Data Security Analysis Using Virtual Ridgeback in Network Forensics

Authors

  • Firmansyah Firmansyah Universitas Islam Al-Azhar Author
  • Yusuf Hendra Pratama Universitas Islam Al-Azhar Author
  • Bayu Wibisana Universitas Islam Al-Azhar Author

DOI:

https://doi.org/10.1234/671wv888

Keywords:

security, defense, network forensics

Abstract

Recorded two hospitals in Jakarta were hit by cyberattacks which caused patient data in hospital computer networks to be inaccessible. Symantec is an American company that manufactures data security software, according to Symantec's report entitled Internet Security Threat Report Volume 24 which was released in February 2019 then, in 2018, as much as 2.23%, cyberattacks in the global arena occur in Indonesia, increasing from the previous year, namely 1.67%. Meanwhile, the figure also places Indonesia in fifth place as the country that has the most cyber threats in 2018. It can operate on physical networks or on virtual networks. The only requirement is that the Ridgeback installation has access to the layer 2 network layer. Ridgeback Network Defence makes resistance to intruders using interactive defences and causes intruders to spend unnecessary resources. Interactive Defence is an advanced disguise and fraud capability designed to ensnare intruders in several ways, namely by managing billions of feeds in the network that can trigger intruder responses, affect intruder behavior so that they are easier to detect, and block access to protected network services without revealing that service has been blocked. This research is expected to create a control center by adopting a Software Defined Network (SDN) so that it can capture intruders and get data about the attack, which can be used as evidence in the process of investigating network forensics quickly and precisely.

References

A, Fadlil., I, Riadi., & S, Aji. (2017). Pengembangan Sistem Pengamanan Jaringan Komputer Berdasarkan Analisis Forensik Jaringan. Volume 3(1), 11-19.

A, Fadlil, Imam Riadi, Sukma Aji. (2018). Pengaman Jaringan Menggunakan Sistem Berbasis Mikrokontroler Berdasarkan Analisis Forensik Jaringan, Palembang, 28-29 Mei 2016, ISBN: 978-602-19568-1-6.

Albert, S., & Juni, E. (2015). Analisa Sistem Pengaman Data Jaringan Berbasis VPN. Stmik Ikmi, 10(18), 220. Retrieved from www.ikmi.ac.id

Asmunin, Aditya Hermawan (2016). Penerapan dan Analisis Virtualisasi Router Menggunakan RouterOS, Jurnal MULTINETICS, Universitas Indonesia Jakarta, Vol.2 No.1 (2016) : 31-34.

E, K, Dewi., Dwi, H., Nisa, M. (2017). Snort Ids Sebagai Tools Forensik Jaringan Universitas Nusantara Pgri Kediri, Kediri, 22 Februari 2017, e-ISSN : 2549-7952.

Fadhila N.,T, Muhammad I.,P.,N, (2012). Implementasi Pemrograman Java Untuk Alert Intrusion Detection System, pematang siantar, 31 agustus – 2 september 2012, ISBN 978602-18749-0-5.

Faizin Ridho, Anton Yudhana, Imam Riadi. ( 2016 ). Analisis Forensik Router Untuk Mendeteksi Serangan Distributed Danial of Service (DDoS) Secara Real Time, Yogyakarta, 6 Desember 2016, Vol 2 No. 1, ISBN : 979-587-626-0.

Galang, C. M., Eko, S., & Imam, A. (2017). Teknik Virtualisasi Router Menggunakan Metarouter Mikrotik (Studi Kasus: Laboratorium Jaringan Komputer Politeknik Negeri Lampung), 2641–2644. https://doi.org/10.1111/ijlh.12426

I, Riadi. (2011). Optimalisasi Keamanan Jaringan Menggunakan Pemfilteran Aplikasi Berbasis Mikrotik Pendahuluan Landasan Teori. JUSI, Universitas Ahmad Dahlan Yogyakarta, 1(1), 71–80.

I,.Riadi. (2012). Log Analysis Techniques using Clustering in Network Forensics, International Journal of Computer Science and Information Security (IJCSIS) , Vol. 10, No.7.

I Riadi, R Umar, FD Aini.,(2019)Analisis Perbandingan Detection Traffic Anomaly Dengan Metode Naive Bayes Dan Support Vector Machine (Svm). ILKOM, Universitas Ahmad Dahlan Yogyakarta, Vol 11(1), 17-24.

Kristono., & Riadi, I. 2018. Simulation For Data Security Improvement In Exploited Metarouter. International Journal of Computer Science and Information Security. Vol 16(5): 6-15.

Mandowen, S.A.,(2016). Wireshark dan NetworkMiner dalam investigasi mengekstrak dan menganalisa paket file yang direkam pada jaringan dan mendapatkan bukti. Universitas Cenderawasih, Jayapura, Vol 16(1), 14-20.

R Umar, A Yudhana, MN Faiz. (2016). Analisis Live Forensics Untuk Perbandingan Kemananan Email Pada Sistem Operasi Proprietary. ILKOM, Universitas Ahmad Dahlan Yogyakarta, Vol 8(3), 242-247.

R Umar, A Yudhana, MN Faiz. (2017). Implementasi Live Forensics untuk Perbandingan Browser pada Keamanan Email. Jiska, Universitas Islam Negeri Sunan Kalijaga, Yogyakarta, 1 (3), 108-114.

Sahid Aris Budiman., Catur Iswahyudi., Muhammad Sholeh. (2014). Implementasi Intrusion Detection System (Ids) Menggunakan Jejaring Sosial Sebagai Media Notifikas. Yogyakarta, 15 November 2014. ISSN: 1979-911X.

www.ridgebacknet.com/download-ridgeback-white-paper/

Yudi Prayudi, Dedy Setyo Afrianto. (2007). Antisipasi Cybercrime Menggunakan Teknik Komputer Forensik, Yogyakarta, 16 Juni 2007, ISSN: 1907-5022..

Baru

Downloads

Published

2023-12-31 — Updated on 2023-12-31

Versions

How to Cite

[1]
F. Firmansyah, Y. H. Pratama, and B. Wibisana , Trans., “Data Security Analysis Using Virtual Ridgeback in Network Forensics”, SAKIRA, vol. 1, no. 2, pp. 52–56, Dec. 2023, doi: 10.1234/671wv888.

Most read articles by the same author(s)

1 2 > >> 

Similar Articles

You may also start an advanced similarity search for this article.