ANALISA INVESTIGASI STATIC FORENSICS SERANGAN MAN IN THE MIDDLE BERBASIS ARP POISONING

G. Eka Aristya Kamajaya

Abstract


Kebutuhan akan akses internet saat ini sangat dibutuhkan oleh hampir semua orang khususnya wi-fi (wireless fidelity). Seiring meningkatnya pengguna pada wi-fi saat ini berbanding lurus dengan kejahatan yang mengeksploitasi wi-fi dengan melancarkan serangan berbahaya dengan tujuan untuk mendapatkan informasi dengan cara ilegal seperti serangan Man In The Middle berbasis ARP Poisoning. Berdasarkan latar belakang tersebut, penelitian ini bertujuan membahas cara melakukan investigasi forensics dengan menerapkan metode static forensics. Investigasi ini bertujuan untuk menganalisa data dan menemukan barang bukti maupun informasi pelaku yang dapat dipertanggung jawabkan

References


KHANGAR, S. V, NAGPUR, G. H. R. C. E., & DHARASKAR, R. V., 2012. Digital Forensic Investigation for Virtual Machines, 2(6), 663–666. https://doi.org/10.7763/IJMO.2012.V2.205

NAKHILA, O., DONDYK, E., AMJAD, M. F., & ZOU, C., 2015. User-side Wi-Fi Evil Twin Attack detection using SSL/TCP protocols. 2015 12th Annual IEEE Consumer Communications and Networking Conference, CCNC 2015, 239–244. https://doi.org/10.1109/CCNC.2015.7157983

NAM, S. Y., JURAYEV, S., KIM, S.-S., CHOI, K., & CHOI, G. S., 2012. Mitigating ARP poisoning-based man-in-the-middle attacks in wired or wireless LAN. EURASIP Journal on Wireless Communications and Networking, 2012(1), 89. https://doi.org/10.1186/1687-1499-2012-89

NAM, S. Y., KIM, D., & KIM, J., 2010. Enhanced ARP: Preventing ARP poisoning-based man-in-the-middle attacks. IEEE Communications Letters, 14(2), 187–189. https://doi.org/10.1109/LCOMM.2010.02.092108

NAYAK, G. N., & SAMADDAR, S. G., 2010. Different flavours of Man-In-The-Middle attack, consequences and feasible solutions. Proceedings - 2010 3rd IEEE International Conference on Computer Science and Information Technology, ICCSIT 2010, 5, 491–495. https://doi.org/10.1109/ICCSIT.2010.5563900

ORTEGA, A. P., MARCOS, X. E., CHIANG, L. D., & ABAD, C. L., 2009. Preventing ARP cache poisoning attacks: A proof of concept using OpenWrt. 2009 Latin American Network Operations and Management Symposium, LANOMS 2009. https://doi.org/10.1109/LANOMS.2009.5338799

PILLI, E. S., JOSHI, R. C., & NIYOGI, R., 2010. Network forensic frameworks: Survey and research challenges. Digital Investigation, 7(1–2), 14–27. https://doi.org/10.1016/j.diin.2010.02.003

PLUMMER, D. C., 1982. No Title.

RAFIQUE, M., & KHAN, M. N. A., 2013. Exploring Static and Live Digital Forensics: Methods, Practices and Tools. International Journal of Scientific & Engineering Research, 4(10), 1048–1056.

SEAN WHALEN., 2001. An Introduction to Arp Spoofing, 7.

SHULMAN, H., & WAIDNER, M., 2014. Towards Forensic Analysis of Attacks with DNSSEC. 2014 IEEE Security and Privacy Workshops, 69–76. https://doi.org/10.1109/SPW.2014.20

YASINSAC, A., & MANZANO, Y., 2001. Policies to Enhance Computer and Network Forensics. Proceedings of the 2001 IEEE, 5–6.




DOI: https://doi.org/10.33387/jiko.v3i1.1692

Refbacks

  • There are currently no refbacks.