Network Forensic Approach in Data Breach Crime Investigation

Main Article Content

Kurnia Rahmasari
Aghastyar Aghastyar
Bryan Idias
Caelsea Asalyandira Azzahra
Irfan Hakim
Ingrid Bianty Rahmawati
Nimrod Welly Bello
Tri Susanti
Tri Widyasto Prabowo
Yuni Priskila Ginting

Abstract

This study aims to analyze the application of a network forensics approach in data breach crime investigations and examine its technical and legal implications. The method used is a qualitative approach through case studies, network log analysis, and a literature review. The research object focuses on the 2021 Microsoft Exchange Server attack case to reconstruct the attack chronology based on network artifacts. The results show that network forensics is effective in systematically identifying attack stages, from initial activity to data exfiltration, and is able to uncover communication patterns and attack methods used by perpetrators. However, challenges arise from the use of anonymity and encryption techniques that complicate the investigation process. From a legal perspective, the analysis results can be used as digital evidence in proving cybercrime in accordance with applicable laws and regulations. This study also emphasizes the importance of forensic readiness in organizations through network monitoring, log management, and the utilization of open information. Thus, network forensics plays a crucial role not only in investigations but also in overall cybersecurity strategies.

Downloads

Download data is not yet available.

Article Details

How to Cite
Rahmasari, K., Aghastyar Aghastyar, Idias, B., Azzahra, C. A., Hakim, I., Rahmawati, I. B. ., Bello, N. W., Susanti, T. ., Prabowo, T. W., & Ginting, Y. P. (2026). Network Forensic Approach in Data Breach Crime Investigation. International Journal of Health Engineering and Technology, 5(1). https://doi.org/10.55227/ijhet.v5i1.738
Section
Technology

References

Aditya, K. M. S., & Yudiantara, I. G. N. N. K. (2025). Criminological analysis of personal data theft crimes in the digital era.Journal of Academic Media (JMA), 3(2).

Addari, M. A., Siregar, G. R., Lubis, A. B., Ariestia, C. I., & Zatalini, Z. (2026). Literature study on the evolution of computer viruses: Spread mechanisms, forensic investigations, and artificial intelligence-based detection strategies.JIKUM: Journal of Computer Science, 2(1), 22–25.

Azizah, S., Ula, Z. N., Mutiara, D., & Prameswari, M. P. (2024). Cybersecurity as the foundation for developing mobile financial applications: A literature study on cybercrime and its mitigation.Accounting and Information Technology, 17(2), 221–237.

Fanani, G. P. I., Luthfiana, D. A., Pramurwitasari, A., Najich, M. N., & Putra, A. T. (2026). Analysis of network traffic patterns during DDoS attacks using Snort IDS.Scientific: Journal of Computer Science and Informatics, 3(1), 10–23.

Firmansyah, R. A. (2025).Digital forensic readiness and information security management system integration framework in government environment(Doctoral dissertation, Islamic University of Indonesia).

Mahendra, B. A., Utomo, Y. B., & Kurniadi, H. (2024). Implementation of network forensic methods for monitoring Windows Server computers.Journal of Information System and Computer, 3(1), 1–8.

Mursyid, M., Putera, A., & Jannah, M. (2025). Reconstructing the role of digital forensics in cybercrime investigations: A critical analysis of the construction of criminal law in Indonesia.Tana Mana Journal, 6(2), 289–296.

Nababan, F. E., & Sumardiana, B. (2025). The crime of personal data theft through cyber phishing and its evidentiary system in court: A study of Decision No. 697/Pid. Sus/2024/PN. Sda.Bookchapter Law and Environment, 1, 627–650.

Niam, M. F., Rumahlewang, E., Umiyati, H., Dewi, N. P. S., Atiningsih, S., Haryati, T., ... & Wajdi, F. (2024).Qualitative research methods.

Rahman, R., Inayah, F. M. N., & Apriyani, D. (2026). Digital forensic analysis of malware attack incidents on operating systems.INOMATEC: Journal of Innovation and Contemporary Multidisciplinary Studies, 1(03).

Riadi, I., Rochmadi, T., Wintolo, H., Handoyo, J., Syukri, M., Suhartono, B., & Umar, R. (2026).Digital forensic analysis.

Rojabi, M. A. (2025). Cyber crime & digital forensics: The current role of digital forensics from hoaxes to proving fake diplomas. Afdan Rojabi Publisher.

Silalahi, R. S., Mulyadi, M., & Trisna, W. (2025). Legal analysis of cyber data breach crimes in the digital era based on the Electronic Information and Transactions Law (Study of Decision Number 2447/Pid. Sus/2024/PN Mdn).SIBATIK Journal: Scientific Journal in the Fields of Social, Economic, Cultural, Technology, and Education, 4(9), 2425–2440.