Spamming forensic analysis using Network Forensics Development Life Cycle Method

Imam, Riadi and Sunardi, Sunardi and Fitriyani, Tella (2022) Spamming forensic analysis using Network Forensics Development Life Cycle Method. Intensif : Jurnal Ilmiah Penelitian dan Penerapan Teknologi Sistem Informasi, 6 (1): 9. pp. 108-117. ISSN 2549-6824 (Online) 2580-409X (Print)

[thumbnail of Jurnal_Imam Riadi_Universitas Ahmad Dahlan_2022-9.pdf]
Jurnal_Imam Riadi_Universitas Ahmad Dahlan_2022-9.pdf

Download (506kB) | Preview


E-mail is electronic mail used to send files, pictures, and others easily and quickly. However, as time goes by, there is a lot of misuse of e-mail, causing inconvenience to the recipient. One of them is spam e-mail sent to many people without prior permission from the intended owner. Hackers can forge e-mail headers anonymously for malicious purposes. The research object is to simulate sending spamming e-mails to 1 victim with a total of 40 spamming e-mails. The research follows the flow of the Network Forensics Development Life Cycle (NFDLC) method with the stages of initiation, acquisition, implementation,operation, and disposition. Simulation of sending e-mail using easy e-mail spammer tools and testing of e-mail using Wireshark tools. The test results show that 40 e-mails were successfully
received or entered into the victim's inbox, and the test was successfully carried out by getting results based on predetermined parameters. The parameter is the IP address of the sender or spammer found is, the victim's IP address is

Item Type: Article
Uncontrolled Keywords: Network Forensics Development Life Cycle (NFDLC), Email spamming, Easy email spammer, Wireshark
Subjects: Computers, Control & Information Theory > Computer Software
Depositing User: - Dina -
Date Deposited: 11 Jul 2023 04:34
Last Modified: 11 Jul 2023 04:34

Actions (login required)

View Item
View Item