23. https://doi.org/10.1109/ICDIPC.2015.7323000
RAMADHAN, R. A., PRAYUDI, Y., & SUGIANTORO, B., 2017. Implementasi dan Analisis Forensika Digital Pada Fitur Trim Solid State Drive (SSD). Teknomatika, 9(2), 1–13. Retrieved from http://teknomatika.stmikayani.ac.id/wp-content/uploads/2017/07/1.pdf
RIADI, I., UMAR, R., & NASRULLOH, I. M., 2018. Analisis Forensik Digital Pada Frozen Slod State Drive Dengan Metode National Institute of Justice ( Nij ), 3(May), 70–82. https://doi.org/10.21831/elinvo.v3i1.19308
RIZAL, R., RIADI, I., & PRAYUDI, Y., 2018. Network Forensics for Detecting Flooding Attack on Internet of Things (IoT) Device. Int. J. Cyber-Security Digit. Forensics, 7(4), 382–390.
TILVA, M., & ROHOKALE, V., 2016. Network Forensics for detection of malicious packets in Internet of Things ( IoT ), (June), 114–118.
WATSON, S., & DEHGHANTANHA, A., 2016. Digital forensics: the missing piece of the Internet of Things promise. Computer Fraud and Security, 2016(6). https://doi.org/10.1016/S1361-3723(15)30045-2
WILIANTO, & KURNIAWAN, A., 2018. Sejarah , Cara Kerja Dan Manfaat Internet of Things. Matrix, 8(2), 36–41.
ZAWOAD, S., & HASAN, R., 2015. FAIoT: Towards Building a Forensics Aware Eco System for the Internet of Things. Proceedings - 2015 IEEE International Conference on Services Computing, SCC 2015, 279–284. https://doi.org/10.1109/SCC.2015.46
Unduhan
Diterbitkan
Terbitan
Bagian
Lisensi
Artikel ini berlisensi Creative Common Attribution-ShareAlike 4.0 International (CC BY-SA 4.0)
Penulis yang menerbitkan di jurnal ini menyetujui ketentuan berikut:
- Penulis menyimpan hak cipta dan memberikan jurnal hak penerbitan pertama naskah secara simultan dengan lisensi di bawah Creative Common Attribution-ShareAlike 4.0 International (CC BY-SA 4.0) yang mengizinkan orang lain untuk berbagi pekerjaan dengan sebuah pernyataan kepenulisan pekerjaan dan penerbitan awal di jurnal ini.
- Penulis bisa memasukkan ke dalam penyusunan kontraktual tambahan terpisah untuk distribusi non ekslusif versi kaya terbitan jurnal (contoh: mempostingnya ke repositori institusional atau menerbitkannya dalam sebuah buku), dengan pengakuan penerbitan awalnya di jurnal ini.
- Penulis diizinkan dan didorong untuk mem-posting karya mereka online (contoh: di repositori institusional atau di website mereka) sebelum dan selama proses penyerahan, karena dapat mengarahkan ke pertukaran produktif, seperti halnya sitiran yang lebih awal dan lebih hebat dari karya yang diterbitkan. (Lihat Efek Akses Terbuka).