Analisis Bukti Digital pada Private Chat Synology Menggunakan Metode Live Forensik
DOI:
https://doi.org/10.33020/saintekom.v16i1.1016Keywords:
Synology Chat, NAS, network live forensics, NIST, digital evidenceAbstract
The adoption of Network Attached Storage (NAS) based private communication platforms such as Synology Chat is increasing in organizations and may store valuable digital evidence. However, encryption and closed system architecture can limit evidence acquisition using conventional forensic approaches. This study applies network live forensics by proactively capturing network traffic and analyzing capture files to recover deleted chat messages and transferred files. The investigation follows the National Institute of Standards and Technology NIST framework consisting of collection, examination, analysis, and reporting using digital evidence including packet capture PCAP or packet capture next generation PCAPNG files, communication artifacts, and reconstructed file objects. An experimental method is conducted by comparing server-side capturing via Secure Shell SSH on the NAS server and external capturing from a device within the same Local Area Network LAN. Results show that server-side capturing is more effective for file reconstruction and message recovery under certain conditions, while external capturing provides limited artifacts and cannot reveal plain text messages.
Downloads
References
Aini, F. D., Peryanto, A., & Widodo, Y. F. (2025). Analisis Forensik Jaringan pada Router Berbasis Log Menggunakan Metode Live Forensic. Jurnal Kolaborasi Riset Sarjana, 2(2), 29–35.
Fahrudin, A., & Zaida Muflih, G. (2024). Analisis Forensik Digital Pada Pesan Whatsapp Yang Terenkripsi Dengan Pretty Good Privacy (Pgp) Menggunakan Framework Dfrws. Jati (Jurnal Mahasiswa Teknik Informatika), 9(1), 780–787. https://doi.org/10.36040/jati.v9i1.12506
Fitriani Shabira, A., & Fachri, F. (2025). Analisis Forensik Digital Pada File Steganografi Menggunakan Ftk Imager Dan Winhex Dalam Kasus Peredaran Narkoba Dengan Live Forensics. Rabit?: Jurnal Teknologi Dan Sistem Informasi Univrab, 10(2), 228–240. https://doi.org/10.36341/rabit.v10i2.6020
Hendrawan, M. Y. F., Subektiningsih, S., & Hadinegoro, A. (2023). Analisis Bukti Digital Pada Discord Browser Menggunakan Teknik Live Forensic Dengan Metode NIST SP 800-86. Jurnal Infomedia, 8(2), 94. https://doi.org/10.30811/jim.v8i2.4764
Hildayanti, N., & Riadi, I. (2019). Forensics Analysis of Router On Computer Networks Using Live Forensics Method. International Journal of Cyber-Security and Digital Forensics, 8, 74–81. https://doi.org/10.17781/P002559
Imam Riadi, Abdul Fadlil, & Muhammad Immawan Aulia. (2020). Investigasi Bukti Digital Optical Drive Menggunakan Metode National Institute of Standard and Technology (NIST). Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), 4(5), 820–828. https://doi.org/10.29207/resti.v4i5.2224
Jafri, M. S., Raharjo, S., & Arief, M. R. (2022). Implementation of ACPO Framework for Digital Evidence Acquisition in Smartphones. CCIT Journal, 15(1), 82–105. https://doi.org/10.33050/ccit.v15i1.1586
Mahendra, B. A., Utomo, Y. B., & Kurniadi, H. (2024). Implementasi Metode Forensik Jaringan Untuk Memonitoring Komputer Windows Server. Journal of Information System and Computer, 3(1), 1–8. https://doi.org/10.32503/jiscomp.v3i1.5912
Malpani, R., Pande, A., & Deshmukh, Ms. S. (2025). Cyber Espionage Against Critical Infrastructure: A Case Study of Targeted Attacks on Indian State Load Dispatch Centres (SLDCs). International Journal Of Scientific Research In Engineering And Management, 09(06), 1–9. https://doi.org/10.55041/IJSREM.NCFT013
Mpungu, C., George, C., & Mapp, G. (2024). Digital Forensics Readiness in Big Data Wireless Networks: A Novel Framework and Incident Response Script for Linux-Hadoop Environments. Computer Science and Mathematics. https://doi.org/10.20944/preprints202407.1803.v1
Mu’Minin, M., & Anwar, N. (2020). Live Data Forensic Artefak Internet Browser (Studi Kasus Google Chrome, Mozilla Firefox, Opera Mode Incognito). Buletin Sistem Informasi Dan Teknologi Islam (BUSITI), 1(3), 130–138. https://doi.org/10.33096/busiti.v1i3.834
Rasyad, Grinaldy Yafi’, Dedy Hariyadi, and Tri Febrianto. “Analisis Lalu Lintas Jaringan Terenkripsi dari Secure Instant Messaging Application: Studi Kasus pada Aplikasi Pesan Instan Synology Chat.” Cyber Security dan Forensik Digital 5, no. 2 (2023): 71–76. https://doi.org/10.14421/csecurity.2022.5.2.3935.
