Digital Forensics Random Access Memory Using Live Technique Based On Network Attacked
Digital Forensics Random Access Memory Using Live Technique Based On Network Attacked
    Abstract—The        development      of     information      and    RAM in computer system describes all the activities that have
communication technologies are increasing rapidly. The security         been occurred on the system during the system was running.
of data processed and stored also must be prepared in higher
security. One of the techniques in data security is digital                 Forensics investigators memory is the process of analyzing
forensics. Digital forensics is an investigative technique to           the volatile data in RAM to obtain digital evidence that can be
identify or collect the information on a digital storage as evidence    responsible accounted for [2]. Handling of volatile data in
to expose crimes legally defensible. However, in this research we       RAM must be careful because data can be lost if the system is
use a live forensics digital technique. Investigations using live       turned off. Therefore, we need a memory forensics techniques
forensics technique requires special handling because the volatile      to ensure data integrity volatile without losing data that could
data in Random Access Memory which can be lost if the system is         potentially be evidence.
in off investigation. This investigation conducted on the system
by dump memory investigator to the system which has been                     Some of security researcher Sam Stover and Matt
attacked and then transferred the file on system investigator. We       Dickerson do the digital forensics on non-volatile storage such
investigate the data inside the RAM and make analysis about the         as hard drive that has been physically removed by The
accuracy using several cyber attacks like session hijacking, FTP        Coroners Toolkit (TCT) [3]. Timothy Vidas do the research in
attack, and illegal access. The result shows that all the attacks       the acquisition and analysis of Random Access Memory, and
can be investigated and produced the evidence which is                  discusses the benefits and drawbacks of traditional incident
authentic, reliable, and defensible.                                    response methods compared to augmented model that includes
                                                                        the capture and subsequent analysis of a suspect system’s
  Keywords—digital forensics; dumpmemory; live forensics;               memory, provides a foundation for analyzing capture memory
memory accuisition; Random Access Memory                                [4].
                                                                            In this research, we investigate the data in Random Access
                       I. INTRODUCTION
                                                                        Memory using live forensics and make an analysis about the
   The utilization of information and communication becomes             accuracy of the data as the result of forensic memory by using
very important and must be presents in the process of                   some variation of several case scenarios that were tested. The
developing an institution or company. This dependency                   attacked scenario that will be used is session hijacking, FTP
unwittingly will increase the crime of technology and                   attack, and illegal access using 64 bit operating system Kali
communication which will be a risk for institutions or                  Linux 2.0.
companies.
    The presence of information and electronic transaction laws                          II. LITERATURE STUDY
turns out less a major contribution in the process of
enforcement of legal cases in Indonesia. This is because this           A. Digital Forensic
law appears to be merely regulate the flow of electronics                   Digital Forensics is the use of analysis and investigate
information in general. Yet, there are a lot of things that are         techniques to identify, collect, examine, and save the evidence
detailed in legal cases and enforcement issues in Indonesia that        of information which is stored in a digital storage that can be
have not been regulated in the law. The things that are detailed        used as evidence in exposes crimes legally defensible [5].
is used as reference in information technology security which is        Digital forensics is commonly used in both criminal law and
leading to the digital forensics.                                       private investigation.
    Inside a computer system, there are main memory or                      Fig.1 shows a process of forensics digital. The first step is
known as Random Access Memory (RAM), which play a very                  collection the data. Digital media that can be used as evidence
important component in a system [1]. RAM is one of volatile             such as a storage like flash disk, mobile phone, memory and
storage media or data. Volatile is the technique of storage             hard disk are collected as the data to be examine in the next
media that data will be lost if there is no electricity [1]. Volatile   step. The second process is examination, data which has been
data in RAM is very useful for forensics process, because the           collect will be examined by cloning or imaging the data. This
                                                                    D. Live Forensic
                                                                        Forensics Memory is one of the existing forensics
                                                                    techniques. In the digital’s world forensics, there are two
Fig. 1. Forensics Process                                           forensics techniques. The traditional forensics and live
    The third step is analysis. In this step all the data will be   forensics. Traditional or known as offline forensics techniques
analyzed and make the recovery to store back the file and the       is a first technique using in computer forensics and commonly
folder. The tools for analyze the data is using MD5. The last       used by the researcher to do the forensics data. This technique
step is reporting. This step is presenting and describing the       requires the investigator to shut down the attacked system. Its
investigation report and the evidence that had been analyzed in     aimed to anticipation any malicious processes running on the
detail and can be justified as scientific.                          system which can be delete the important data for investigation
                                                                    purposes [9].
B. Random Access Memory
    Random Access Memory is the main memory of a
computer. RAM is volatile, it is means that in RAM data will
be lost when the power of computer is turned off. Besides that,
RAM is used to store data temporarily and randomly, and                                                            No
issued the requested data processor also data flow from RAM
as dynamic and in a very high speed [6].                                                                     Yes
Host-Only
                                                                                          A. Investigation
                                                                                              Testing scenario as the investigation in this system is using
                                                                                          several cyber attacked techniques. The first scenario is
                                                                                          hijacking session. This scenario is the process of taking control
                                                                                          the victim’s session. But, the attacker should get the ID of
                                                                                          authentication session which stored in the cookie. So that, the
                                                                                          attacker will try to get a cookie’s victims.
    The second scenario is FTP Attack. This scenario is the                              flowchart of investigation can be shown in Fig.8 below. The
process of taking control of the system by taking a security gap                         investigation of session hijacking and FTP attack have the
in the FTP. The attacker will perform a brute force on FTP.                              same step of investigation while the investigation of illegal
After successfully entered the system, attacker will perform                             access is different with the others.
activities using the victim’s system.
    The last scenario is Illegal Access. In this scenario, the                                                                       Start
                              No
                                                                    Any Respond
          Insert XSS Script              Any                         from Back
                                                                        door?
                                                                                                     Documented the                  Documented the
                                      Password ?
                                                                                                        evidence                        evidence
                                                  Yes
           Terminal Open                                                        Yes
                                   Login FTP Server
                                                                  doing the activities
                                                                    using victim’s                                                           Stop
            Listener Port                                             computer
                                   Upload Backdoor
                 80
                                                                                         Fig. 8. Investigation Flowchart
    No
             Script XSS
                                                                                         B. Result Analysis
              Running?
                                                                                             The result of the investigation conducted to several
                      Yes
                                                                                         intrusion scenarios that have been tested will be described
             Info Target
               System                                                                    shortly only about the information file of dump memory, the
                                                                                         information file of packets, pcap, information file of timeline
         change session ID                                                               MACtime, and the summary of result analysis on each
                                                                                         intrusion scenario.
          Access Website                                                                     • Session Hijacking
          using Victim’s
            Session ID
                                                                                            Information file of session hijacking can be seen at table II,
                                                                                         while the summary record result analysis of session hijacking
                                         Stop                                            can be seen in table III below.
Fig. 7. Scenario Flowchart
   All the system that had been intrusion by the attacker will
be investigated with different step of investigation. The
                                                                                   After doing analysis on timeline mac-time file, we discover
                                                                               some suspicious line. Based on parser file on Fig.10 there was
                                                                               a file, named “penting.exe” which is a suspicious file as an
                                                                               attacker.
                       V. CONCLUSION
   Based on the result of investigator and analysis system, we
can give a conclusion that live forensics using dump memory