Implementation of Live Forensic Virtual Router for Network Traffic Comparison
DOI:
https://doi.org/10.1234/1vd4xe47Keywords:
Virtual Router, Client, Forensic, AnalyzingAbstract
An entrepreneur or a service provider in the internet network world, will certainly find clients with different characters. Clients who are not technology blind, especially routers, sometimes want full access to the router, or some clients who ask to add a router to be able to directly access the router in full. Virtual Router allows clients to process their own network, as if the client has a router. Network forensics has the ability to reconstruct events using a system that stores all data traffic activities on the network, so that investigations can be carried out by looking back at events that have occurred and analyzing events that occurred in the past. Wireshark can review data packages in real time. This means that the wireshark application will monitor all incoming and outgoing data packets through a predefined interface and the next will display the results of the data package
References
C. M. Galang, S. Eko, and A. Imam, “Teknik Virtualisasi Router Menggunakan Metarouter Mikrotik (Studi Kasus: Laboratorium Jaringan Komputer Politeknik Negeri Lampung),” Politeknik Negeri Lampung, 2017.
A. Asmunin and A. Hermawan, “Penerapan dan Analisis Virtualisasi Router Menggunakan RouterOS,” Multinetics, vol. 2 (1), pp. 31–34, 2016, doi: 10.32722/vol2.no1.2016.pp31-34.
R. Towidjojo and Herman, Mikrotik MetaROUTER. Jasakom, 2016. [Online]. Available: http://www.jasakom.com
F. F. A. Firmansyah and R. Umar, “Analisis Forensik Metarouter pada Lalu Lintas Jaringan Klien,” Edu Komputika, vol. 6, no. 2, pp. 54–59, 2019.
Y. Wang, E. Keller, B. Biskeborn, J. van der Merwe, and J. Rexford, “Virtual routers on the move,” p. 231, 2008, doi: 10.1145/1402958.1402985.
F. Baumgartner, T. Braun, E. Kurt, and A. Weyland, “Virtual routers: A tool for networking research and education,” Computer Communication Review, vol. 33, no. 3, pp. 127–135, 2003, doi: 10.1145/956993.957008.
F. Firmansyah, A. Fadlil, and R. Umar, “Identifikasi Bukti Forensik Jaringan Virtual Router Menggunakan Metode NIST,” Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), vol. 5, no. 1, pp. 91–98, Feb. 2021, doi: 10.29207/resti.v5i1.2784.
A. Luse and J. Rursch, “Using a virtual lab network testbed to facilitate real-world hands-on learning in a networking course,” British Journal of Educational Technology, vol. 52, no. 3, 2021, doi: 10.1111/bjet.13070.
S. Xiao, “VR Open Computer Network Virtual Laboratory Based on Big Data Technology,” J Phys Conf Ser, vol. 1648, no. 4, p. 042105, Oct. 2020, doi: 10.1088/1742-6596/1648/4/042105.
N. Nelmiawati, N. C. Kushardianto, A. H. Tohari, Y. P. Hasibuan, and D. E. Kurniawan, “Rancang Bangun Lab Komputer Virtual Berbasis Cloud Computing Menggunakan Openstack Pada Jaringan Terpusat,” JOURNAL OF APPLIED INFORMATICS AND COMPUTING, vol. 2, no. 1, 2018, doi: 10.30871/jaic.v2i1.821.
X. QI, “The Construction and Research of Computer Network Laboratory Based on Virtual Simulation Technology,” DEStech Transactions on Engineering and Technology Research, no. amma, 2017, doi: 10.12783/dtetr/amma2017/13368.
S. Vighnesh, “A Virtual Laboratories for Computer Network,” Int J Res Appl Sci Eng Technol, vol. 6, no. 4, 2018, doi: 10.22214/ijraset.2018.4349.
S. A. Mandowen, “Analisis forensik komputer pada lalu lintas jaringan,” Jurnal Sains, vol. 16 (1), pp. 14–20, 2016.
F. H. P. Y. Firmansyah, “Analisis Simulasi Mitigasi Ancaman ARP Dan Round Trip Time Pada Lalu Lintas DHCP VTP,” Progresif: Jurnal Ilmiah Komputer, vol. 19, no. 1, pp. 137–144, Feb. 2023.
A. Ramli, S. Sriyono, and H. Ramza, “Analisa Kecepatan Lalu Lintas Data Jaringan Local Area Network Menggunakan Graphical Network Simulator 3 (GNS-3),” Electrical Engineering Acta, vol. 1, no. 1, pp. 13–19, May 2021, doi: 10.22236/ate.v1i1.6946.
Downloads
Published
Versions
- 2023-12-31 (2)
- 2023-12-31 (1)