Analisis Bukti Serangan Address Resolution Protocol Spoofing menggunakan Metode National Institute of Standard Technology
DOI:
https://doi.org/10.29408/edumatic.v4i1.2046Keywords:
Address Resolution Protocol, National Institute of Standard Technology, SpoofingAbstract
This research intends to find information about evidence of Address Resolution Protocol (ARP) Spoofing attacks that is the MAC address of the attacker and victim also the time of the attack. This research uses Wireshark tools to inspect network traffic, especially on the ARP protocol. It uses the National Institute of Technology Technology (NIST) method as a framework in the simulation process to produce evidence reports. ARP Spoofing attacks can lead to other attacks, such as Denial of Service and Man in the Middle Attack, this attack allows users not to be able to access the network and data theft. During the simulation stage, 2 ARP Spoofing attacks are carried out on 1 laptop and 1 router connected to the network. The results of the attack simulation found 2 attacks and obtained information about the MAC address of the attacker and victim and also the time of the attack. Based on the results of tests carried, successfully found all ARP Spoofing attacks that occur on the network with a success rate of 100%
References
Aji, S., Fadlil, A., & Riadi, I. (2017). Pengembangan Sistem Pengaman Jaringan Komputer Berdasarkan Analisis Forensik Jaringan. Jurnal Ilmiah Teknik Elektro Komputer Dan Informatika, 3(1), 11. https://doi.org/10.26555/jiteki.v3i1.5665
Didi Susianto, I. Y. (2015). Mengamankan Wireless Dengan Menggunakan Two Factor, Password dan Mac Address Filtering. Jurnal Manajemen Sistem Informasi Dan Teknologi Volume, 05(02), 31–36.
Fadlil, A., Riadi, I., & Aji, S. (2017). Review of detection DDOS attack detection using naive bayes classifier for network forensics. Bulletin of Electrical Engineering and Informatics, 6(2), 140–148. https://doi.org/10.11591/eei.v6i2.605
Jayani, D. H. (2019). Berapa Pengguna Internet di Indonesia? Databoks, 1. https://databoks.katadata.co.id/datapublish/2019/09/09/berapa-pengguna-internet-di-indonesia
Kamajaya, G. E. A., Riadi, I., Prayudi, Y., & Dahlan, U. A. (2020). Analisa Investigasi Static Forensics Serangan Man In The Arp Poisoning Based On Man In The Middle Attack In Static. 3(1), 6–12. https://doi.org/10.33387/jiko
Mazdadi, M. I., Riadi, I., & Luthfi, A. (2017). Live Forensics on RouterOS using API Services to Investigate Network Attacks. International Journal of Computer Science and Information Security (IJCSIS), 15(2), 406–410.
Mualfah, D., & Riadi, I. (2017). Network Forensics For Detecting Flooding Attack On Web Server. IJCSIS) International Journal of Computer Science and Information Security, 15(2), 326–331. https://doi.org/10.1016/j.ecss.2004.08.013
Riadi, I., Fadlil, A., & Aulia, M. I. (n.d.). Review Proses Forensik Optical Drive Menggunakan Metode National Institute of Justice ( NIJ ).
Riadi, I., Sunardi, S., & Rauli, M. E. (2018). Identifikasi Bukti Digital WhatsApp pada Sistem Operasi Proprietary Menggunakan Live Forensics. Jurnal Teknik Elektro, 10(1), 18–22. https://doi.org/10.15294/jte.v10i1.14070
Riadi, I., Sunardi, S., & Rauli, M. E. (2019). Live Forensics Analysis of Line App on Proprietary Operating System. Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control, 4(4), 305–314. https://doi.org/10.22219/kinetik.v4i4.850
Riadi, I., Umar, R., & Firdonsyah, A. (2017). Identification of Digital Evidence on Android’s Blackberry Messenger using NIST Mobile Forensic Method. International Journal of Computer Science and Information Security (IJCSIS), 15(5), 3–8.
Riadi, I., Yudhana, A., Caesar, M., & Putra, F. (2017). Analisis Recovery Bukti Digital Instagram Messangers Menggunakan Metode National Institute of Standards and Technology (Nist). Seminar Nasional Teknologi Informasi Dan Komunikasi - SEMANTIKOM, 161–166.
Riadi, I., Yudhana, A., Caesar, M., & Putra, F. (2018). Akuisisi Bukti Digital Pada Instagram Messenger Berbasis Android Menggunakan Metode National Institute Of Justice (NIJ). 4, 219–227.
Rizal, R., Riadi, I., & Prayudi, Y. (2018). Network Forensics for Detecting Flooding Attack on Internet of Things ( IoT ) Device. International Journal of Cyber-Security and Digital Forensics (IJCSDF), 7(4), 382–390.
Syahib, M. I., Riadi, I., & Umar, R. (2020). Akuisisi Bukti Digital Aplikasi Viber Menggunakan Metode National Institute of Standards Technology (NIST). Jurnal Sains Komputer & Informatika (J-Sakti), 4(1), 170–178.
Veny Charnita Br Ginting, Mahendra Data, D. P. K. (2019). Deteksi Serangan ARP Spoofing berdasarkan Analisis Lalu Lintas Paket. 3(5), 5049–5057.
Yuwono, D. T., Fadlil, A., & Sunardi, S. (2019). Performance Comparison of Forensic Software for Carving Files using NIST Method. Jurnal Teknologi Dan Sistem Komputer, 7(3), 89. https://doi.org/10.14710/jtsiskom.7.3.2019.89-92
Downloads
Published
Issue
Section
License
Semua tulisan pada jurnal ini adalah tanggung jawab penuh penulis. Edumatic: Jurnal Pendidikan Informatika bisa diakses secara free (gratis) tanpa ada pungutan biaya, sesuai dengan lisensi creative commons yang digunakan.
This work is licensed under a Lisensi a Creative Commons Attribution-ShareAlike 4.0 International License.