Implementasi Log Dalam Forensik Router Terhadap Serangan Distributed Denial of Service(DDoS)
Isi Artikel Utama
Abstrak
Rincian Artikel
Referensi
ICION 2017. Teknologi Keamanan Fokus Konferensi Indonesia CIO Network di bali. Diakses 15 April 2017, dengan alamat https://komite.id/category/cyber/
Muamalah D. dan Riadi I., (2017). “ Network Forensics For Detecting Flooding Attack On Web Serverâ€, International Journal of Computer Science and Information Security, Vol.15, No. 2
Riadi imam (2012), “Log Analysis Techniques using Clustering in Network Forensicsâ€, International Journal of Computer Science and Information Security (IJCSIS) , Vol. 10, No.7
Shenbagavalli. (2015). “ Router Interface Based IP Traceback Method for DDoS Attack in IPv6 Networkâ€. Journal of Resent Research in Engineering and Technology, Vol 2 Issue 3 ISSN : 2349-2252
Iswardani A, Riadi I, (2016). "Danial of Service Log Analysis Using Density K-Means Methodâ€, Journal of Theoretical & Applied Information Technology, Vol. 83 Issue 2, ISSN: 1992-8645.
Cartealy I. (2013). “Linux Networkingâ€, Jasakom, ISBN : 978-979-1090-73-5
Fadhila Nisya Tanjung, Muhammad Irwan Padli Nasution, (2012) Implementasi Pemrograman Java Untuk Alert Intrusion Detection System, pematang siantar, 31 agustus – 2 september 2012, ISBN 978-602-18749-0-5, https://www.researchgate.net/publication/307973619 di akses 29 September 2016
Sahid Aris Budiman, Catur Iswahyudi, Muhammad Sholeh, (2014), Implementasi Intrusion Detection System (Ids) Menggunakan Jejaring Sosial Sebagai Media Notifikasi, Yogyakarta, 15 November 2014, ISSN: 1979-911X
I Wayan Bevin Waranugraha, Ary Mazharuddin S. , dan Baskoro Adi Pratomo (2012), Aplikasi Forensik Jaringan Terdistribusi Menggunakan JADE, Jurnal Teknik Pomits Vol. 1, No. 1, (2012) 1-6.
Ariyus Doni, 2006, Computer Security, Andi, Yogyakarta
Faisal Riyadi, (2014), Forensik Jaringan Pada Lalu Lintas Data Dalam Jaringan Honeynet Di Indonesia Security Incident Respone Team On Internet Infrastructure/Coordination Center, Jurnal ICT Penelitian dan Penerapan Teknologi. Diakses 15 September 2016 dengan alamat URL : https://simonline.akademitelkom.ac.id/slims/index.php?p=show_detail&id=1130
Azikin Askari, 2011, Debian GNU/Linux, Informatika, Bandung ISBN : 978-602-8758-28-24
Yogi Surya Nugroho, 2015, Investigasi Forensik Jaringan Dari serangan DDoS menggunakan metode Naïve Bayes, skripsi, Fakultas Sains dan Teknologi, UIN Sunan kalijaga, Yogyakarta.
Valentina dan Mirjana, (2014). “Applcation of Forensic Analisys for Intrusion Detection against DDoS Attacks in Mobile Ad Hoc Networksâ€. Latest Trends in Information Technology, ISBN : 978-1-61804-134-0
Jeong, E. dan Lee, B., (2014). “An IP TraceBack Protocol using a Copressed Hash Table, a Sinkhole Router and Data Mining based on Network Forensics againstâ€, Future Generation Computer Systems 33 (2014) 42-2, Diakses 15 Januari 2017 dengan alamat URL: ttp://elsevier.com/locate/fgcs
Kemmish, R. M, 2015, What is forensic computer. Australian institute of Criminology, Canberra. http://www.aic.gov.au/publications/tandi/ti118.pdf