ANALISA INVESTIGASI STATIC FORENSICS SERANGAN MAN IN THE MIDDLE BERBASIS ARP POISONING
Abstract
Full Text:
PDF (Bahasa Indonesia)References
KHANGAR, S. V, NAGPUR, G. H. R. C. E., & DHARASKAR, R. V., 2012. Digital Forensic Investigation for Virtual Machines, 2(6), 663–666. https://doi.org/10.7763/IJMO.2012.V2.205
NAKHILA, O., DONDYK, E., AMJAD, M. F., & ZOU, C., 2015. User-side Wi-Fi Evil Twin Attack detection using SSL/TCP protocols. 2015 12th Annual IEEE Consumer Communications and Networking Conference, CCNC 2015, 239–244. https://doi.org/10.1109/CCNC.2015.7157983
NAM, S. Y., JURAYEV, S., KIM, S.-S., CHOI, K., & CHOI, G. S., 2012. Mitigating ARP poisoning-based man-in-the-middle attacks in wired or wireless LAN. EURASIP Journal on Wireless Communications and Networking, 2012(1), 89. https://doi.org/10.1186/1687-1499-2012-89
NAM, S. Y., KIM, D., & KIM, J., 2010. Enhanced ARP: Preventing ARP poisoning-based man-in-the-middle attacks. IEEE Communications Letters, 14(2), 187–189. https://doi.org/10.1109/LCOMM.2010.02.092108
NAYAK, G. N., & SAMADDAR, S. G., 2010. Different flavours of Man-In-The-Middle attack, consequences and feasible solutions. Proceedings - 2010 3rd IEEE International Conference on Computer Science and Information Technology, ICCSIT 2010, 5, 491–495. https://doi.org/10.1109/ICCSIT.2010.5563900
ORTEGA, A. P., MARCOS, X. E., CHIANG, L. D., & ABAD, C. L., 2009. Preventing ARP cache poisoning attacks: A proof of concept using OpenWrt. 2009 Latin American Network Operations and Management Symposium, LANOMS 2009. https://doi.org/10.1109/LANOMS.2009.5338799
PILLI, E. S., JOSHI, R. C., & NIYOGI, R., 2010. Network forensic frameworks: Survey and research challenges. Digital Investigation, 7(1–2), 14–27. https://doi.org/10.1016/j.diin.2010.02.003
PLUMMER, D. C., 1982. No Title.
RAFIQUE, M., & KHAN, M. N. A., 2013. Exploring Static and Live Digital Forensics: Methods, Practices and Tools. International Journal of Scientific & Engineering Research, 4(10), 1048–1056.
SEAN WHALEN., 2001. An Introduction to Arp Spoofing, 7.
SHULMAN, H., & WAIDNER, M., 2014. Towards Forensic Analysis of Attacks with DNSSEC. 2014 IEEE Security and Privacy Workshops, 69–76. https://doi.org/10.1109/SPW.2014.20
YASINSAC, A., & MANZANO, Y., 2001. Policies to Enhance Computer and Network Forensics. Proceedings of the 2001 IEEE, 5–6.
DOI: https://doi.org/10.33387/jiko.v3i1.1692
Refbacks
- There are currently no refbacks.