ANALISIS SERANGAN SIBER DENGAN WIRESHARK UNTUK NETWORK FORENSIC

Network forensics is the activity of capturing, recording, and analyzing events in the network to find the source and analyze the type of attack. Network forensics if done manually will take a long time to collect data and analyze the type of attack and find the source IP address of the attack. Then...

Full description

Saved in:
Bibliographic Details
Main Author: Ilham Fadilah, (Author)
Format: Book
Published: 2021-07-14.
Subjects:
Online Access:Link Metadata
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Network forensics is the activity of capturing, recording, and analyzing events in the network to find the source and analyze the type of attack. Network forensics if done manually will take a long time to collect data and analyze the type of attack and find the source IP address of the attack. Then used tools to collect logs. Emotet is a Trojan that is mainly spread via spam email (malspam). Infections may come via malicious scripts, macro-enabled document files, or malicious links. With the reappearance of the malware, it is necessary to know how the characteristics of the connection logs that occur by the malware are analyzed using the network forensic method after the analysis, it was found that the emotet malware uses the http protocol to retrieve data from the command center server.
Item Description:http://repository.upnvj.ac.id/11183/1/ABSTRAK.pdf
http://repository.upnvj.ac.id/11183/2/AWAL.pdf
http://repository.upnvj.ac.id/11183/3/BAB%201.pdf
http://repository.upnvj.ac.id/11183/4/BAB%202.pdf
http://repository.upnvj.ac.id/11183/5/BAB%203.pdf
http://repository.upnvj.ac.id/11183/6/BAB%204.pdf
http://repository.upnvj.ac.id/11183/7/BAB%205.pdf
http://repository.upnvj.ac.id/11183/8/DAFTAR%20PUSTAKA.pdf
http://repository.upnvj.ac.id/11183/9/DAFTAR%20RIWAYAT%20HIDUP.pdf
http://repository.upnvj.ac.id/11183/12/LAMPIRAN.pdf
http://repository.upnvj.ac.id/11183/11/ARTIKEL%20KI.pdf