International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 180 - Issue 35 |
Published: Apr 2018 |
Authors: Muhammad Alim Zulkifli, Imam Riadi, Yudi Prayudi |
![]() |
Muhammad Alim Zulkifli, Imam Riadi, Yudi Prayudi . Live Forensics Method for Analysis Denial of Service (DOS) Attack on Routerboard. International Journal of Computer Applications. 180, 35 (Apr 2018), 23-30. DOI=10.5120/ijca2018916879
@article{ 10.5120/ijca2018916879, author = { Muhammad Alim Zulkifli,Imam Riadi,Yudi Prayudi }, title = { Live Forensics Method for Analysis Denial of Service (DOS) Attack on Routerboard }, journal = { International Journal of Computer Applications }, year = { 2018 }, volume = { 180 }, number = { 35 }, pages = { 23-30 }, doi = { 10.5120/ijca2018916879 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2018 %A Muhammad Alim Zulkifli %A Imam Riadi %A Yudi Prayudi %T Live Forensics Method for Analysis Denial of Service (DOS) Attack on Routerboard%T %J International Journal of Computer Applications %V 180 %N 35 %P 23-30 %R 10.5120/ijca2018916879 %I Foundation of Computer Science (FCS), NY, USA
Denial of Service (DoS) attacks are structured network attacks that originate from multiple sources and converge to form large packet currents. A DoS attack aims to disrupt the services available on the target network by flooding the bandwidth or processing capacity system making the target server network become overloaded. Wireshark is a tool that can be used to detect DoS attacks on a Router network and perform network traffic analysis that has functions that are useful for network professionals, network administrators, researchers, and network software development, requiring the detection of DoS attacks on the Router and multiplying information as well as attracting forensics data as a digital evidence of DoS attacks on the Router through the Live Forensics method. This research succeeded in pulling data information of DoS attack on Router form activity log data and attacker IP address list.