CFP last date
20 December 2024
Reseach Article

Live Forensics Method for Analysis Denial of Service (DOS) Attack on Routerboard

by Muhammad Alim Zulkifli, Imam Riadi, Yudi Prayudi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 180 - Number 35
Year of Publication: 2018
Authors: Muhammad Alim Zulkifli, Imam Riadi, Yudi Prayudi
10.5120/ijca2018916879

Muhammad Alim Zulkifli, Imam Riadi, Yudi Prayudi . Live Forensics Method for Analysis Denial of Service (DOS) Attack on Routerboard. International Journal of Computer Applications. 180, 35 ( Apr 2018), 23-30. DOI=10.5120/ijca2018916879

@article{ 10.5120/ijca2018916879,
author = { Muhammad Alim Zulkifli, Imam Riadi, Yudi Prayudi },
title = { Live Forensics Method for Analysis Denial of Service (DOS) Attack on Routerboard },
journal = { International Journal of Computer Applications },
issue_date = { Apr 2018 },
volume = { 180 },
number = { 35 },
month = { Apr },
year = { 2018 },
issn = { 0975-8887 },
pages = { 23-30 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume180/number35/29289-2018916879/ },
doi = { 10.5120/ijca2018916879 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:02:43.075344+05:30
%A Muhammad Alim Zulkifli
%A Imam Riadi
%A Yudi Prayudi
%T Live Forensics Method for Analysis Denial of Service (DOS) Attack on Routerboard
%J International Journal of Computer Applications
%@ 0975-8887
%V 180
%N 35
%P 23-30
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Denial of Service (DoS) attacks are structured network attacks that originate from multiple sources and converge to form large packet currents. A DoS attack aims to disrupt the services available on the target network by flooding the bandwidth or processing capacity system making the target server network become overloaded. Wireshark is a tool that can be used to detect DoS attacks on a Router network and perform network traffic analysis that has functions that are useful for network professionals, network administrators, researchers, and network software development, requiring the detection of DoS attacks on the Router and multiplying information as well as attracting forensics data as a digital evidence of DoS attacks on the Router through the Live Forensics method. This research succeeded in pulling data information of DoS attack on Router form activity log data and attacker IP address list.

References
  1. Fadil A, Riadi I, Aji S. Review of detection DDOS attack detection using naive bayes classifier for network forensics. Bull Electr Eng Informatics. 2017;6(2):140-148. doi:10.11591/eei.v6i2.605
  2. Mazdadi MI, Riadi I, Luthfi A. Live Forensics on RouterOS using API Services to Investigate Network Attacks. Int J Comput Sci Inf Secur. 2017;15(2):406-410.
  3. Riadi I, Sunardi;, Firdonsyah A. Forensic Investigation Technique on Android’s Blackberry Messenger using NIST Framework. Int J Cyber-Security Digit Forensics. 2017;16(4):198-205.
  4. Riadi I, Muhammad AW, Sunardi. Neural network-based ddos detection regarding hidden layer variation. J Theor Appl Inf Technol. 2017;95(15):3684-3691.
  5. Riadi I, Muhammad AW, Sunardi. Network Packet Classification Using Neural Network Based on Training Function and Hidden Layer Neuron Number Variation. Int J Adv Comput Sci Appl. 2017;8(6):1-4.
  6. Hermaduanti N, Riadi I. Automation framework for rogue access point mitigation in ieee 802.1X-based WLAN. J Theor Appl Inf Technol. 2016;93(2):287-296.
  7. Prayogo A, Riadi I, Luthfi A. Mobile Forensics Development of Mobile Banking Application using Static Forensic. Int J Comput Appl. 2017;160(1):5-10. doi:10.5120/ijca2017912925
  8. Usman L, Prayudi Y, Riadi I. Ransomware analysis based on the surface, runtime and static code method. J Theor Appl Inf Technol. 2017;95(11):2426-2433.
  9. Symantec T. Internet Security Threat Report. 2016;21(April).
  10. Ali. A and Hudaid Z. DNS Advanced Attacks and Analysis. 2014;8.1:63-74.
  11. Arasteh MD. Analyzing Multiple Logs For Forensics Evidence. Digit Investig. 2007;5(82):91.
  12. Dimaio VJ. Forensics Pathology. 2nd Ed. London: CRC Press; 2001.
  13. Medyawati H, Christiyanti M, Yunanto M. The Influence of Computer Self Efficacy , Computer Experience and Interface Design to Acceptance of Electronic Banking. Int J e-Education, e-Business, e-Management e-Learning. 2011;1(Empirical Study of Bank Costomers in Bekasi City):305-310.
  14. Mualfah D, Riadi I. Network Forensics For Detecting Flooding Attack On Web Server. IJCSIS) Int J Comput Sci Inf Secur. 2017;15(2):326-331.
  15. Luthfi A, Prastya SE, Luthfi A. Forensic Analysis of Unmanned Aerial Vehicle to Obtain GPS Log Data as Digital Evidence Forensic Analysis of Unmanned Aerial Vehicle to Obtain GPS Log Data as Digital Evidence. 2017;15(April):280-285.
  16. Riadi I, Eko J, Ashari A, - S. Internet Forensics Framework Based-on Clustering. Int J Adv Comput Sci Appl. 2013;4(12). doi:10.14569/IJACSA.2013.041217.
  17. Artformatics. Live Forensics.; 2013.
  18. L. Volonino and R A. Computer Forensics For Dummies. (Indianapolis, ed.). Wiley; 2008.
  19. Casey E. Handbook of Digital Forensics and Investigation. London: Elsevier Inc; 2010.
  20. Ardiantoro D. Pengantar DSN (Domain Name System). 2003:19-38.
  21. Sarsono W. Pemantauan Jaringan Komputer dengan DNS Server Berbasis Routing Statis Menggunakan Wireshark. 2012.
  22. Syahputra MJ, Faisal I, Kom M, et al. Deteksi Serangan Pada Jaringan Komputer Dengan Wireshark.
  23. M. Junaidi Syahputra, Ilham Faisal AB. Deteksi Serangan Pada Jaringan Komputer Dengan Wireshark Menggunakan Metode Anomaly-Based IDS. J Tek Elektro Terap. 2012;1 (2).
Index Terms

Computer Science
Information Sciences

Keywords

Analysis of DoS (Denial of Service) Attack Router Live Forensics