Claim Missing Document
Check
Articles

Found 2 Documents
Search

Analisis Forensik Jaringan Terhadap Serangan Spoofing Menggunakan Metode Network Forensic Development Life Cycle Latifah Iriani; Muhammad Nasir Hafizh
Jurnal Adijaya Multidisplin Vol 1 No 05 (2023): Jurnal Adijaya Multidisiplin (JAM)
Publisher : PT Naureen Digital Education

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Penelitian ini bertujuan untuk menemukan informasi bukti serangan Address Resolution Protocol (ARP) Spoofing berupa alamat MAC address penyerang dan korban beserta waktu terjadinya serangan. Penelitian ini menggunakan tools wireshark untuk melihat lalu lintas jaringan, terutama pada protokol ARP dan menggunakan metode Network Foresnics Development Life Cycle (NFDLC) sebagai kerangka kerja selama proses simulasi sampai dengan pembuatan laporan barang bukti. Serangan ARP Spoofing dapat mengakibatkan terjadinya serangan lain, seperti Denial of Service dan Man in The Middle Attack, yang mana serangan ini memungkinkan pengguna tidak dapat mengakses kedalam jaringan dan terjadinya pencurian data. Pada tahapan simulasi dilakukan serangan kepada router dan komputer yang terhubung sehingga komunikasi data antara 2 perangkat ini akan melewati penyerang terlebih dahulu. Berdasarkan hasil pengujian yang dilakukan, berhasil ditemukan semua serangan ARP Spoofing yang terjadi pada jaringan dan diperoleh identitias IP Address dan MAC Address pelaku
Analisis forensik jaringan serangan ARP Spoofing menggunakan metode National Institute of Justice (NIJ) Latifah Iriani; Muhammad Nasir Hafizh; Khairina Eka Setyaputri
IT Explore: Jurnal Penerapan Teknologi Informasi dan Komunikasi Vol 4 No 2 (2025): IT-Explore Juni 2025
Publisher : Fakultas Teknologi Informasi, Universitas Kristen Satya Wacana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24246/itexplore.v4i2.2025.pp150-160

Abstract

This study aims to identify evidence of Address Resolution Protocol (ARP) Spoofing attacks in the form of the attacker's and victim's Media Access Control (MAC) addresses, as well as the time of the attack. With the increasing use of computer networks, ARP Spoofing attacks have become a serious threat that can lead to data theft, communication interception, and service disruption. ARP Spoofing can serve as a means to launch more complex attacks, such as Denial of Service (DoS) and Man in the Middle (MITM), which can cripple network systems and steal sensitive information. This study utilizes the Wireshark tool to monitor network traffic, specifically ARP, and applies the National Institute of Justice (NIJ) method as a framework for forensic investigation. The NIJ method was chosen because it provides a systematic approach to identifying, collecting, analyzing, and reporting digital evidence, enabling enhanced attack mitigation and supporting legal aspects in network security investigations. The specific approaches used in this forensic analysis include log analysis, packet capture and analysis using Wireshark, and traffic correlation to identify attack patterns based on time and involved devices. The attack simulation was conducted on Personal Computer (PC) 1 and a routerboard, where communication between these two devices was redirected through the attacker. Based on the test results, it was found that every device in the network experienced ARP Spoofing attacks, which could be detected and analyzed using the NIJ method. The contribution of this study is to provide a more systematic approach to forensic network investigations using the NIJ method, which not only aids in attack detection but also establishes a strong foundation for mitigation actions and legal enforcement in computer network security.