ANALISIS SERANGAN SIBER DENGAN WIRESHARK UNTUK NETWORK FORENSIC

Network forensics is the activity of capturing, recording, and analyzing events in the network to find the source and analyze the type of attack. Network forensics if done manually will take a long time to collect data and analyze the type of attack and find the source IP address of the attack. Then...

Full description

Saved in:
Bibliographic Details
Main Author: Ilham Fadilah, (Author)
Format: Book
Published: 2021-07-14.
Subjects:
Online Access:Link Metadata
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000 am a22000003u 4500
001 repoupnvj_11183
042 |a dc 
100 1 0 |a Ilham Fadilah, .  |e author 
245 0 0 |a ANALISIS SERANGAN SIBER DENGAN WIRESHARK UNTUK NETWORK FORENSIC 
260 |c 2021-07-14. 
500 |a http://repository.upnvj.ac.id/11183/1/ABSTRAK.pdf 
500 |a http://repository.upnvj.ac.id/11183/2/AWAL.pdf 
500 |a http://repository.upnvj.ac.id/11183/3/BAB%201.pdf 
500 |a http://repository.upnvj.ac.id/11183/4/BAB%202.pdf 
500 |a http://repository.upnvj.ac.id/11183/5/BAB%203.pdf 
500 |a http://repository.upnvj.ac.id/11183/6/BAB%204.pdf 
500 |a http://repository.upnvj.ac.id/11183/7/BAB%205.pdf 
500 |a http://repository.upnvj.ac.id/11183/8/DAFTAR%20PUSTAKA.pdf 
500 |a http://repository.upnvj.ac.id/11183/9/DAFTAR%20RIWAYAT%20HIDUP.pdf 
500 |a http://repository.upnvj.ac.id/11183/12/LAMPIRAN.pdf 
500 |a http://repository.upnvj.ac.id/11183/11/ARTIKEL%20KI.pdf 
520 |a Network forensics is the activity of capturing, recording, and analyzing events in the network to find the source and analyze the type of attack. Network forensics if done manually will take a long time to collect data and analyze the type of attack and find the source IP address of the attack. Then used tools to collect logs. Emotet is a Trojan that is mainly spread via spam email (malspam). Infections may come via malicious scripts, macro-enabled document files, or malicious links. With the reappearance of the malware, it is necessary to know how the characteristics of the connection logs that occur by the malware are analyzed using the network forensic method after the analysis, it was found that the emotet malware uses the http protocol to retrieve data from the command center server. 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
546 |a id 
690 |a QA75 Electronic computers. Computer science 
690 |a QA76 Computer software 
655 7 |a Thesis  |2 local 
655 7 |a NonPeerReviewed  |2 local 
787 0 |n http://repository.upnvj.ac.id/11183/ 
787 0 |n https://repository.upnvj.ac.id/ 
856 4 1 |u http://repository.upnvj.ac.id/11183/  |z Link Metadata