Analisis Bukti Digital pada Private Chat Synology Menggunakan Metode Live Forensik

Authors

  • Ryan Achmad Antama Teknik Informatika, STMIK Palangkaraya
  • Abdul Hadi Teknik Informatika, STMIK Palangkaraya
  • Maura Widyaningsih Teknik Informatika, STMIK Palangkaraya

DOI:

https://doi.org/10.33020/saintekom.v16i1.1016

Keywords:

Synology Chat, NAS, network live forensics, NIST, digital evidence

Abstract

The adoption of Network Attached Storage (NAS) based private communication platforms such as Synology Chat is increasing in organizations and may store valuable digital evidence. However, encryption and closed system architecture can limit evidence acquisition using conventional forensic approaches. This study applies network live forensics by proactively capturing network traffic and analyzing capture files to recover deleted chat messages and transferred files. The investigation follows the National Institute of Standards and Technology NIST framework consisting of collection, examination, analysis, and reporting using digital evidence including packet capture PCAP or packet capture next generation PCAPNG files, communication artifacts, and reconstructed file objects. An experimental method is conducted by comparing server-side capturing via Secure Shell SSH on the NAS server and external capturing from a device within the same Local Area Network LAN. Results show that server-side capturing is more effective for file reconstruction and message recovery under certain conditions, while external capturing provides limited artifacts and cannot reveal plain text messages.

Downloads

Download data is not yet available.

References

Aini, F. D., Peryanto, A., & Widodo, Y. F. (2025). Analisis Forensik Jaringan pada Router Berbasis Log Menggunakan Metode Live Forensic. Jurnal Kolaborasi Riset Sarjana, 2(2), 29–35.

Fahrudin, A., & Zaida Muflih, G. (2024). Analisis Forensik Digital Pada Pesan Whatsapp Yang Terenkripsi Dengan Pretty Good Privacy (Pgp) Menggunakan Framework Dfrws. Jati (Jurnal Mahasiswa Teknik Informatika), 9(1), 780–787. https://doi.org/10.36040/jati.v9i1.12506

Fitriani Shabira, A., & Fachri, F. (2025). Analisis Forensik Digital Pada File Steganografi Menggunakan Ftk Imager Dan Winhex Dalam Kasus Peredaran Narkoba Dengan Live Forensics. Rabit?: Jurnal Teknologi Dan Sistem Informasi Univrab, 10(2), 228–240. https://doi.org/10.36341/rabit.v10i2.6020

Hendrawan, M. Y. F., Subektiningsih, S., & Hadinegoro, A. (2023). Analisis Bukti Digital Pada Discord Browser Menggunakan Teknik Live Forensic Dengan Metode NIST SP 800-86. Jurnal Infomedia, 8(2), 94. https://doi.org/10.30811/jim.v8i2.4764

Hildayanti, N., & Riadi, I. (2019). Forensics Analysis of Router On Computer Networks Using Live Forensics Method. International Journal of Cyber-Security and Digital Forensics, 8, 74–81. https://doi.org/10.17781/P002559

Imam Riadi, Abdul Fadlil, & Muhammad Immawan Aulia. (2020). Investigasi Bukti Digital Optical Drive Menggunakan Metode National Institute of Standard and Technology (NIST). Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), 4(5), 820–828. https://doi.org/10.29207/resti.v4i5.2224

Jafri, M. S., Raharjo, S., & Arief, M. R. (2022). Implementation of ACPO Framework for Digital Evidence Acquisition in Smartphones. CCIT Journal, 15(1), 82–105. https://doi.org/10.33050/ccit.v15i1.1586

Mahendra, B. A., Utomo, Y. B., & Kurniadi, H. (2024). Implementasi Metode Forensik Jaringan Untuk Memonitoring Komputer Windows Server. Journal of Information System and Computer, 3(1), 1–8. https://doi.org/10.32503/jiscomp.v3i1.5912

Malpani, R., Pande, A., & Deshmukh, Ms. S. (2025). Cyber Espionage Against Critical Infrastructure: A Case Study of Targeted Attacks on Indian State Load Dispatch Centres (SLDCs). International Journal Of Scientific Research In Engineering And Management, 09(06), 1–9. https://doi.org/10.55041/IJSREM.NCFT013

Mpungu, C., George, C., & Mapp, G. (2024). Digital Forensics Readiness in Big Data Wireless Networks: A Novel Framework and Incident Response Script for Linux-Hadoop Environments. Computer Science and Mathematics. https://doi.org/10.20944/preprints202407.1803.v1

Mu’Minin, M., & Anwar, N. (2020). Live Data Forensic Artefak Internet Browser (Studi Kasus Google Chrome, Mozilla Firefox, Opera Mode Incognito). Buletin Sistem Informasi Dan Teknologi Islam (BUSITI), 1(3), 130–138. https://doi.org/10.33096/busiti.v1i3.834

Rasyad, Grinaldy Yafi’, Dedy Hariyadi, and Tri Febrianto. “Analisis Lalu Lintas Jaringan Terenkripsi dari Secure Instant Messaging Application: Studi Kasus pada Aplikasi Pesan Instan Synology Chat.” Cyber Security dan Forensik Digital 5, no. 2 (2023): 71–76. https://doi.org/10.14421/csecurity.2022.5.2.3935.

