FORENSIC NETWORK ANALYSIS AND IMPLEMENTATION OF SECURITY ATTACKS ON VIRTUAL PRIVATE SERVERS

نویسندگان

چکیده

ABSTRACT-PT Kodinglab Integrasi Indonesia's Virtual Private Server (VPS) product requires good quality standards, including security. The challenge that arises is still frequent disruptions to the protection of PT Kodinglab's VPS customers, where it difficult identify source attack. Network forensics in form dead and live using NIST method with stages collection, examination, Analysis, reporting are used find Data for comes from snort tools, data capture Wireshark. collection stage involves collecting attack logs wireshark life forensics. While examination dataset further analyzed mapped. Advanced check on server via syslog snort. From testing carried out obtain information attacker's IP address, destination date attack, time, type TCP Flooding UDP attacks, all attacks customer's can be identified. obtained regarding attacker time occurred, address victim's protocol used. Kata kunci : Forensic, Dead Live Server, DDos, Flooding, Flooding.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security in Virtual private network

Information security, sometimes shortened to Info Sec, is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. It is a general term that can be used regardless of the form the data may take (e.g. electronic, physical). Virtual private networks (VPNs) offer low-cost, secure, dynamic access to pri...

متن کامل

An Analysis of Virtual Private Network Solutions

VPN services have been available for decades but not widely used until recently. A combination of new VPN technologies, network technologies and business communication requirements is the driving force behind the take-up of VPN services. This paper gives an overview of recent VPN solutions and analyses their scalability and flexibility. VPN solutions are categorized and related to potential cus...

متن کامل

analysis of power in the network society

اندیشمندان و صاحب نظران علوم اجتماعی بر این باورند که مرحله تازه ای در تاریخ جوامع بشری اغاز شده است. ویژگیهای این جامعه نو را می توان پدیده هایی از جمله اقتصاد اطلاعاتی جهانی ، هندسه متغیر شبکه ای، فرهنگ مجاز واقعی ، توسعه حیرت انگیز فناوری های دیجیتال، خدمات پیوسته و نیز فشردگی زمان و مکان برشمرد. از سوی دیگر قدرت به عنوان موضوع اصلی علم سیاست جایگاه مهمی در روابط انسانی دارد، قدرت و بازتولید...

15 صفحه اول

the geopolitics of afghanistan after september 11, 2001, and its impact on iranian national security

abstract u.s. attack to afghanistan after 9/11 provided opportunities for us who tried to become the dominant power after collapse of ussr and bipolar world. thinkers like fukuyama believed american liberal democrats thought would be universally accepted without resistances. liberal democracy is the best and final model of governance; in this regard, united state has moral responsibilities for...

15 صفحه اول

Design and Implementation of Virtual Private Services

Large scale distributed applications such as electronic commerce and online marketplaces (e.g., auction services) combine network access with multiple storage and computational elements. The distributed responsibility for resource control creates new security and privacy issues, caused by the complexity of the operating environment. In particular, policies at multiple layers and locations force...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Jusikom : Jurnal Sistem Informasi Ilmu Komputer

سال: 2023

ISSN: ['2580-2879']

DOI: https://doi.org/10.34012/jurnalsisteminformasidanilmukomputer.v6i2.2932