INVESTIGASI CLOUD FORENSIC PADA DISK VOLUME AWS EC2 STUDI KASUS PENETRATION TESTING TERHADAP INSTANCE

Main Article Content

Andriyan Dwi Putra
Joko Dwi Santoso
Adrian Raditya Rahma
Ipung Ardiansyah

Abstract

Implementasi teknologi cloud computing pada sektor industri saat ini sudah berkembang cukup cepat. Cepatnya perkembangan development dari sisi teknologi dan arsitektur cloud computing menjadi tantangan baru pada kasus digital forensik dalam mencari bukti potensial pada penanganan kasus cybercrime. EC2 instance merupakan salah satu layanan infrastructure as a service (IAAS) milik provider Amazon Web Service (AWS) yang banyak digunakan perseorangan maupun perusahaan dalam menangani kebutuhan infrastruktur layanan server. Hal ini menjadi dasar peneliti untuk melakukan analisis forensik pada sektor cloud dengan mengangkat studi kasus proses investigasi pada skenario aktivitas hacking EC2 instance menggunakan metodologi National Institute of Standards Technology (NIST). Berdasarkan hasil analisis artefak filesystem timeline dan log system yang diperoleh dari barang bukti volume disk instance, peneliti berhasil membuktikan skenario aktivitas serangan information gathering, eksploitasi dan post exploitation. Pada phase Information Gathering & Exploitation di temukan dua serangan yang dilakukan attacker yaitu Web Path Bruteforce di sumber artefak /var/log/access.log dan Exploitation (Compromised Instance) di sumber artefak /var/log/vsftpd.log, sedangkan pada phase Post Exploitation ditemukan 2 serangan yaitu Maintaining Access di sumber artefak /var/log/auth.log dan Covering Track di sumber artefak file system timeline.

Article Details

How to Cite
Andriyan Dwi Putra, Joko Dwi Santoso, Adrian Raditya Rahma, & Ipung Ardiansyah. (2023). INVESTIGASI CLOUD FORENSIC PADA DISK VOLUME AWS EC2 STUDI KASUS PENETRATION TESTING TERHADAP INSTANCE. Jurnal Teknologi Informasi Dan Komputer, 9(5). https://doi.org/10.36002/jutik.v9i5.2648
Section
Articles

References

.

E. Morioka and M. S. Sharbaf. ( 2016). Digital forensics research on cloud computing: An investigation of cloud forensics solutions. 2016 IEEE Symposium on Technologies for Homeland Security (HST), pp. 1-6. https://doi.org/10.1109/THS.2016.7568909

. Y. Hung. (2019). Investigating How the Cloud Computing Transforms the Development of Industries. in IEEE Access, vol. 7, pp. 181505-181517, https://doi.org/10.1109/ACCESS.2019.2958973

.

P. R. Agbedanu, P. Wang, R. N. Nortey and L. K. Odartey. (2019). Forensics in the Cloud: A Literature Analysis and Classification. 2019 5th International Conference on Big Data Computing and Communications (BIGCOM), pp. 124-132. https://doi.org/10.1109/BIGCOM.2019.00027

.

Gartner. (2018). Gartner Says 28 Percent of Spending in Key IT Segments Will Shift to the Cloud by 2022 (Online). https://www.gartner.com/ 5].

Columbus, L. (2018). 83% Of Enterprise Workloads Will Be In The Cloud By 2020 (Online). https://www.forbes.com/

.

Coles, C. (n.d.)(2017). AWS vs Azure vs Google cloud market share 2017. https://www.skyhighnetworks.com

.

E. Morioka and M. S. Sharbaf. (2016). )Digital forensics research on cloud computing: An investigation of cloud forensics solutions. 2016 IEEE Symposium on Technologies for Homeland Security (HST), pp. 1-6, https://doi.org/10.1109/THS.2016.7568909

. Yudhistira, D & Riadi, I & Prayudi, Y. (2018). Live Forensics Analysis Method For Random Access Memory On Laptop Devices. International Journal of Computer Science and Information Security,. 16.

. Simou, S., Kalloniatis, C., Kavakli, E., Gritzalis, S. (2014). Cloud Forensics: Identifying the Major Issues and Challenges. In: , et al. Advanced Information Systems Engineering. CAiSE 2014. Lecture Notes in Computer Science, vol 8484. Springer, Cham. https://doi.org/10.1007/978-3-319-07881-6_19

.

G. Grispos, T. Storer, and W.B. Glisson (2012). Calm Before the Storm: The Challenges of Cloud Computing in Digital Forensics. International Journal of Digital Crime and Forensics, Volume 4,Issue 2, Pages 28-48 https://doi.org/10.4018/jdcf.2012040103

.

Yudhana, A., Riadi, I., & Anshori, I. (2018). Identification Of Digital Evidence Facebook Messenger On Mobile Phone With National Institute Of Standards Technology (Nist) Method. Jurnal Ilmiah Kursor, 9(3).

https://doi.org/10.28961/kursor.v9i

152

. Yudhana, A., Riadi, I., & Anshori, I. (2018). Analisis Bukti Digital Facebook Messenger Menggunakan Metode Nist. IT Journal Research and Development, 3(1), 13 - 21. https://doi.org/10.25299/itjrd.2018.vol3(1).1658

. Dykstra, J., & Sherman, A.T. (2012). Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques. Digit. Investig., 9, S90-S98. https://doi.org/10.1016/j.diin.2012.05.001

. Mualfah, D., & Ramadhan, R.A. (2020). Analisis Digital Forensik Rekaman Kamera CCTV Menggunakan Metode NIST (National Institute of Standards Technology).

.

Nasirudin, Nasirudin & Sunardi, Sunardi & Riadi, Imam. (2020). Analisis Forensik Smartphone Android Menggunakan Metode NIST dan Tool MOBILedit Forensic Express. Jurnal Informatika Universitas Pamulang. 5. 89. https://doi.org/10.32493/informatika.v5i1.4578

. Imam R, Abdul F, & Muhammad I A. (2020). Investigasi Bukti Digital Optical Drive Menggunakan Metode National Institute of Standard and Technology (NIST). Jurnal RESTI (Rekayasa Sistem Dan Teknologi Informasi), 4(5), 820-828. https://doi.org/10.29207/resti.v4i5.2224

. Yasin, F., Abdul Fadlil, & Rusydi Umar. (2021). Identifikasi Bukti Forensik Jaringan Virtual Router Menggunakan Metode NIST. Jurnal RESTI (Rekayasa Sistem Dan Teknologi Informasi), 5(1), 91 - 98. https://doi.org/10.29207/resti.v5i1.2784