PENETRATION TESTING DALAM FORENSIK DIGITAL PADA JARINGAN FAKULTAS TEKNIK UNIVERSITAS IBN KHALDUN BOGOR DENGAN PING OF DEATH
DOI:
https://doi.org/10.32832/inova-tif.v4i2.5812Abstract
Network forensics is a computer security investigation to find sources of the attack s on the network by examining data log evidence, identifying, analyzing, and reconstructing the incidents. Types of attack s againist a computer or server on the network by spending resources that are owned by the computer until computer is not able to function properly, thus indirectly preventing other users to obtain access to network services that were attack ed is Distributed Denial of Service attack (DDoS). Network Forensics Research conducted in Research Laboratory of Information Engineering Master of Ahmad Dahlan University Yogyak arta. Detection of attacks carried out by Winbox RouterOS v3,6 where the software shows resources, attack er (IP Address), data pack ets, and when attack doing. Simulated attack s carried out by LOIC software to determine performance of safety system in computer network . To anticipate DDoS attack s,then developed a computer network security system.
References
Kusumawati, Monika, Implementasi IDS (Intrusion Detection System) Serta Monitoring Jaringan Dengan Interface WEB Berbasis BASE Pada Keamanan Jaringan, Universitas Indonesia, Depok. 2010
Boob, Snehal, Priyanka Jadhav, 2010, "Wireless Intrusion Detection System” in International Journal of Computer Applications, Volume 5– No.8, August 2010, pp. 9-13.
Taluja, Sachin, Pradeep Kumar Verma, Rajeshwar Lal Dua, 2012, "Network Security Using IP firewalls” in International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2 Issue 8, August 2012, pp. 348-354.
Suyatno Budiharjo, dan Faisal Riyadi,"Forensik Jaringan Pada Lalu Lintas dalam jaringan Honeynet Di Indonesia Security Insident Respone Team On Internet Infrastructure/Coordination Center” November 2014
Eka Leonardus Dian Suradji, dan Dian Widiyanto Chandra,S.kom., M.cs "Penetration Testing Sistem Jaringan Komputer Untuk Mengetahui Kerentanan Kemanan Server Dengan Menggunakan Metode Penetration Testing Execution Standart (PTES) Studi Kasus Rumah Sakit Santa Clara Madiun” Oktober 2014
Goel, Rohit, Durgesh Kumar, Abhishek Raja, 2014, "A Packet Filtering Firewall” in International Journal of Emerging Technology and Advanced Engineering, Vol. 4 Special Issue 1, February 2014, pp. 362-363.
Tejvir Kaur, Vimmi Malhotra, Dr. Dheerendra Singh, 2014, "Comparison of network security tools- Firewall Intrusion Detection System and Honeypot” in International Journal of Enhanced Research in Science Technology & Engineering, Vol. 3 Issue 2, February 2014, pp. 201-202.
Kumar, Ashish, Ajay K. Sharma, Arun Singh, Dr. B. R. Ambedkar, 2012, "Performance Evaluation of Centralized Multicasting Network over ICMP Ping Flood for DdoS” in International Journal of Computer Applications, Vol. 37, January 2012, pp. 3.