Prawira, Y. P., & Samsudin, S. (2022). Live Forensics Analysis Of Malware Identified Email Crimes To Increase Evidence Of Cyber Crime. Digital Zone: Jurnal Teknologi Informasi Dan Komunikasi, 13(2). https://doi.org/10.31849/digitalzone.v13i12.11570
Putra, I., Prayudi, Y., & Luthfi, A. (n.d.). Live Forensics untuk mengenali Karakteristik Serangan File Upload Guna Meningkatkan Keamanan pada Web Server | JIIP - Jurnal Ilmiah Ilmu Pendidikan. Retrieved February 17, 2026, from http://jiip.stkipyapisdompu.ac.id/jiip/index.php/JIIP/article/view/2173
Putra, I., Prayudi, Y., & Luthfi, A. (2023). Live Forensics untuk mengenali Karakteristik Serangan File Upload Guna Meningkatkan Keamanan pada Web Server: Indonesia. JIIP - Jurnal Ilmiah Ilmu Pendidikan, 6(6), 4387–4394. https://doi.org/10.54371/jiip.v6i6.2173
Raharja, R., Alwi, E. I., & Gaffar, A. W. M. (2024). Analisis Digital Forensic Pada Aplikasi Whatsapp Menggunakan Metode National Institute Of Justice (Nij) Pada Smartphone Android. Buletin Sistem Informasi dan Teknologi Islam, 5(2), 160–168. https://doi.org/10.33096/busiti.v5i2.2180
Rasyad, G. Y., Hariyadi, D., & Febrianto, T. (n.d.). Analysis Of Encrypted Network Traffic From Secure Instant Messaging Application: Case Study On Synology Chat Instant Message Application.
Rasyad, G. Y., Hariyadi, D., & Febrianto, T. (2023). Analisis Lalu Lintas Jaringan Terenkripsi dari Secure Instant Messaging Application: Studi Kasus pada Aplikasi Pesan Instan Synology Chat. Cyber Security dan Forensik Digital, 5(2), 71–76. https://doi.org/10.14421/csecurity.2022.5.2.3935
Riadi, I., Sunardi, S., & Rauli, M. E. (2018). Identifikasi Bukti Digital WhatsApp pada Sistem Operasi Proprietary Menggunakan Live Forensics. Jurnal Teknik Elektro, 10(1), 18–22. https://doi.org/10.15294/jte.v10i1.14070
Sunardi, S., Riadi, I., & Triyanto, J. (2021). Analisis Forensik Layanan Signal Private Messenger pada Smartwatch Menggunakan Metode National Institute of Justice. JEPIN (Jurnal Edukasi dan Penelitian Informatika), 7(3), 305–313. https://doi.org/10.26418/jp.v7i3.47740
Utami, S. D., Carudin, C., & Ridha, A. A. (2021). Analisis Live Forensic Pada Whatsapp Web Untuk Pembuktian Kasus Penipuan Transaksi Elektronik. Cyber Security dan Forensik Digital, 4(1), 24–32. https://doi.org/10.14421/csecurity.2021.4.1.2416
Wibowo, M., Firmansyah, M. R., & Efendi, R. S. (2024). Analisis Bukti Digital Pada Aplikasi Discord Desktop Dengan Menggunakan Framework Dfrws: Live Forensic Discord Desktop Application with DFRWS Framework. JURNAL TEKNOLOGI INFORMASI DAN KOMUNIKASI, 15(1), 98–111. https://doi.org/10.51903/jtikp.v15i1.826
Yahya, A. Z., Dirman, Buru, D. J., & Sugiantoro, B. (2022). Analisis Bukti Digital Pada Random Access Memory Android Menggunakan Metode Live Forensic Kasus Penjualan Senjata Illegal. Cyber Security dan Forensik Digital, 5(1), 6–11. https://doi.org/10.14421/csecurity.2022.5.1.1724
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2026 Ryan Achmad Antama, Abdul Hadi, Maura Widyaningsih

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Copyright :
By submitting manuscripts to Jurnal Saintekom : Sains, Teknologi, Komputer dan Manajemen, the author agrees with this policy. No specific document approval is required.
