Analisis Forensik pada Pemalsuan Email menggunakan Metode National Institute of Justice (NIJ)
DOI:
https://doi.org/10.55606/juisik.v5i2.1452Keywords:
Cybersecurity, Digital Forensics, Email Spoofing, Header Analysis, NIJ MethodAbstract
Email spoofing is a form of cybercrime that often occurs by taking advantage of weaknesses in email protocols to deceive recipients through spoofing sender identities. This attack is a serious threat because it can be used to commit fraud, data theft, and the spread of malware. This study aims to analyze email spoofing cases with a digital forensic approach using the National Institute of Justice (NIJ) methodology, which includes five important stages: identification, collection, examination, analysis, and reporting. The main problem studied is the difficulty of detecting fake emails on internal networks that have not implemented modern email authentication mechanisms such as the Sender Policy Framework (SPF), DomainKeys Identified Mail (DKIM), and Domain-based Message Authentication, Reporting & Conformance (DMARC). The research method used was qualitative, experimental, with controlled simulation. Some of the tools used in this experiment include Postfix, SWAKS, tcpdump, and Mozilla Thunderbird. In simulations, fake billing emails are sent from fake addresses (e.g. [email protected]) through an open SMTP service to see the extent to which spoofing can be done without being detected. During this process, email traffic is recorded, and various digital artifacts such as .eml files, .pcap packet captures, SMTP logs, and PDF attachments are successfully collected for further analysis. The results of forensic analysis showed that there were inconsistencies in the email headers, especially in the Return-Path, From, and Received fields, which were the main indicators of spoofing activity. This study proves that email spoofing is very likely to occur on unprotected systems, so strengthening email server configuration and implementing authentication is an important step. In addition, the NIJ method has proven to be effective in providing a systematic and valid forensic investigation structure, and can be a reference in handling email-based cybercrime cases in the future.
References
Anabelle, Z. D., Lamada, M., Zain, S. G., Komputer, T., Makassar, U. N., & Kunci, K. (2024). Investigasi forensik email dengan berbagai pendekatan dan tools. Jurnal Teknologi Komputer, 2(September), 78–89.
Angelone, M. D., & Monaghan, M. (2022). Email spoofing defence techniques: A comprehensive review and development of a novel measurement tool [Tesis, University of Liverpool].
Anwar, N., Widodo, A. M., Sekti, B. A., Ulum, M. B., Rahaman, M., & Ariessanti, H. D. (2024). Comparative analysis of NIJ and NIST methods for microSD investigations: A technopreneur approach. Aptisi Transactions on Technopreneurship (ATT), 6(2), 169–181. https://doi.org/10.34306/att.v6i2.407
Aryasatya, M. A., & Wibawa, A. (2022). Dampak perkembangan teknologi pada era society 5.0 terhadap lapangan pekerjaan. Jurnal Inovasi Teknologi dan Edukasi Teknik, 2(3), 108–112. https://doi.org/10.17977/um068v2i32022p108-112
Ath-thaariq, M. R., Nurnawati, E. K., & Ariyana, R. Y. (2023). Perancangan otentikasi one time password menggunakan kode unik via email. Jurnal Keamanan Siber, 12(1), 70–78.
Bachri, C. M., & Gunawan, W. (2024). Deteksi email spam menggunakan algoritma convolutional neural network (CNN). JEPIN (Jurnal Edukasi dan Penelitian Informatika), 10(1), 88–94.
