Network Forensic Approach in Data Breach Crime Investigation
Main Article Content
Abstract
This study aims to analyze the application of a network forensics approach in data breach crime investigations and examine its technical and legal implications. The method used is a qualitative approach through case studies, network log analysis, and a literature review. The research object focuses on the 2021 Microsoft Exchange Server attack case to reconstruct the attack chronology based on network artifacts. The results show that network forensics is effective in systematically identifying attack stages, from initial activity to data exfiltration, and is able to uncover communication patterns and attack methods used by perpetrators. However, challenges arise from the use of anonymity and encryption techniques that complicate the investigation process. From a legal perspective, the analysis results can be used as digital evidence in proving cybercrime in accordance with applicable laws and regulations. This study also emphasizes the importance of forensic readiness in organizations through network monitoring, log management, and the utilization of open information. Thus, network forensics plays a crucial role not only in investigations but also in overall cybersecurity strategies.
Downloads
Article Details

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
References
Aditya, K. M. S., & Yudiantara, I. G. N. N. K. (2025). Criminological analysis of personal data theft crimes in the digital era.Journal of Academic Media (JMA), 3(2).
Addari, M. A., Siregar, G. R., Lubis, A. B., Ariestia, C. I., & Zatalini, Z. (2026). Literature study on the evolution of computer viruses: Spread mechanisms, forensic investigations, and artificial intelligence-based detection strategies.JIKUM: Journal of Computer Science, 2(1), 22–25.
Azizah, S., Ula, Z. N., Mutiara, D., & Prameswari, M. P. (2024). Cybersecurity as the foundation for developing mobile financial applications: A literature study on cybercrime and its mitigation.Accounting and Information Technology, 17(2), 221–237.
Fanani, G. P. I., Luthfiana, D. A., Pramurwitasari, A., Najich, M. N., & Putra, A. T. (2026). Analysis of network traffic patterns during DDoS attacks using Snort IDS.Scientific: Journal of Computer Science and Informatics, 3(1), 10–23.
Firmansyah, R. A. (2025).Digital forensic readiness and information security management system integration framework in government environment(Doctoral dissertation, Islamic University of Indonesia).
Mahendra, B. A., Utomo, Y. B., & Kurniadi, H. (2024). Implementation of network forensic methods for monitoring Windows Server computers.Journal of Information System and Computer, 3(1), 1–8.
Mursyid, M., Putera, A., & Jannah, M. (2025). Reconstructing the role of digital forensics in cybercrime investigations: A critical analysis of the construction of criminal law in Indonesia.Tana Mana Journal, 6(2), 289–296.
Nababan, F. E., & Sumardiana, B. (2025). The crime of personal data theft through cyber phishing and its evidentiary system in court: A study of Decision No. 697/Pid. Sus/2024/PN. Sda.Bookchapter Law and Environment, 1, 627–650.
Niam, M. F., Rumahlewang, E., Umiyati, H., Dewi, N. P. S., Atiningsih, S., Haryati, T., ... & Wajdi, F. (2024).Qualitative research methods.
Rahman, R., Inayah, F. M. N., & Apriyani, D. (2026). Digital forensic analysis of malware attack incidents on operating systems.INOMATEC: Journal of Innovation and Contemporary Multidisciplinary Studies, 1(03).
Riadi, I., Rochmadi, T., Wintolo, H., Handoyo, J., Syukri, M., Suhartono, B., & Umar, R. (2026).Digital forensic analysis.
Rojabi, M. A. (2025). Cyber crime & digital forensics: The current role of digital forensics from hoaxes to proving fake diplomas. Afdan Rojabi Publisher.
Silalahi, R. S., Mulyadi, M., & Trisna, W. (2025). Legal analysis of cyber data breach crimes in the digital era based on the Electronic Information and Transactions Law (Study of Decision Number 2447/Pid. Sus/2024/PN Mdn).SIBATIK Journal: Scientific Journal in the Fields of Social, Economic, Cultural, Technology, and Education, 4(9), 2425–2440.