Claim Missing Document
Check
Articles

Found 2 Documents
Search

PENERAPAN METODE NETWORK FORENSIK UNTUK ANALISIS SERANGAN DOS PADA PERANGKAT ROUTER Singgih Mitro S; Dandan Sukma
Power Elektronik : Jurnal Orang Elektro Vol 12, No 1 (2023): POWER ELEKTRONIK
Publisher : Politeknik Harapan Bersama Tegal

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30591/polektro.v12i1.4616

Abstract

Abstract  Digital forensics is a part of forensic science that covers the discovery and investigation of matter (data) found on digital devices. At present the use of computer technology is so rapid that it helps human activities with the sophistication of computer network technology, behind all of that problems arise regarding network forensics. The main cause of network forensic problems is the act of misuse of technology by irresponsible people with the aim of utilizing other parties' network facilities for personal or group interests. DoS attacks (Denial of Service) one of the most common attacks on computer networks is a type of network attack Router that cannot service user requests, and ultimately causes the computer network to be down.  Kata Kunci − Digital Forensics, Network Forensics, DoS
PENERAPAN METODE NIJ UNTUK ANALISIS SERANGAN DOS PADA PERANGKAT IOT Singgih Mitro S; Dadan Sukma
Power Elektronik : Jurnal Orang Elektro Vol 12, No 2 (2023): POWER ELEKTRONIK
Publisher : Politeknik Harapan Bersama Tegal

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30591/polektro.v12i2.5093

Abstract

One of the problems of IoT is because many devices are connected to IoT in the industrial era 4.0, which ultimately distracts hackers from solving security mechanisms. One of the security factors of concern in this IoT device is a Denial of Service (DoS) attack on the Internet of Things (IoT) device network which results in a system being flooded with data continuously in a short time resulting in very dense network traffic. resulting in IoT device down. This study aims to apply the National Institute of Justice (NIJ) method in analyzing Denial of Service (DOS) attacks on Internet of Things (IoT) devices. The NIJ method includes stages such as preparation, incident handling, collection identification, collection, examination, analysis, reporting. The results of the study show that the NIJ method can be used to analyze DoS attacks on IoT devices and assist in taking action to prevent further attacks.