Main Article Content
Abstract
Keywords
Article Details
Copyright (c) 2021 Jurnal Komputer TerapanÂ
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Copyright info for authors
1. Authors hold the copyright in any process, procedure, or article described in the work and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors retain publishing rights to re-use all or portion of the work in different work but can not granting third-party requests for reprinting and republishing the work.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) as it can lead to productive exchanges, as well as earlier and greater citation of published work.
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License
References
- R. Hartono and A. Purnomo, “Wireless Network 802.11,†D3 Ti Fmipa Uns, vol. 1, no.
- , pp. 1–23, 2011.
- C. Megawati, F. Teknik, and P. S. Ekstensi, “Keamanan Jaringan Wireless Berbasis
- Linux Platform Dan Dd-Wrt Firmware,†2012.
- F. Teknik, U. N. Surabaya, J. T. Informatika, F. Teknik, U. N. Surabaya, and A. Point,
- “MONITORING JARINGAN WIRELESS TERHADAP SERANGAN PACKET SNIFFING
- DENGAN MENGGUNAKAN IDS Achmad Rizal Fauzi I Made Suartana Abstrak.â€
- P. Arote, “Detection and Prevention against ARP Poisoning Attack using Modified ICMP
- and Voting,†no. January 2015, 2016, doi: 10.1109/CINE.2015.34.
- P. Studi, T. Informatika, S. Tinggi, and T. Adisutjipto, “Membangun sistem keamanan
- arp spoofing memanfaatkan arpwatch dan addons firefox,†pp. 49–58, 2012.
- Y. Mirsky, N. Kalbo, Y. Elovici, and A. Shabtai, “Vesper: Using Echo Analysis to Detect
- Man-in-the-Middle Attacks in LANs,†IEEE Transactions on Information Forensics and
- Security, vol. 14, no. 6. pp. 1638–1653, 2019, doi: 10.1109/TIFS.2018.2883177.
- N. Hildayanti and I. Riadi, “Forensics Analysis of Router On Computer Networks Using
- Live Forensics Method,†no. May, 2019, doi: 10.17781/P002559.
- M. Kolhe, “Live Vs Dead Computer Forensic Image Acquisition,†vol. 8, no. 3, pp. 455–
- , 2017.
- K. F. Digital, P. Studi, M. Teknik, P. Pascasarjana, F. Teknologi, and U. I. Indonesia,
- “METODE LIVE FORENSICS UNTUK ANALISIS SERANGAN DENIAL OF SERVICE (
- DoS ) PADA ROUTER MUHAMMAD ALIM ZULKIFLI METODE LIVE FORENSICS
- UNTUK ANALISIS SERANGAN DENIAL OF SERVICE ( DoS ) PADA ROUTER,†2018.
- I. Riadi, “INVESTIGASI LIVE FORENSIK DARI SISI PENGGUNA UNTUK
- MENGANALISA INVESTIGASI LIVE FORENSIK DARI SISI PENGGUNA UNTUK
- MENGANALISA SERANGAN MAN IN THE MIDDLE ATTACK BERBASIS EVIL TWIN,â€
- no. April, 2017, doi: 10.33096/ilkom.v9i1.103.1-8.
- S. Rahman and M. N. A. Khan, “Review of Live Forensic Analysis Techniques,†Int. J.
- Hybrid Inf. Technol., vol. 8, no. 2, pp. 379–388, 2015, doi: 10.14257/ijhit.2015.8.2.35.
- V. Data, C. Procedures, A. V. Data, and T. Incident, “Chapter 9 Collecting the Volatile
- Data from a Router Solutions in this chapter : Before You Connect to the Cisco Router,†doi:
- 1016/B978-1-59749-418-2.00009-0.
- S. Syaifuddin, Z. Sari, and M. K. Masduqi, “Analysis of Uapush Malware Infection using
- Static and Behavior Method on Android,†Kinet. Game Technol. Inf. Syst. Comput. Network,
- Comput. Electron. Control, vol. 3, no. 1, pp. 81–90, 2018, doi: 10.22219/kinetik.v3i1.265.
- P. Laboratorium and J. Komputer, “IMPLEMENTASI INTRUSION SYSTEM ( IDS )
- SNORT,†pp. 1–4.
- D. Saputra and I. Riadi, “Network Forensics Analysis of Man in the Middle Attack Using
- Live Forensics Network Forensics Analysis of Man in the Middle Attack Using Live Forensics
- Method,†no. May, 2019, doi: 10.17781/P002558.
- T. Fiebig, “Forensic DHCP Information Extraction from Home Routers,†2013.
