2020
DOI: 10.29408/edumatic.v4i1.2046
|View full text |Cite
|
Sign up to set email alerts
|

Analisis Bukti Serangan Address Resolution Protocol Spoofing menggunakan Metode National Institute of Standard Technology

Abstract: Penelitian ini bertujuan untuk menemukan informasi bukti serangan Address Resolution Protocol (ARP) Spoofing berupa alamat MAC address penyerang dan korban beserta waktu terjadinya serangan. Penelitian ini menggunakan tools wireshark untuk melihat lalu lintas jaringan, terutama pada protokol ARP dan menggunakan metode National Insitute of Standard Technology (NIST) sebagai kerangka kerja selama proses simulasi sampai dengan pembuatan laporan barang bukti. Serangan ARP Spoofing dapat mengakibatkan terjadinya se… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0
3

Year Published

2021
2021
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 6 publications
(6 reference statements)
0
2
0
3
Order By: Relevance
“…Selanjutnya adalah penelitian yang berjudul Analisis Bukti Serangan Address Resolution Protocol Spoofing menggunakan Metode National Institute of Standard Technology. Penelitian melakukan simulasi serangan sebanyak dua serangan terhadap satu perangkat laptop dan satu perangkat routerboard, investigasi forensik dilakukan menggunakan kerangka National Institute of Standards and Technology (NIST) [11].…”
Section: Tinjauan Literaturunclassified
“…Selanjutnya adalah penelitian yang berjudul Analisis Bukti Serangan Address Resolution Protocol Spoofing menggunakan Metode National Institute of Standard Technology. Penelitian melakukan simulasi serangan sebanyak dua serangan terhadap satu perangkat laptop dan satu perangkat routerboard, investigasi forensik dilakukan menggunakan kerangka National Institute of Standards and Technology (NIST) [11].…”
Section: Tinjauan Literaturunclassified
“…Evidence of ARP spoofing attacks includes the MAC addresses of the attacker and victim, as well as the timing of the attack, obtained using Wireshark and Ettercap tools to analyze network traffic, particularly using the ARP protocol [14]. ARP spoofing attacks can lead to other attacks, such as denial of service and man-in-the-middle attacks, which prevent users from accessing the network and result in data theft [14].…”
Section: Theorymentioning
confidence: 99%
“…Mel mory acquisition is thel procel ss of acquiring volatilel mel mory (RAM) to non-volatilel storagel (filel s on disk) [8]. livel forel nsics is a way in a forel nsic procel ss whel rel thel systel m is still running, this is donel bel causel if thel systel m diel s thel n thel rel will bel lost data or information [9]. Thel livel forel nsic mel thod is usually usel d for casel s whel rel thel rel is volatilel data whel rel thel data will bel lost if thel powel r sourcel diel s, volatilel data is usually storel d in tel mporary mel dia, namel ly RAM.…”
Section: Introductionmentioning
confidence: 99%