ANALISIS SERANGAN DISTRIBUTED DENIAL OF SERVICE (DDoS) PADA ROUTER MENGGUNAKAN METODE LIVE FORENSIC

PUTRA, MUHAMMAD FAJAR and Stiawan, Deris and Heryanto, Ahmad (2020) ANALISIS SERANGAN DISTRIBUTED DENIAL OF SERVICE (DDoS) PADA ROUTER MENGGUNAKAN METODE LIVE FORENSIC. Undergraduate thesis, Sriwijaya University.

[thumbnail of RAMA_56201_09011181520009.pdf] Text
RAMA_56201_09011181520009.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (4MB) | Request a copy
[thumbnail of RAMA_56201_09011181520009_TURNITIN.pdf] Text
RAMA_56201_09011181520009_TURNITIN.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (4MB) | Request a copy
[thumbnail of RAMA_56201_09011181520009_0003047905_0022018703_01_front_ref.pdf]
Preview
Text
RAMA_56201_09011181520009_0003047905_0022018703_01_front_ref.pdf - Accepted Version
Available under License Creative Commons Public Domain Dedication.

Download (883kB) | Preview
[thumbnail of RAMA_56201_09011181520009_0003047905_0022018703_02.pdf] Text
RAMA_56201_09011181520009_0003047905_0022018703_02.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (295kB) | Request a copy
[thumbnail of RAMA_56201_09011181520009_0003047905_0022018703_03.pdf] Text
RAMA_56201_09011181520009_0003047905_0022018703_03.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (798kB) | Request a copy
[thumbnail of RAMA_56201_09011181520009_0003047905_0022018703_04.pdf] Text
RAMA_56201_09011181520009_0003047905_0022018703_04.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (2MB) | Request a copy
[thumbnail of RAMA_56201_09011181520009_0003047905_0022018703_05.pdf] Text
RAMA_56201_09011181520009_0003047905_0022018703_05.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (188kB) | Request a copy
[thumbnail of RAMA_56201_09011181520009_0003047905_0022018703_06_ref.pdf] Text
RAMA_56201_09011181520009_0003047905_0022018703_06_ref.pdf - Bibliography
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (299kB) | Request a copy
[thumbnail of RAMA_56201_09011181520009_0003047905_0022018703_07_lamp.pdf] Text
RAMA_56201_09011181520009_0003047905_0022018703_07_lamp.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (722kB) | Request a copy

Abstract

Distributed Denial of Service (DDoS) attacks on a network continue to grow in the society. Especially the DDoS DNS Flooding attack carried out by irresponsible people and aimed at someone else's Router network to paralyze the Router network. Therefore network forensics is needed to obtain forensic evidence so that the perpetrators of crimes can be prosecuted according to the applicable law. The purpose of this research is to identify DNS Flooding attack patterns, perform data acquisition and analizing the attacks on Router networks, and search for attack traffic information on Router networks that can be used as digital evidence through the Live Forensics method. The dataset used in this study is a dataset created by utilizing Hping3's tools to create DNS Flooding attack data traffic with three dataset creation scenarios, then the dataset will be extracted to get the attack pattern . The process of analyzing and data acquisition using the Wireshark tool aims to process data or information retrieval regarding the activity log and the attacker's IP address. In this study, it was successful in retrieving DDoS attack information data related to attack patterns, the state of the victim's computer before and after being attacked, activity log data and the attacker's IP address.

Item Type: Thesis (Undergraduate)
Uncontrolled Keywords: Serangan DDoS (Distibuted Denial of Service), DNS Flooding, Router, Live Forensics
Subjects: Q Science > QA Mathematics > QA8.9-QA10.3 Computer science. Artificial intelligence. Computational complexity. Data structures (Computer scienc. Mathematical Logic and Formal Languages
Divisions: 09-Faculty of Computer Science > 56201-Computer Systems (S1)
Depositing User: Users 9657 not found.
Date Deposited: 13 Jan 2021 06:19
Last Modified: 13 Jan 2021 06:19
URI: http://repository.unsri.ac.id/id/eprint/39555

Actions (login required)

View Item View Item