- M. Akbar and I. Pendahuluan, “PERANCANGAN SOFTWARE IDS SNORT UNTUK
- PENDETEKSIAN SERANGAN INTERRUPTION ( Netcut ) PADA JARINGAN WIRELESS.â€
References
R. Hartono and A. Purnomo, “Wireless Network 802.11,†D3 Ti Fmipa Uns, vol. 1, no.
, pp. 1–23, 2011.
C. Megawati, F. Teknik, and P. S. Ekstensi, “Keamanan Jaringan Wireless Berbasis
Linux Platform Dan Dd-Wrt Firmware,†2012.
F. Teknik, U. N. Surabaya, J. T. Informatika, F. Teknik, U. N. Surabaya, and A. Point,
“MONITORING JARINGAN WIRELESS TERHADAP SERANGAN PACKET SNIFFING
DENGAN MENGGUNAKAN IDS Achmad Rizal Fauzi I Made Suartana Abstrak.â€
P. Arote, “Detection and Prevention against ARP Poisoning Attack using Modified ICMP
and Voting,†no. January 2015, 2016, doi: 10.1109/CINE.2015.34.
P. Studi, T. Informatika, S. Tinggi, and T. Adisutjipto, “Membangun sistem keamanan
arp spoofing memanfaatkan arpwatch dan addons firefox,†pp. 49–58, 2012.
Y. Mirsky, N. Kalbo, Y. Elovici, and A. Shabtai, “Vesper: Using Echo Analysis to Detect
Man-in-the-Middle Attacks in LANs,†IEEE Transactions on Information Forensics and
Security, vol. 14, no. 6. pp. 1638–1653, 2019, doi: 10.1109/TIFS.2018.2883177.
N. Hildayanti and I. Riadi, “Forensics Analysis of Router On Computer Networks Using
Live Forensics Method,†no. May, 2019, doi: 10.17781/P002559.
M. Kolhe, “Live Vs Dead Computer Forensic Image Acquisition,†vol. 8, no. 3, pp. 455–
, 2017.
K. F. Digital, P. Studi, M. Teknik, P. Pascasarjana, F. Teknologi, and U. I. Indonesia,
“METODE LIVE FORENSICS UNTUK ANALISIS SERANGAN DENIAL OF SERVICE (
DoS ) PADA ROUTER MUHAMMAD ALIM ZULKIFLI METODE LIVE FORENSICS
UNTUK ANALISIS SERANGAN DENIAL OF SERVICE ( DoS ) PADA ROUTER,†2018.
I. Riadi, “INVESTIGASI LIVE FORENSIK DARI SISI PENGGUNA UNTUK
MENGANALISA INVESTIGASI LIVE FORENSIK DARI SISI PENGGUNA UNTUK
MENGANALISA SERANGAN MAN IN THE MIDDLE ATTACK BERBASIS EVIL TWIN,â€
no. April, 2017, doi: 10.33096/ilkom.v9i1.103.1-8.
S. Rahman and M. N. A. Khan, “Review of Live Forensic Analysis Techniques,†Int. J.
Hybrid Inf. Technol., vol. 8, no. 2, pp. 379–388, 2015, doi: 10.14257/ijhit.2015.8.2.35.
V. Data, C. Procedures, A. V. Data, and T. Incident, “Chapter 9 Collecting the Volatile
Data from a Router Solutions in this chapter : Before You Connect to the Cisco Router,†doi:
1016/B978-1-59749-418-2.00009-0.
S. Syaifuddin, Z. Sari, and M. K. Masduqi, “Analysis of Uapush Malware Infection using
Static and Behavior Method on Android,†Kinet. Game Technol. Inf. Syst. Comput. Network,
Comput. Electron. Control, vol. 3, no. 1, pp. 81–90, 2018, doi: 10.22219/kinetik.v3i1.265.
P. Laboratorium and J. Komputer, “IMPLEMENTASI INTRUSION SYSTEM ( IDS )
SNORT,†pp. 1–4.
D. Saputra and I. Riadi, “Network Forensics Analysis of Man in the Middle Attack Using
Live Forensics Network Forensics Analysis of Man in the Middle Attack Using Live Forensics
Method,†no. May, 2019, doi: 10.17781/P002558.
T. Fiebig, “Forensic DHCP Information Extraction from Home Routers,†2013.
M. Akbar and I. Pendahuluan, “PERANCANGAN SOFTWARE IDS SNORT UNTUK
PENDETEKSIAN SERANGAN INTERRUPTION ( Netcut ) PADA JARINGAN WIRELESS.â€