Digital Forensics Investigation on Proxmox Server Virtualization Using SNI 27037:2014

Main Article Content

Didik Sudyana Reza Tanujiwa Putra Soni Soni


Server virtualization technology has experienced significant development so that more and more industries are adopting this technology. By using server virtualization, the industry can make savings in purchasing new servers and maintenance because virtualization allows one server to run with multiple operating systems at once. The high level of use of virtualization raises a gap for the occurrence of computer crimes involving virtualization. When computer crimes occur on virtualization, it is necessary to conduct digital forensic investigations to find useful clues in solving crime cases. Therefore, in this study a digital forensic investigation was conducted on Proxmox server virtualization by acquiring the entire storage virtualization media and carrying out checks on the results of the acquisition. Based on the investigation carried out, the acquisition technique by acquiring the entire storage media on Proxmox cannot be used because the structure of the evidence files and folders cannot be read perfectly


Download data is not yet available.

Article Details

How to Cite
SUDYANA, Didik; PUTRA, Reza Tanujiwa; SONI, Soni. Digital Forensics Investigation on Proxmox Server Virtualization Using SNI 27037:2014. SinkrOn, [S.l.], v. 3, n. 2, p. 67-72, mar. 2019. ISSN 2541-2019. Available at: <>. Date accessed: 22 may 2019. doi:
**************** Abstract viewed = 27 times ****************


[1] R. Kumar and S. Charu, “An Importance of Using Virtualization Technology in Cloud Computing,” Glob. J. Comput. Technol., vol. 1, no. 2, pp. 56–60, 2015.

[2] E. Ali and D. Sudyana, “Virtualization Technology for Optimizing Server Resource Usage,” Int. Conf. Eng. Technol. Dev., vol. 2, no. 1, pp. 208–212, 2014.

[3] D. Sudyana, B. Sugiantoro, and A. Luthfi, “Instrumen Evaluasi Framework Investigasi Forensika Digital Menggunakan SNI 27037:2014,” J. Inform. Sunan Kalijaga, vol. 1, no. 2, pp. 75–83, 2016.

[4] Y. D. Rahayu and Y. Prayudi, “Membangun Integrated Digital Forensics Investigation Frameworks ( IDFIF ) Menggunakan Metode Sequential Logic,” Semin. Nas. SENTIKA, vol. 2014, no. Sentika, 2014.

[5] A. Agarwal, M. Gupta, and S. Gupta, “Systematic Digital Forensic Investigation Model,” Int. J. Comput. Sci. Secur., vol. 5, no. 1, pp. 118–134, 2011.

[6] S. Rani, “Digital Forensic Models : A Comparative Analysis,” Int. J. Manag. IT Eng., vol. 8, no. 6, pp. 432–443, 2018.

[7] V. Soundararajan and K. Govil, “Challenges in building scalable virtualized datacenter management,” SIGOPS Oper. Syst. Rev., vol. 44, No. 4, pp. 95–102, 2010.
[8] S. M. . Cheng, Proxmox High Availability. 2014.

[9] Badan Standarisasi Nasional, SNI 27037:2014 tentang Teknologi Informasi - Teknik Keamanan - Pedoman Identifikasi, pengumpulan, Akuisisi, dan Preservasi Bukti Digital. Jakarta, 2014.

[10] M. Hirwani, Y. Pan, B. Stackpole, and D. Johnson, “Forensic Acquisition and Analysis of VMware Virtual Hard Disks,” 2012.

[11] S. Lim, B. Yoo, J. Park, K. Byun, and S. Lee, “A research on the investigation method of digital forensics for a VMware Workstation’s virtual machine,” Math. Comput. Model., vol. 55, no. 1–2, pp. 151–160, 2012.

[12] F. M. Patterson, “The Implications of Virtual Environments In Digital Forensic Investigations,” University of Central Florida, 2013.

[13] C. Neal, “Forensic Recovery of Evidence From Deleted Oracle Virtualbox Virtual Machines,” no. December, 2013.

[14] E. Wahyudi, U. I. Indonesia, I. Riadi, U. A. Dahlan, Y. Pray, and U. I. Indonesia, “Virtual Machine Forensic Analysis And Recovery Method For Recovery And Analysis Digital Evidence,” Int. J. Comput. Sci. Inf. Secur., vol. 16, no. 2, pp. 1–7, 2018.