Detecting Cyber Crime for Forensic Computer Handling using OSINT

Authors

  • Salza Aulia Fitri Universitas Pamulang
  • Muhammad Ramadhan Universitas Pamulang
  • Raffi Ciputra Pamulang University
  • Ernis Sita Eriana Pamulang University
  • M.Irham Pamulang University

DOI:

https://doi.org/10.59890/ijels.v2i12.2788

Keywords:

Cyber Crime, OSINT, Computer Forensics

Abstract

In handling computer forensics with backward chaining, the cybercrime detection expert system serves to detect cybercrime crimes committed by criminals. Problems encountered include how to detect cybercrime crimes committed, articles that correspond to cybercrime crimes committed, and what punishment should be given to cybercrime offenders. This article provides a brief explanation of the meaning of forensics, techniques, and applications with various applications available: This expert system uses observation, interviews, and literature studies. into a system that uses hypertext preprocessor programming (PHP) and MySQL database. The design that uses HTML and CSS during the process of making this system can help in the process of detecting and handling internet violations. to supervise the forensic stove, so as to be able to find out with the type of crime committed easily and cyber crime law. The search results show that live forensic, network forensic, and mobile forensic are the most handled crimes, with a trend topic graph above 10. In contrast, computer and database forensics only have two courses.

References

Agri Chairunisa Isradjuningtias, Agri Chairunisa Isradjuningtias, and Leonardo Bagas Pradana. 2023. "Utilization of Digital Forensics in Preventive Efforts to Suppress the Spread of Hoaxes." Postulate 1 (2): 51– 55. https://doi.org/10.37010/postulat.v1i2.1212.

Arshad, Humaira, Saima Abdullah, Moatsum Alawida, Abdulatif Alabdulatif, Oludare Isaac Abiodun, and Omer Riaz. 2022. "A Multi-Layer Semantic Approach for Digital Forensics Automation for Online Social Networks." Sensors 22 (3): 1–24. https://doi.org/10.3390/s22031115.

Goni, Osman. 2021. "Cyber Crime and Its Classification." International Journal of Electronics Engineering and Applications 10 (2): 01–17. https://doi.org/10.30696/ijeea.x.i.2022.01-17.

Jubaidi, Muhamad, and Nurul Fadilla. 2020. "The Influence of the Cyberbullying Phenomenon as Cyber-Crime on Instagram and its Negative Impact." Shaut Al-Maktabah: Journal of Libraries, Archives and

Documentation 12 (2): 117–34. https://doi.org/10.37108/shaut.v12i2.327.

Lavinia, Nia. 2023. "The Urgency of Utilizing Open Source Intelligent (Osint) in Efforts to Prevent Acts of Terrorism in Indonesia." Journal of Applied Social Humanities 6 (1). https://doi.org/10.7454/jsht.v6i1.1105.

Montasari, Reza. 2016. "A Comprehensive Digital Forensic Investigation Process Model." International Journal of Electronic Security and Digital Forensics 8 (January): 285. https://doi.org/10.1504/IJESDF.2016.079430.

Pai U., Yogish, and Krishna Prasad K. 2021. "Open Source Intelligence and Its Applications in Next Generation Cyber Security - A Literature Review." International Journal of Applied Engineering and Management Letters, no. August 2021: 1-25. https://doi.org/10.47992/ijaeml.2581.7000.0100.

Pastor-Galindo, Javier, Pantaleone Nespoli, Felix Gomez Marmol, and Gregorio Martinez Perez. 2020. "The Not yet Exploited Goldmine of OSINT: Opportunities, Open Challenges and Future Trends." IEEE Access 8: 10282-304. https://doi.org/10.1109/ACCESS.2020.2965257.

Prayudi, Yudi, and Azhari SN. 2015. "Digital Chain of Custody: State of the Art." International Journal of Computer Applications 114 (5): 1–9. https://doi.org/10.5120/19971-1856.

Rahayu Selamat, Siti, Shahrin Sahib, Nor Hafeizah, Robiah Yusof, and Mohd Faizal Abdollah. 2013. "A Forensic Traceability Index in Digital Forensic Investigation." Journal of Information Security 04 (01): 19–32. https://doi.org/10.4236/jis.2013.41004.

Tajuddin, Taniza, Azizah Abd Manaf, Nor Fatimah Awang, Siti Rafidah Muhamat Dawam, Noor Rasidah Ali, and Rafidah Amat. 2019. "Crime Suspect Profiling (CSP) for Forensic Investigation on Smartphone." In 2019 4th International Conference and Workshops on Recent Advances and Innovations in Engineering (ICRAIE), 1-6. https://doi.org/10.1109/ICRAIE47735.2019.9037772.

Virmani, Charu, Tanu Choudhary, Anuradha Pillai, and Manisha Rani. 2022. "Applications of Machine Learning in Cyber Security." Research Anthology on Machine Learning Techniques, Methods, and Applications, 621-41.https://doi.org/10.4018/978-1-6684-6291-1.ch033.

Downloads

Published

2025-01-10

How to Cite

Salza Aulia Fitri, Muhammad Ramadhan, Raffi Ciputra, Ernis Sita Eriana, & M.Irham. (2025). Detecting Cyber Crime for Forensic Computer Handling using OSINT. International Journal of Educational and Life Sciences, 2(12), 1387–1394. https://doi.org/10.59890/ijels.v2i12.2788