Analisis Keamanan Jaringan Terhadap Serangan Packet Sniffing Menggunakan Wireshark, Ettercap dan PCAP-Droid
Abstract
Keywords
Full Text:
PDFReferences
Moussa, A., & Wazid, M. (2023). “A Survey on Security Threats and Solutions in Cloud Computing and Internet of Things”. International Journal of Computer Applications, 175(1), 56-63
Kurose, J. F., & Ross, K. W. (2017). “Computer Networking: A Top-Down Approach”. Pearson.
Sharma, R., & Singh, M. (2021). “Packet Sniffing and Network Security: Techniques and Tools”. Journal of Cyber Security Technology, 5(3), 123-135.
Bargig, A., Shaar, M., & Zaher, H. (2022). “Utilizing Ettercap in Network Traffic Sniffing and Man-in-the- Middle Attacks”. International Journal of Information Technology and Security, 15(2)
Sundaram, K., Rajendran, S., & Kumar, N. (2023). “Pcapdroid: Mobile Packet Sniffing and Security Analysis”. Journal of Wireless Communication and Mobile Computing, 2023
Husain, M., Sharma, S., & Kapoor, V. (2021). “The Importance of Securing Web Login Systems: A Review of Authentication Methods and Encryption Protocols”. Journal of Information Security, 12(4), 65-78
Thomas, A., & Singh, R. (2021).“Securing Online Transactions with HTTPS: Analyzing the Role of Digital Certificates in Web Security”. Cybersecurity Review, 5(3), 65-80
Kurose, J. F., & Ross, K. W. (2017). “Computer Networking: A Top-Down Approach”. Pearson.
Shinder, D. L., & Cross, M. (2008). “Microsoft Internet Information Services (IIS) 7.0 Administrator's Pocket Consultant”. Microsoft Press.
Chen, X., & Zheng, Y. (2023). “An Overview of Web Security Protocols: HTTP, HTTPS, and Their Role in Securing Web Applications”. Journal of Cybersecurity and Privacy, 1(4), 112-127
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.