Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : International Journal of Artificial Intelligence Research

Digital Forensic Process via Parallel Data Acquisition Technic: Experimental Case Study Sarjimin, Sarjimin; Yudhana, Anton
International Journal of Artificial Intelligence Research Vol 6, No 1 (2022): June 2022
Publisher : Universitas Dharma Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (745.703 KB) | DOI: 10.29099/ijair.v6i1.354

Abstract

Digital Forensics (DF) is an essential tool for solving cases of crimes committed. Based on the type of action performed, DF is classified into static forensics and live forensics. The limitations of static forensics in this method are that data collection is carried out on permanent storage media, while processes in the running system are not obtained. On the other hand, live forensics provides an opportunity to perform data retrieval on the ongoing process. Generally, live forensics is used to acquire Volatile Memory (RAM) data but can be extended on mobile devices, internet/LAN networks, and cloud systems. Browsing in private mode leaves no traces and information about what the user has done during the browsing session. This feature is often used by criminals to hide the crimes committed or at least to slow down the forensic process. To overcome this problem, it is important to do forensics on RAM and Network Forensics to obtain evidence of these crimes. This study aims to conduct DF to obtain potential evidence in criminal cases of misuse of private browsing. The evidence is expected to be used as evidence in court. The parties involved in the crime can be prosecuted in court through such evidence. This research offers Digital Forensics Process Via Parallel Data Acquisition Technic. Parallel data acquisition is a method for retrieving data on a computer or other smart device when the computer or other smart device is on through two different data sources. The first source is RAM and the second is Network Traffic. A case study on a criminal case of misuse of private browsing with Digital Forensics Process Via Parallel Data Acquisition Technic was able to obtain evidence in the form of the website visited, URL, traffic timestamp performed, source address, destination address, transmission protocol, length (size of the packet transmitted), source last node mac address, destination last node mac address, source port, destination port, and detail information. The evidence is expected to be used to reconstruct a crime of misuse of private browsing.
Security Mitigation of the Open Journal System (OJS) Against Online Gambling Content Hijacking Using the ISSAF Framework Sarjimin, Sarjimin; Nugraheni, Anggit Gusti
International Journal of Artificial Intelligence Research Vol 9, No 2 (2025): December
Publisher : Universitas Dharma Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29099/ijair.v9i2.1546

Abstract

The urgency of this research is to identify the causes, develop mitigation methods, and enhance the security of OJS websites, as many are infiltrated or hijacked for online gambling or other harmful content. Securing OJS websites is never easy because attacks are increasingly diverse and innovative every day. OJS system security is essential to protect the information contained therein and protect the services provided by scientific journal publishers. The ISSAF framework, which uses a simulation approach similar to a real server, can serve as a basis for identifying OJS Website vulnerabilities in Webmin for a system administrator. The results of the identification in this study indicate that the leading cause of OJS web server attacks originates from outside the simulation environment, specifically the internet network via ports 80/443. Vulnerability Session Hijacking with Cookies receives a CVSS vulnerability score of 9.1. A vulnerability in the web server configuration folder structure, traceable by crawler tools, receives a CVSS vulnerability score of 5.3. Repeated login attempts to the OJS system are not banned, and blocking the Attacker's IP receives a CVSS vulnerability score of 6.5. A file with the .php extension was successfully uploaded; it may be a backdoor file with a CVSS vulnerability score of 5.3. Although the OJS PKP changed/forced the file to .txt, the malicious file could be exploited in the future by unauthorized users. The novelty of this research lies in a server simulation that mimics a real server and the ISSAF framework for assessing the security of the Webmin web-based system administration tool on OJS websites.