- The copyright in each article belongs to the author.
- Authors retain all their rights to the published work, not limited to the rights set forth in this page.
- Authors acknowledge that Saintekom Journal: Science, Technology, Computers and Management as the first to publish under the Creative Commons Attribution 4.0 International license (CC BY-SA).
- The author may submit the paper separately, arrange for non-exclusive distribution of the manuscript that has been published in this journal into other versions (e.g. sent to the author's institutional respository, publication into a book, etc.), by acknowledging that the manuscript has been first published Jurnal Saintekom : Sains, Teknologi, Komputer dan Manajemen;
- The author warrants that the article is original, written by the named author, has not been previously published, contains no unlawful statements, does not infringe the rights of others, is subject to copyright exclusively held by the author.
- If the article is jointly prepared by more than one author, each author submitting the manuscript warrants that he or she has been authorized by all co-authors to agree to copyright and license notices (agreements) on their behalf, and agrees to inform co-authors of the terms of this policy. Jurnal Saintekom : Sains, Teknologi, Komputer dan Manajemen will not be held liable for anything that may arise due to internal author disputes.
Lisensi :
Jurnal Saintekom : Sains, Teknologi, Komputer dan Manajemen is published under the terms of the Creative Commons Attribution 4.0 International License (CC BY-SA). This license permits anyone to:.
- Share - copy and redistribute this material in any form or format;
- Adaptation - modify, alter, and create derivatives of this material for any purpose.
- Attribution - you must give appropriate credit, include a link to the license, and state that changes have been made. You may do this in any appropriate manner, but it does not imply that the licensor endorses you or your use.
- Similar Sharing - If you modify, alter, or create a derivative of this material, you must distribute your contribution under the same license as the original material.
Most read articles by the same author(s)
- Maura Widyaningsih, Identifikasi Kematangan Buah Apel Dengan Gray Level Co-Occurrence Matrix (GLCM) , Jurnal Saintekom : Sains, Teknologi, Komputer dan Manajemen: Vol. 6 No. 1 (2016): Maret 2016
- Maura Widyaningsih, Rio Gunadi, Dempster Shafer Untuk Sistem Diagnosa Gejala Penyakit Kulit Pada Kucing , Jurnal Saintekom : Sains, Teknologi, Komputer dan Manajemen: Vol. 7 No. 1 (2017): March 2017
- Anisa Febriyana Putri, Abdul Hadi, Lili Rusdiana, Analisis Trafik Jaringan menggunakan Wireshark untuk Deteksi Serangan Deauthentication pada Perangkat Kamera Wi-Fi , Jurnal Saintekom : Sains, Teknologi, Komputer dan Manajemen: Vol. 15 No. 2 (2025): September 2025
- Abdul Hadi, Herkules Herkules, Siti Maryamah, Integrasi Penyimpanan Data dan Keamanan Jaringan Kantor KEMENAG Menggunakan Metode PPDIOO , Jurnal Saintekom : Sains, Teknologi, Komputer dan Manajemen: Vol. 15 No. 2 (2025): September 2025
- Restu Bumi Ryan Ramadhan, Abdul Hadi, Siti Maryamah, Optimasi Proses Deployment dengan Blue-Green Deployment Berbasis Containerization untuk Mencapai Zero Downtime , Jurnal Saintekom : Sains, Teknologi, Komputer dan Manajemen: Vol. 15 No. 2 (2025): September 2025
- Muhamad Denhas Effendi, Ketut Bayu Bintoro, Maura Widyaningsih, Analisis Simulasi Routing AODV Adaptif dengan Learning Automata untuk Komunikasi V2V , Jurnal Saintekom : Sains, Teknologi, Komputer dan Manajemen: Vol. 15 No. 1 (2025): Maret 2025
- Ai Dina Agustin, Abdul Hadi, Suratno Suratno, Strategi Test-Driven Development dalam Arsitektur Microservices untuk Optimalisasi Pengembangan Aplikasi Payroll , Jurnal Saintekom : Sains, Teknologi, Komputer dan Manajemen: Vol. 16 No. 1 (2026): Maret 2026


