Main Article Content
Abstract
Keywords
Article Details
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
References
- R. Hartono and A. Purnomo, “Wireless Network 802.11,†D3 Ti Fmipa Uns, vol. 1, no.
- , pp. 1–23, 2011.
- C. Megawati, F. Teknik, and P. S. Ekstensi, “Keamanan Jaringan Wireless Berbasis
- Linux Platform Dan Dd-Wrt Firmware,†2012.
- F. Teknik, U. N. Surabaya, J. T. Informatika, F. Teknik, U. N. Surabaya, and A. Point,
- “MONITORING JARINGAN WIRELESS TERHADAP SERANGAN PACKET SNIFFING
- DENGAN MENGGUNAKAN IDS Achmad Rizal Fauzi I Made Suartana Abstrak.â€
- P. Arote, “Detection and Prevention against ARP Poisoning Attack using Modified ICMP
- and Voting,†no. January 2015, 2016, doi: 10.1109/CINE.2015.34.
- P. Studi, T. Informatika, S. Tinggi, and T. Adisutjipto, “Membangun sistem keamanan
- arp spoofing memanfaatkan arpwatch dan addons firefox,†pp. 49–58, 2012.
- Y. Mirsky, N. Kalbo, Y. Elovici, and A. Shabtai, “Vesper: Using Echo Analysis to Detect
- Man-in-the-Middle Attacks in LANs,†IEEE Transactions on Information Forensics and
- Security, vol. 14, no. 6. pp. 1638–1653, 2019, doi: 10.1109/TIFS.2018.2883177.
- N. Hildayanti and I. Riadi, “Forensics Analysis of Router On Computer Networks Using
- Live Forensics Method,†no. May, 2019, doi: 10.17781/P002559.
- M. Kolhe, “Live Vs Dead Computer Forensic Image Acquisition,†vol. 8, no. 3, pp. 455–
- , 2017.
- K. F. Digital, P. Studi, M. Teknik, P. Pascasarjana, F. Teknologi, and U. I. Indonesia,
- “METODE LIVE FORENSICS UNTUK ANALISIS SERANGAN DENIAL OF SERVICE (
- DoS ) PADA ROUTER MUHAMMAD ALIM ZULKIFLI METODE LIVE FORENSICS
- UNTUK ANALISIS SERANGAN DENIAL OF SERVICE ( DoS ) PADA ROUTER,†2018.
- I. Riadi, “INVESTIGASI LIVE FORENSIK DARI SISI PENGGUNA UNTUK
- MENGANALISA INVESTIGASI LIVE FORENSIK DARI SISI PENGGUNA UNTUK
- MENGANALISA SERANGAN MAN IN THE MIDDLE ATTACK BERBASIS EVIL TWIN,â€
- no. April, 2017, doi: 10.33096/ilkom.v9i1.103.1-8.
- S. Rahman and M. N. A. Khan, “Review of Live Forensic Analysis Techniques,†Int. J.
- Hybrid Inf. Technol., vol. 8, no. 2, pp. 379–388, 2015, doi: 10.14257/ijhit.2015.8.2.35.
- V. Data, C. Procedures, A. V. Data, and T. Incident, “Chapter 9 Collecting the Volatile
- Data from a Router Solutions in this chapter : Before You Connect to the Cisco Router,†doi:
- 1016/B978-1-59749-418-2.00009-0.
- S. Syaifuddin, Z. Sari, and M. K. Masduqi, “Analysis of Uapush Malware Infection using
- Static and Behavior Method on Android,†Kinet. Game Technol. Inf. Syst. Comput. Network,
- Comput. Electron. Control, vol. 3, no. 1, pp. 81–90, 2018, doi: 10.22219/kinetik.v3i1.265.
- P. Laboratorium and J. Komputer, “IMPLEMENTASI INTRUSION SYSTEM ( IDS )
- SNORT,†pp. 1–4.
- D. Saputra and I. Riadi, “Network Forensics Analysis of Man in the Middle Attack Using
- Live Forensics Network Forensics Analysis of Man in the Middle Attack Using Live Forensics
- Method,†no. May, 2019, doi: 10.17781/P002558.
- T. Fiebig, “Forensic DHCP Information Extraction from Home Routers,†2013.