Prawira, Y. P., & Samsudin, S. (2022). Live Forensics Analysis Of Malware Identified Email Crimes To Increase Evidence Of Cyber Crime. Digital Zone: Jurnal Teknologi Informasi Dan Komunikasi, 13(2). https://doi.org/10.31849/digitalzone.v13i12.11570

Putra, I., Prayudi, Y., & Luthfi, A. (n.d.). Live Forensics untuk mengenali Karakteristik Serangan File Upload Guna Meningkatkan Keamanan pada Web Server | JIIP - Jurnal Ilmiah Ilmu Pendidikan. Retrieved February 17, 2026, from http://jiip.stkipyapisdompu.ac.id/jiip/index.php/JIIP/article/view/2173

Putra, I., Prayudi, Y., & Luthfi, A. (2023). Live Forensics untuk mengenali Karakteristik Serangan File Upload Guna Meningkatkan Keamanan pada Web Server: Indonesia. JIIP - Jurnal Ilmiah Ilmu Pendidikan, 6(6), 4387–4394. https://doi.org/10.54371/jiip.v6i6.2173

Raharja, R., Alwi, E. I., & Gaffar, A. W. M. (2024). Analisis Digital Forensic Pada Aplikasi Whatsapp Menggunakan Metode National Institute Of Justice (Nij) Pada Smartphone Android. Buletin Sistem Informasi dan Teknologi Islam, 5(2), 160–168. https://doi.org/10.33096/busiti.v5i2.2180

Rasyad, G. Y., Hariyadi, D., & Febrianto, T. (n.d.). Analysis Of Encrypted Network Traffic From Secure Instant Messaging Application: Case Study On Synology Chat Instant Message Application.

Rasyad, G. Y., Hariyadi, D., & Febrianto, T. (2023). Analisis Lalu Lintas Jaringan Terenkripsi dari Secure Instant Messaging Application: Studi Kasus pada Aplikasi Pesan Instan Synology Chat. Cyber Security dan Forensik Digital, 5(2), 71–76. https://doi.org/10.14421/csecurity.2022.5.2.3935

Riadi, I., Sunardi, S., & Rauli, M. E. (2018). Identifikasi Bukti Digital WhatsApp pada Sistem Operasi Proprietary Menggunakan Live Forensics. Jurnal Teknik Elektro, 10(1), 18–22. https://doi.org/10.15294/jte.v10i1.14070

Sunardi, S., Riadi, I., & Triyanto, J. (2021). Analisis Forensik Layanan Signal Private Messenger pada Smartwatch Menggunakan Metode National Institute of Justice. JEPIN (Jurnal Edukasi dan Penelitian Informatika), 7(3), 305–313. https://doi.org/10.26418/jp.v7i3.47740

Utami, S. D., Carudin, C., & Ridha, A. A. (2021). Analisis Live Forensic Pada Whatsapp Web Untuk Pembuktian Kasus Penipuan Transaksi Elektronik. Cyber Security dan Forensik Digital, 4(1), 24–32. https://doi.org/10.14421/csecurity.2021.4.1.2416

Wibowo, M., Firmansyah, M. R., & Efendi, R. S. (2024). Analisis Bukti Digital Pada Aplikasi Discord Desktop Dengan Menggunakan Framework Dfrws: Live Forensic Discord Desktop Application with DFRWS Framework. JURNAL TEKNOLOGI INFORMASI DAN KOMUNIKASI, 15(1), 98–111. https://doi.org/10.51903/jtikp.v15i1.826

Yahya, A. Z., Dirman, Buru, D. J., & Sugiantoro, B. (2022). Analisis Bukti Digital Pada Random Access Memory Android Menggunakan Metode Live Forensic Kasus Penjualan Senjata Illegal. Cyber Security dan Forensik Digital, 5(1), 6–11. https://doi.org/10.14421/csecurity.2022.5.1.1724

Downloads

PlumX Metrics

Published

31-03-2026

How to Cite

Achmad Antama, Ryan, Abdul Hadi, and Maura Widyaningsih. 2026. “Analisis Bukti Digital Pada Private Chat Synology Menggunakan Metode Live Forensik”. Jurnal Saintekom : Sains, Teknologi, Komputer Dan Manajemen 16 (1):85-98. https://doi.org/10.33020/saintekom.v16i1.1016.

Issue

Section

Articles

Most read articles by the same author(s)