Analisis Forensik Jaringan pada Router Berbasis Log Menggunakan Metode Live Forensic
Keywords:
Laptop, Network, Wireshark, Router, Live ForensicsAbstract
The use of network technology is one of the facilities that is easily accessible widely. The router network becomes a link between two devices sending data packets from one network to another. This study uses a simulation with the main laptop device carried out a ping test to the IP network 172.16.10.1 to be connected to the router with the live forensic method aimed at analyzing suspicious data through the router network by accessing the PC client IP address 54.255.213.29 by utilizing the DNS protocol access connected to the wireshark tool to find the results of digital evidence Logs that record in real-time.
References
Adawiah, R., & Abror, J. M. (2025). SISTEM KEAMANAN JARINGAN KOMPUTER BERDASARKAN AHLI FORENSIK. Jurnal Teknologi Informasi: Jurnal Keilmuan Dan Aplikasi Bidang Teknik Informatika, 19(1).
Al Hakim, R. R., Putri, E. R. C., Hidayah, H. A., Pangestu, A., & Riani, S. (2022). Current Evidence on Bioinformatics Role and Digital Forensics That Contribute to Forensic Science: Upcoming Threat. Jurnal Riset Rumpun Matematika Dan Ilmu Pengetahuan Alam, 1(1), 25–32. https://doi.org/10.55606/jurrimipa.v1i1.157
Charan, P. V. S., Mohan Anand, P., Shukla, S. K., Selvan, N., & Chunduri, H. (2022). DOTMUG: A Threat Model for Target Specific APT Attacks-Misusing Google Teachable Machine. 10th International Symposium on Digital Forensics and Security, ISDFS 2022. https://doi.org/10.1109/ISDFS55398.2022.9800780
Damayanti, T. H., & Hikmah, I. R. (2022). Network Forensic Serangan DoS pada Jaringan Cloud berdasarkan Generic Framework for Network Forensics (GFNF). Edumatic: Jurnal Pendidikan Informatika, 6(2), 334–343.
Mandowen, S. A. (2016). Analisis forensik komputer pada lalu lintas jaringan. Jurnal SAINS, 16(1), 14–20.
Ponno, J. D. (2023). Penerapan digital forensik dalam pembuktian pencemaran nama baik di dunia maya. Lex Administratum, 12(1).
Pratama, Y. (2020). MAKING OF DIGITAL FORENSIC READINESS INDEX (DiFRI) MODELS TO MALWARE ATTACKS. Cyber Security Dan Forensik Digital, 3(2), 1–5. https://doi.org/10.14421/CSECURITY.2020.3.2.2005
Putri, R. U., & Istiyanto, J. E. (2012). Analisis Forensik Jaringan Studi Kasus Serangan SQL Injection pada Server Universitas Gadjah Mada. IJCCS (Indonesian Journal of Computing and Cybernetics Systems), 6(2), 101–112. https://doi.org/10.22146/IJCCS.2157
Rahmana, R., & Akmalb, G. L. (2024). Forensik Jaringan Untuk Investigasi Kejahatan Cyber. Jurnal Riset Sistem Informasi, 1(3), 70–76.
Ramadhan, R. A., Tira, A. T., & Fadhilah, M. R. (2024). Network Forensic: Analysis of Client Attack and Quality of Service Measurement by ARP Poisoning using Network Forensic Generic Process (NFGP) Model. SISTEMASI, 13(2), 713–727. https://doi.org/10.32520/STMSI.V13I2.3804
Ramadhani, S. S., Saragih, Y. M., Rahim, R., & Siahaan, A. P. U. (2017). Post-Genesis Digital Forensics Investigation. International Journal of Scientific Research in Science and Technology, 6(3), 164–166.
Tasmi, T., Antony, F., & Ubaidillah, U. (2022). NETWORK FORENSIK UNTUK MENGANALISA TRAFIK DATA GAME ONLINE. Klik - Jurnal Ilmu Komputer, 3(1), 50–58. https://doi.org/10.56869/KLIK.V3I1.352
Utami, S. D., Carudin, C., & Ridha, A. A. (2021). ANALISIS LIVE FORENSIC PADA WHATSAPP WEB UNTUK PEMBUKTIAN KASUS PENIPUAN TRANSAKSI ELEKTRONIK. Cyber Security Dan Forensik Digital, 4(1), 24–32. https://doi.org/10.14421/CSECURITY.2021.4.1.2416
Widodo, W., & Sugiantoro, B. (2018). PENERAPAN FRAMEWORK HARMONISED DIGITAL FORENSIC INVESTIGATION PROCESS (HDFIP) UNTUK MENDAPATKAN ARTIFAK BUKTI DIGITAL PADA SMARTPHONE TIZEN. Cyber Security Dan Forensik Digital, 1(2), 67–74. https://doi.org/10.14421/CSECURITY.2018.1.2.1352
Wolverton, M. (2016). Digital forensics in the library. Nature, 534(7605), 139–140. https://doi.org/10.1038/534139a