Back to Search
Start Over
TAARA Method for Processing on the Network Forensics in the Event of an ARP Spoofing Attack
- Source :
- Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), Vol 7, Iss 2, Pp 208-217 (2023)
- Publication Year :
- 2023
- Publisher :
- Ikatan Ahli Informatika Indonesia, 2023.
-
Abstract
- According to reports in 2021 by Kaspersky, requests for investigations into suspicious network activity, such as ARP Spoofing, which can result in sophisticated attacks, reached up to 22%. Several difficulties with examining network systems have been overcome thanks to network forensic investigations. This study aims to perform a network forensic analysis of ARP spoofing attacks using Wireshark forensic tools and Network Miner with a sniffer design process to capture traffic on the router side. In order to gather reliable evidence, this study employs the TAARA method as a network forensic investigation process. Based on the research conducted, it can be demonstrated that an attack took place from eight PCAP files. The information that was gathered, such as the IP address and MAC address of the attacker, the IP address and MAC address of the target, and the date and time of the attack are examples of evidence information that was gathered. This study also shows that network forensic operations can use the Wireshark forensic tool to obtain more detailed data.
Details
- Language :
- English
- ISSN :
- 25800760
- Volume :
- 7
- Issue :
- 2
- Database :
- Directory of Open Access Journals
- Journal :
- Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi)
- Publication Type :
- Academic Journal
- Accession number :
- edsdoj.76341f462ca64071b3d85079a61e1a99
- Document Type :
- article
- Full Text :
- https://doi.org/10.29207/resti.v7i2.4589