ANALISIS SERANGAN SIBER DENGAN WIRESHARK UNTUK NETWORK FORENSIC
Network forensics is the activity of capturing, recording, and analyzing events in the network to find the source and analyze the type of attack. Network forensics if done manually will take a long time to collect data and analyze the type of attack and find the source IP address of the attack. Then...
Saved in:
Main Author: | |
---|---|
Format: | Book |
Published: |
2021-07-14.
|
Subjects: | |
Online Access: | Link Metadata |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000 am a22000003u 4500 | ||
---|---|---|---|
001 | repoupnvj_11183 | ||
042 | |a dc | ||
100 | 1 | 0 | |a Ilham Fadilah, . |e author |
245 | 0 | 0 | |a ANALISIS SERANGAN SIBER DENGAN WIRESHARK UNTUK NETWORK FORENSIC |
260 | |c 2021-07-14. | ||
500 | |a http://repository.upnvj.ac.id/11183/1/ABSTRAK.pdf | ||
500 | |a http://repository.upnvj.ac.id/11183/2/AWAL.pdf | ||
500 | |a http://repository.upnvj.ac.id/11183/3/BAB%201.pdf | ||
500 | |a http://repository.upnvj.ac.id/11183/4/BAB%202.pdf | ||
500 | |a http://repository.upnvj.ac.id/11183/5/BAB%203.pdf | ||
500 | |a http://repository.upnvj.ac.id/11183/6/BAB%204.pdf | ||
500 | |a http://repository.upnvj.ac.id/11183/7/BAB%205.pdf | ||
500 | |a http://repository.upnvj.ac.id/11183/8/DAFTAR%20PUSTAKA.pdf | ||
500 | |a http://repository.upnvj.ac.id/11183/9/DAFTAR%20RIWAYAT%20HIDUP.pdf | ||
500 | |a http://repository.upnvj.ac.id/11183/12/LAMPIRAN.pdf | ||
500 | |a http://repository.upnvj.ac.id/11183/11/ARTIKEL%20KI.pdf | ||
520 | |a Network forensics is the activity of capturing, recording, and analyzing events in the network to find the source and analyze the type of attack. Network forensics if done manually will take a long time to collect data and analyze the type of attack and find the source IP address of the attack. Then used tools to collect logs. Emotet is a Trojan that is mainly spread via spam email (malspam). Infections may come via malicious scripts, macro-enabled document files, or malicious links. With the reappearance of the malware, it is necessary to know how the characteristics of the connection logs that occur by the malware are analyzed using the network forensic method after the analysis, it was found that the emotet malware uses the http protocol to retrieve data from the command center server. | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
690 | |a QA75 Electronic computers. Computer science | ||
690 | |a QA76 Computer software | ||
655 | 7 | |a Thesis |2 local | |
655 | 7 | |a NonPeerReviewed |2 local | |
787 | 0 | |n http://repository.upnvj.ac.id/11183/ | |
787 | 0 | |n https://repository.upnvj.ac.id/ | |
856 | 4 | 1 | |u http://repository.upnvj.ac.id/11183/ |z Link Metadata |