- M. Akbar and I. Pendahuluan, “PERANCANGAN SOFTWARE IDS SNORT UNTUK
- PENDETEKSIAN SERANGAN INTERRUPTION ( Netcut ) PADA JARINGAN WIRELESS.â€
References
R. Hartono and A. Purnomo, “Wireless Network 802.11,†D3 Ti Fmipa Uns, vol. 1, no.
, pp. 1–23, 2011.
C. Megawati, F. Teknik, and P. S. Ekstensi, “Keamanan Jaringan Wireless Berbasis
Linux Platform Dan Dd-Wrt Firmware,†2012.
F. Teknik, U. N. Surabaya, J. T. Informatika, F. Teknik, U. N. Surabaya, and A. Point,
“MONITORING JARINGAN WIRELESS TERHADAP SERANGAN PACKET SNIFFING
DENGAN MENGGUNAKAN IDS Achmad Rizal Fauzi I Made Suartana Abstrak.â€
P. Arote, “Detection and Prevention against ARP Poisoning Attack using Modified ICMP
and Voting,†no. January 2015, 2016, doi: 10.1109/CINE.2015.34.
P. Studi, T. Informatika, S. Tinggi, and T. Adisutjipto, “Membangun sistem keamanan
arp spoofing memanfaatkan arpwatch dan addons firefox,†pp. 49–58, 2012.
Y. Mirsky, N. Kalbo, Y. Elovici, and A. Shabtai, “Vesper: Using Echo Analysis to Detect
Man-in-the-Middle Attacks in LANs,†IEEE Transactions on Information Forensics and
Security, vol. 14, no. 6. pp. 1638–1653, 2019, doi: 10.1109/TIFS.2018.2883177.
N. Hildayanti and I. Riadi, “Forensics Analysis of Router On Computer Networks Using
Live Forensics Method,†no. May, 2019, doi: 10.17781/P002559.
M. Kolhe, “Live Vs Dead Computer Forensic Image Acquisition,†vol. 8, no. 3, pp. 455–
, 2017.
K. F. Digital, P. Studi, M. Teknik, P. Pascasarjana, F. Teknologi, and U. I. Indonesia,
“METODE LIVE FORENSICS UNTUK ANALISIS SERANGAN DENIAL OF SERVICE (
DoS ) PADA ROUTER MUHAMMAD ALIM ZULKIFLI METODE LIVE FORENSICS
UNTUK ANALISIS SERANGAN DENIAL OF SERVICE ( DoS ) PADA ROUTER,†2018.
I. Riadi, “INVESTIGASI LIVE FORENSIK DARI SISI PENGGUNA UNTUK
MENGANALISA INVESTIGASI LIVE FORENSIK DARI SISI PENGGUNA UNTUK
MENGANALISA SERANGAN MAN IN THE MIDDLE ATTACK BERBASIS EVIL TWIN,â€
no. April, 2017, doi: 10.33096/ilkom.v9i1.103.1-8.
S. Rahman and M. N. A. Khan, “Review of Live Forensic Analysis Techniques,†Int. J.
Hybrid Inf. Technol., vol. 8, no. 2, pp. 379–388, 2015, doi: 10.14257/ijhit.2015.8.2.35.
V. Data, C. Procedures, A. V. Data, and T. Incident, “Chapter 9 Collecting the Volatile
Data from a Router Solutions in this chapter : Before You Connect to the Cisco Router,†doi:
1016/B978-1-59749-418-2.00009-0.
S. Syaifuddin, Z. Sari, and M. K. Masduqi, “Analysis of Uapush Malware Infection using
Static and Behavior Method on Android,†Kinet. Game Technol. Inf. Syst. Comput. Network,
Comput. Electron. Control, vol. 3, no. 1, pp. 81–90, 2018, doi: 10.22219/kinetik.v3i1.265.
P. Laboratorium and J. Komputer, “IMPLEMENTASI INTRUSION SYSTEM ( IDS )
SNORT,†pp. 1–4.
D. Saputra and I. Riadi, “Network Forensics Analysis of Man in the Middle Attack Using
Live Forensics Network Forensics Analysis of Man in the Middle Attack Using Live Forensics
Method,†no. May, 2019, doi: 10.17781/P002558.
T. Fiebig, “Forensic DHCP Information Extraction from Home Routers,†2013.
M. Akbar and I. Pendahuluan, “PERANCANGAN SOFTWARE IDS SNORT UNTUK
PENDETEKSIAN SERANGAN INTERRUPTION ( Netcut ) PADA JARINGAN WIRELESS.â€