Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) (Mar 2023)

TAARA Method for Processing on the Network Forensics in the Event of an ARP Spoofing Attack

  • Agus Wijayanto,
  • Imam Riadi,
  • Yudi Prayudi

DOI
https://doi.org/10.29207/resti.v7i2.4589
Journal volume & issue
Vol. 7, no. 2
pp. 208 – 217

Abstract

Read online

According to reports in 2021 by Kaspersky, requests for investigations into suspicious network activity, such as ARP Spoofing, which can result in sophisticated attacks, reached up to 22%. Several difficulties with examining network systems have been overcome thanks to network forensic investigations. This study aims to perform a network forensic analysis of ARP spoofing attacks using Wireshark forensic tools and Network Miner with a sniffer design process to capture traffic on the router side. In order to gather reliable evidence, this study employs the TAARA method as a network forensic investigation process. Based on the research conducted, it can be demonstrated that an attack took place from eight PCAP files. The information that was gathered, such as the IP address and MAC address of the attacker, the IP address and MAC address of the target, and the date and time of the attack are examples of evidence information that was gathered. This study also shows that network forensic operations can use the Wireshark forensic tool to obtain more detailed data.

Keywords