Chen, S., Hao, M., Ding, F., Jiang, D., Dong, J., Zhang, S., Guo, Q., & Gao, C. (2023). Exploring the global geography of cybercrime and its driving forces. Humanities and Social Sciences Communications, 10(1). https://doi.org/10.1057/s41599-023-01560-x
DataReportal. (2025). Global digital insights. https://www.datareportal.com
Haeruddin, H. (2024). Sistem pengendali alat elektronik rumah tangga berbasis Internet of Things (IoT) menggunakan voice recognition. Journal of System and Computer Engineering (JSCE), 5(1), 56–65. https://doi.org/10.61628/jsce.v5i1.1063
Ihekweazu, E. (2025). Digital forensics in action: A case study of tracing cybercriminals behind job offer spear phishing scams in academic institutions. https://www.cybercrimejournal.org
Liu, E., Akiwate, G., Jonker, M., Mirian, A., Ho, G., Voelker, G. M., & Savage, S. (2023). Forward pass: On the security implications of email forwarding mechanism and policy. Proceedings - 8th IEEE European Symposium on Security and Privacy (Euro S&P 2023), 373–391. https://doi.org/10.1109/EuroSP57164.2023.00030
Marcellino, S., Seta, H. B., & Widi, I. W. (2023). Analisis forensik digital recovery data smartphone pada kasus penghapusan berkas menggunakan metode National Institute of Justice (NIJ). Informatik: Jurnal Ilmu Komputer, 19(2), 141–156. https://doi.org/10.52958/iftk.v19i2.4676
Maulana, M. (2023). Klasifikasi serangan jaringan menggunakan support vector machine untuk investigasi forensik jaringan.
Meshram, B. B., Mendhe, V., & Singh, M. K. (2024). Tracing the invisible threads: A deep dive into email security & forensics. Cybersecurity Journal, January.
Neha, K. V., John, J. A., & Sajan, V. (2025). Enhancing email forensic analysis with deep learning and semantic techniques: A literature review. International Journal of Forensic Computing, 89–94.
Pemikiran, J., Ilmiah, M., Agribisnis, B., Di, K., & Pt, A. (2023). The influence of marketing mix on consumer purchasing decisions in the PT XYZ. Mimbar Agribisnis, 9(2), 2279–2293.
Prabakaran, M. K., Meenakshi Sundaram, P., & Chandrasekar, A. D. (2023). An enhanced deep learning-based phishing detection mechanism to effectively identify malicious URLs using variational autoencoders. IET Information Security, 17(3), 423–440. https://doi.org/10.1049/ise2.12106
Prado, P. V., Arechiga, C., Marson, K., Oviedo, Y., Vizcaíno, T., Gomez, M., Alvarez, A., Jimenez-Diecks, L., Guevara, S., Nava, A., Lopez, Z., Carrera, O., Hypes, R., Marquez, C., & Chamie, G. (2024). Indications of digital literacy during Latino-focused, community-based COVID-19 testing implementation. JAMIA Open, 7(4). https://doi.org/10.1093/jamiaopen/ooae115
Rahma, Z., & Riadi, I. (2022). Email forensic from phishing attack using network forensics development life cycle method. International Journal of Computer Applications, 183(46), 36–42. https://doi.org/10.5120/ijca2022921865
Rusydi, R., Hendrik, B., & Amri, Y. (n.d.). Forensik digital pengiriman e-mail spam terhadap keamanan cyber di Indonesia. Jurnal Keamanan Siber, 18(2), 9–15.
Saputra, E., & Misinem. (n.d.). Investigation digital forensic terhadap serangan email spoofing pada PT KAI DIVRE III. Jurnal Forensik Digital, 1–10.
Saskara, G. A. J., Edy Listartha, I. M., Dharma Putra, I. P. S., & Arijaya Kusuma, K. A. (2024). Evaluasi kualitas jaringan Undiksha Harmoni dengan menggunakan metode quality of service. Jurnal Teknologi dan Informasi, 14(1), 50–61. https://doi.org/10.34010/jati.v14i1.11993
The Internet Crime Complaint Center. (2024). Federal Bureau of Investigation Internet Crime Report, 2024. https://www.ic3.gov/
Widodo, T., & Aji, A. S. (2022). Pemanfaatan network forensic investigation framework untuk mengidentifikasi serangan jaringan melalui intrusion detection system (IDS). JISKA (Jurnal Informatika Sunan Kalijaga), 7(1), 46–55. https://doi.org/10.14421/jiska.2022.7.1.46-55
Wintolo, H., Riadi, I., & Yudhana, A. (2025). Analisis deteksi penyusup pada layanan Open Journal System menggunakan metode Network Forensic Development Life Cycle. Jurnal Forensik Jaringan, 8, 133–144.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Jurnal ilmiah Sistem Informasi dan Ilmu Komputer

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.