Back to Search Start Over

TAARA Method for Processing on the Network Forensics in the Event of an ARP Spoofing Attack

Authors :
Agus Wijayanto
Imam Riadi
Yudi Prayudi
Source :
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), Vol 7, Iss 2, Pp 208-217 (2023)
Publication Year :
2023
Publisher :
Ikatan Ahli Informatika Indonesia, 2023.

Abstract

According to reports in 2021 by Kaspersky, requests for investigations into suspicious network activity, such as ARP Spoofing, which can result in sophisticated attacks, reached up to 22%. Several difficulties with examining network systems have been overcome thanks to network forensic investigations. This study aims to perform a network forensic analysis of ARP spoofing attacks using Wireshark forensic tools and Network Miner with a sniffer design process to capture traffic on the router side. In order to gather reliable evidence, this study employs the TAARA method as a network forensic investigation process. Based on the research conducted, it can be demonstrated that an attack took place from eight PCAP files. The information that was gathered, such as the IP address and MAC address of the attacker, the IP address and MAC address of the target, and the date and time of the attack are examples of evidence information that was gathered. This study also shows that network forensic operations can use the Wireshark forensic tool to obtain more detailed data.

Details

Language :
English
ISSN :
25800760
Volume :
7
Issue :
2
Database :
Directory of Open Access Journals
Journal :
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi)
Publication Type :
Academic Journal
Accession number :
edsdoj.76341f462ca64071b3d85079a61e1a99
Document Type :
article
Full Text :
https://doi.org/10.29207/resti.v7i2.4589