Analysis of Digital Evidence on Denial of Service (DoS) Attack Log Based

Authors

  • Galih Fanani Universitas Ahmad Dahlan
  • Imam Riadi Universitas Ahmad Dahlan

DOI:

https://doi.org/10.12928/biste.v2i2.1065

Keywords:

DoS, IDS Snort, Loic, Wireshark

Abstract

This research is carried out an analysis and investigation of digital log file data retrieval from DoS (Denial of Service) attacks, on internet networks that have been detected by IDS (Intrusion Detection System) and using Wireshark as Tools Analysis Network. The research phase begins with the design of an experimental scenario which is often carried out daily where users access the internet network. The next stage is an attack in the form of a ping flood on the target computer connected to the internet network, the final stage of data retrieval which will be analyzed later. Testing research using UAT (User Acceptance Test), to prove that the analysis has been received by the user. The results of research conducted to obtain data in the form of an attacker's IP (Internet Protocol), target IP, protocol type, the port used, and the time of the attack. In the UAT test results, the obtained value of 18% of students disagrees, 58% of students agree, and 24% of students strongly agree. This research has conducted an analysis of random data attacks using Wireshark applications received by users.

References

A. Fadlil, I. Riadi, and S. Aji, “Pengembangan Sistem Pengaman Jaringan Komputer Berdasarkan Analisis Forensik Jaringan,” Jurnal Ilmiah Teknik Elektro Komputer dan Informatika, vol. 3, no. 1, pp. 11–19, 2017.

O. Wijaya, Jusak, and A. Sukmaaji, “Pemodelan Karakteristik Denial of Service Attack Melalui Analisis Data Trafik,” JCONES: Journal of Control and Network, vol. 3, no. 1, pp. 105–111, Jul. 2014.

A. Fadlil and S. Aji, “DDoS Attacks Classification using Numeric Attribute-based Gaussian Naive Bayes,” IJACSA) International Journal of Advanced Computer Science and Applications, vol. 8, no. 8, 2017.

E. K. Dewi and P. Kasih, “Analisis Log Snort Menggunakan Network Forensic,” JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika), vol. 2, no. 2, pp. 72–79, Dec. 2017.

Christos Douligeris and Dimitrios N. Serpanos, Network Security: Current Status and Future Directions. Wiley-IEEE Press, 2007.

T. A. Cahyanto and Y. Prayudi, “Investigasi Forensika Pada Log Web Server untuk Menemukan Bukti Digital Terkait dengan Serangan Menggunakan Metode Hidden Markov Models,” Seminar Nasional Aplikasi Teknologi Informasi (SNATI) Yogyakarta, vol. 1, no. 1, pp. 21–2014, Jun. 2014.

T. A. Cahyanto, V. Wahanggara, and D. Ramadana, “Analisis dan Deteksi Malware Menggunakan Metode Malware Analisis Dinamis dan Malware Analisis Statis,” JUSTINDO (Jurnal Sistem dan Teknologi Informasi Indonesia), vol. 2, no. 1, pp. 19–30, 2017.

I. Riadi, R. Umar, and I. M. Nasrulloh, “Analisis Forensik Digital pada Frozen Solid State Drive dengan Metode National Institute of Justice (NIJ),” Elinvo (Electronics, Informatics, and Vocational Education), vol. 3, no. 1, pp. 70–82, Jul. 2018.

M. F. Sandwinata, “Analisis DNA dalam Kasus Forensik,” TEKNOSAINS: MEDIA INFORMASI SAINS DAN TEKNOLOGI, vol. 12, no. 1, pp. 1–10, Feb. 2018.

F. Ridho, A. Yudhana, and I. Riadi, “Implementasi Log Dalam Forensik Router Terhadap Serangan Distributed Denial of Service (DDoS),” JTM (JURNAL TIMES: Technology Informatics & Computer System ), vol. 6, no. 2, 2017.

A. Iswardani and I. Riadi, “Denial of Service log Analysis Using Density K-Means Method,” Journal of Theoretical and Applied Information Technology, vol. 20, no. 2, pp. 299–302, 2016.

Faizin Ridho, “Analisis Forensik Router Untuk Mendeteksi Serangan Distributed Danial of Service (DDoS) Secara Real Time,” in Annual Research Seminar (ARS), 2016.

J. Fahana, R. Umar, and F. Ridho, “Pemanfaatan Telegram Sebagai Notifikasi Serangan untuk Keperluan Forensik Jaringan,” Query: Journal of Information Systems, vol. 1, no. 2, Oct. 2017.

M. A. Zulkifli, I. Riadi, and Y. Prayudi, “Live Forensics Method for Analysis Denial of Service (DOS) Attack on Routerboard,” International Journal of Computer Applications, vol. 180, no. 35, pp. 23–30, 2018.

M. Aziz, M. Aziz, R. Umar, and F. Ridho, “Implemetasi Jaringan Saraf Tiruan Untuk Mendeteksi Serangan DDoS Pada Forensik Jaringan,” Query: Journal of Information Systems, vol. 3, no. 1, Apr. 2019.

Downloads

Published

2020-08-30

How to Cite

[1]
G. Fanani and I. Riadi, “Analysis of Digital Evidence on Denial of Service (DoS) Attack Log Based”, Buletin Ilmiah Sarjana Teknik Elektro, vol. 2, no. 2, pp. 70–74, Aug. 2020.

Issue

Section

Artikel