Analysis of Digital Evidence on Denial of Service (DoS) Attack Log Based
DOI:
https://doi.org/10.12928/biste.v2i2.1065Keywords:
DoS, IDS Snort, Loic, WiresharkAbstract
This research is carried out an analysis and investigation of digital log file data retrieval from DoS (Denial of Service) attacks, on internet networks that have been detected by IDS (Intrusion Detection System) and using Wireshark as Tools Analysis Network. The research phase begins with the design of an experimental scenario which is often carried out daily where users access the internet network. The next stage is an attack in the form of a ping flood on the target computer connected to the internet network, the final stage of data retrieval which will be analyzed later. Testing research using UAT (User Acceptance Test), to prove that the analysis has been received by the user. The results of research conducted to obtain data in the form of an attacker's IP (Internet Protocol), target IP, protocol type, the port used, and the time of the attack. In the UAT test results, the obtained value of 18% of students disagrees, 58% of students agree, and 24% of students strongly agree. This research has conducted an analysis of random data attacks using Wireshark applications received by users.
References
A. Fadlil, I. Riadi, and S. Aji, “Pengembangan Sistem Pengaman Jaringan Komputer Berdasarkan Analisis Forensik Jaringan,” Jurnal Ilmiah Teknik Elektro Komputer dan Informatika, vol. 3, no. 1, pp. 11–19, 2017.
O. Wijaya, Jusak, and A. Sukmaaji, “Pemodelan Karakteristik Denial of Service Attack Melalui Analisis Data Trafik,” JCONES: Journal of Control and Network, vol. 3, no. 1, pp. 105–111, Jul. 2014.
A. Fadlil and S. Aji, “DDoS Attacks Classification using Numeric Attribute-based Gaussian Naive Bayes,” IJACSA) International Journal of Advanced Computer Science and Applications, vol. 8, no. 8, 2017.
E. K. Dewi and P. Kasih, “Analisis Log Snort Menggunakan Network Forensic,” JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika), vol. 2, no. 2, pp. 72–79, Dec. 2017.
Christos Douligeris and Dimitrios N. Serpanos, Network Security: Current Status and Future Directions. Wiley-IEEE Press, 2007.
T. A. Cahyanto and Y. Prayudi, “Investigasi Forensika Pada Log Web Server untuk Menemukan Bukti Digital Terkait dengan Serangan Menggunakan Metode Hidden Markov Models,” Seminar Nasional Aplikasi Teknologi Informasi (SNATI) Yogyakarta, vol. 1, no. 1, pp. 21–2014, Jun. 2014.
T. A. Cahyanto, V. Wahanggara, and D. Ramadana, “Analisis dan Deteksi Malware Menggunakan Metode Malware Analisis Dinamis dan Malware Analisis Statis,” JUSTINDO (Jurnal Sistem dan Teknologi Informasi Indonesia), vol. 2, no. 1, pp. 19–30, 2017.
I. Riadi, R. Umar, and I. M. Nasrulloh, “Analisis Forensik Digital pada Frozen Solid State Drive dengan Metode National Institute of Justice (NIJ),” Elinvo (Electronics, Informatics, and Vocational Education), vol. 3, no. 1, pp. 70–82, Jul. 2018.
M. F. Sandwinata, “Analisis DNA dalam Kasus Forensik,” TEKNOSAINS: MEDIA INFORMASI SAINS DAN TEKNOLOGI, vol. 12, no. 1, pp. 1–10, Feb. 2018.
F. Ridho, A. Yudhana, and I. Riadi, “Implementasi Log Dalam Forensik Router Terhadap Serangan Distributed Denial of Service (DDoS),” JTM (JURNAL TIMES: Technology Informatics & Computer System ), vol. 6, no. 2, 2017.
A. Iswardani and I. Riadi, “Denial of Service log Analysis Using Density K-Means Method,” Journal of Theoretical and Applied Information Technology, vol. 20, no. 2, pp. 299–302, 2016.
Faizin Ridho, “Analisis Forensik Router Untuk Mendeteksi Serangan Distributed Danial of Service (DDoS) Secara Real Time,” in Annual Research Seminar (ARS), 2016.
J. Fahana, R. Umar, and F. Ridho, “Pemanfaatan Telegram Sebagai Notifikasi Serangan untuk Keperluan Forensik Jaringan,” Query: Journal of Information Systems, vol. 1, no. 2, Oct. 2017.
M. A. Zulkifli, I. Riadi, and Y. Prayudi, “Live Forensics Method for Analysis Denial of Service (DOS) Attack on Routerboard,” International Journal of Computer Applications, vol. 180, no. 35, pp. 23–30, 2018.
M. Aziz, M. Aziz, R. Umar, and F. Ridho, “Implemetasi Jaringan Saraf Tiruan Untuk Mendeteksi Serangan DDoS Pada Forensik Jaringan,” Query: Journal of Information Systems, vol. 3, no. 1, Apr. 2019.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2020 Galih Fanani
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
This journal is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.