FORENSIC RECOVERY ANALYSIS OF LOST RAID 0 CONFIGURATION ON NETWORK ATTACHED STORAGE AS EVIDENCE IN COURT

  • Dani Prawira Master of Electrical Engineering, Faculty of Engineering, Universitas Mercu Buana, Jakarta Indonesia
  • Beny Nugraha Technische Universität Chemnitz, Germany
  • Marza Ihsan Marzuki Department of Electrical Engineering, Faculty of Industrial Technology, Universitas Pertamina, Indonesia
Keywords: Digital Forensics, Electronic Evidence, Raid 0, Raid Reconstruction, Raid Recovery

Abstract

In the modern world of globalization, Digital Forensic science has emerged as a pivotal investigative tool for solving complex cases. This discipline proves particularly effective in deciphering digital evidence. In this study, we ventured to examine a Network Area Storage (NAS) device, specifically one containing three hard disks. Our objective was to validate that the Hash value generated before the duplication process matches identically with the Hash value post-imaging or duplication. Our findings demonstrate that through reconfiguration and recovery of RAID 0, previously deleted files can be restored using the methods outlined in our research. In essence, this study establishes that: (1) Reconstruction of RAID configurations is feasible, (2) Recovery of deleted files from a RAID 0 system is achievable, and (3) Such restored data can serve as admissible evidence in court.

Downloads

Download data is not yet available.

References

Ramazan OĞUZ, Yiğithan YILMAZ, “Investigation of RAID Systems in Terms of Forensics”, 2023, AJIT-e: Academic Journal of Information Technology, 14 (53) , 142-161.

Edgar Joseph Ronny Pangaribuan, “Keamanan Informasi dan Tren Serangan Tahun 2022”, 2022, https://www.djkn.kemenkeu.go.id/kpknl-medan/baca-artikel/15179/Keamanan-Informasi-dan-Tren-Serangan-Tahun-2022.html, (Accessed Aug 18, 2022)

Seagate, “Apa itu NAS (Network Attached Storage) dan Mengapa NAS Penting untuk Usaha Kecil?”, 2022, https://www.seagate.com/id/id/tech-insights/what-is-nas-master-ti/ (Accessed Sept 20, 2022)

Ravi Kumar M G, Ayudh Nagaraj, Benjamin Paul, Sharat P Dixit, “Network Attached Storage: Data Storage Applications”, 2021, Turkish Journal of Computer and Mathematics Education Vol.12 No.12 (2021) 2385-2396.

Christianingrum R., Aida A., “Tantangan Penguatan Keamanan Siber dalam Menjaga Stabilitas Keamanan”, 2021, Analisis RUU Tentang APBN No. 13/an.PKA/APBN/IX/2021, Pusat Kajian Anggaran Badan Keahlian Sekretariat Jenderal Dewan Perwakilan Rakyat Republik Indonesia

Iman, N., Susanto, A. and Inggi, R., “Analisa Perkembangan Digital Forensik dalam Penyelidikan Cybercrime di Indonesia (Systematic Review)”, 2020, Jurnal Telekomunikasi dan Komputer, 9(3), p.186.

Jayantari, I.G.A.S. and Sugama, I.D.G.D., “Kekuatan Alat Bukti Dokumen Elektronik dalam Tindak Pidana Berbasis Teknologi dan Informasi (Cyber Crime)”, 2019, e-Jurnal Ilmu Hukum Kertha Wicara, 8(6), pp.1–16.

Ivanović, A., “The Way of Handling Evidence of Criminal Offences of Computer Crime”, 2018, Criminal Justice and Security in Central and Eastern Europe.

Hyunji Chung, Jungheum Park, Sangjin Lee, Chulhoon Kang. “Digital Forensic Investigation of Cloud Storage Services” 2017, 1709.10395. https://arxiv.org/ftp/arxiv/papers/1709/

Handoko, C., “Kedudukan Alat Bukti Digital dalam Pembuktian Cybercrime di Pengadilan”. 2016, Jurisprudence, 6(1), pp.1–15.

Kartika Imam Santoso, Muhamad Abdul Muin. “Implementasi Network Attached Storage (NAS) menggunakan NAS4Free untuk Media Backup File”. 2015, Scientific Journal of Informatics Vol. 2, No.2, November 2015 e-ISSN 2460-0040.

Granja, F.M. and Rafael, G.D.R, “Preservation of Digital Evidence: Application in Criminal Investigation. In: 2015 Science and Information Conference (SAI)”, 2015, Science and Information Conference (SAI). London, United Kingdom: IEEE.pp.1284–1292.

Sun, J.-R., Shih, M.-L. and Hwang, M.-S, “A Survey of Digital Evidences Forensic and Cybercrime Investigation Procedure. International Journal of Network Security”, 17(4), pp.497–509.2015

Budi Rahardjo, “Sekilas Mengenai Forensik Digital”, 2013, Jurnal Sosioteknologi, FSRD-ITB, Edisi 29, Tahun 12, Agustus 2013, hal 384-387.

K. K. Sindhu, Dr. B. B. Meshram, “Digital Forensic Investigation Tools and Procedures”, 2012, I.J. Computer Network and Information Security, 2012, 4, 39-48.

Kailash Kumar, Sanjeev Sofat, S.K.Jain, Naveen Aggarwal. “Significance of Hash Value Generation in Digital Forensic”, 2012, International Journal of Engineering Research and Development Volume 2, Issue 5, PP.64-70 e-ISSN: 2778-067X.

G. C. Kessler, “Advancing the Science of Digital Forensics, in Computer”, 2012, vol. 45, no. 12, page. 25-27, Des. 2012, doi: 10.1109/MC.2012.399.

Vassil Roussev, “Hashing and Data Finger printing in Digital Forensics.”, 2012, ieeexplore.ieee.org ieee security and privacy PP.49-551540-7993/09

Vincent Urias, Curtis Hash, Lorie M. Liebrock, “Consideration of Issues for Parallel Digital Forensics of RAID Systems”. 2009, Journal of Digital Forensic Practice P-ISSN: 1556-7281 ISSN: 1556-7346.

Harish Daiya, Maximillian Dornseif, Felix C. Freiling, “Testing Forensic Hash Tools on Sparse Files”, 2007, ieeexplore.ieee.org IMF 2007, Stuttgart.

M. Steve, “The Impact of RAID on Disc Imaging, National Institute of Standards and Technology”, 2005, page.11

Published
2023-08-21
How to Cite
[1]
D. Prawira, B. Nugraha, and M. I. Marzuki, “FORENSIC RECOVERY ANALYSIS OF LOST RAID 0 CONFIGURATION ON NETWORK ATTACHED STORAGE AS EVIDENCE IN COURT”, J. Tek. Inform. (JUTIF), vol. 4, no. 4, pp. 867-873, Aug. 2023.