WEB PHISING ATTACK ANALYSIS ON E-COMMERCE SERVICE USING NETWORK FORENSIC PROCESS METHOD

The internet provides around the world facilities to reach customers without market restrictions, including e-commerce. As a result, the number of customers who depend on the Internet for purchases has increased dramatically. Potential cybercrime attacks such as phishing are criminal activities that...

Full description

Bibliographic Details
Main Authors: Aseh Ginanjar, Nur Widiyasono, Rohmat Gunawan
Format: Article
Language:Indonesian
Published: Universitas Kristen Duta Wacana 2019-02-01
Series:JUTEI (Jurnal Terapan Teknologi Informasi)
Subjects:
Online Access:https://jutei.ukdw.ac.id/index.php/jurnal/article/view/111
id doaj-a6e2c852b74c4646a4a2368aec16e190
record_format Article
spelling doaj-a6e2c852b74c4646a4a2368aec16e1902020-11-24T20:44:50ZindUniversitas Kristen Duta WacanaJUTEI (Jurnal Terapan Teknologi Informasi)2579-36752579-55382019-02-0122596910.21460/jutei.2018.22.111111WEB PHISING ATTACK ANALYSIS ON E-COMMERCE SERVICE USING NETWORK FORENSIC PROCESS METHODAseh GinanjarNur WidiyasonoRohmat GunawanThe internet provides around the world facilities to reach customers without market restrictions, including e-commerce. As a result, the number of customers who depend on the Internet for purchases has increased dramatically. Potential cybercrime attacks such as phishing are criminal activities that attempt to obtain illegally sensitive information. The sensitive information can be in the form of a username, password, and credit card details. Then it is necessary to analyze the non-volatile data obtained in real and sourced from a Facebook forum. Data acquisition techniques use forensic live network data processing using Network Protocol Analyzer tools, namely Wireshark. The results of the investigation and analysis are summarized in the form of the table. The success of the investigation can be found in the source of the attack in the form of IP Address, URL phishing, DNS protocol, IMAP, username, password, FTP, SMTP, and HTTP. The analysis provides recommendations on how to avoid web phishing attacks.https://jutei.ukdw.ac.id/index.php/jurnal/article/view/111Cybercrimee-commercephishingwireshark
collection DOAJ
language Indonesian
format Article
sources DOAJ
author Aseh Ginanjar
Nur Widiyasono
Rohmat Gunawan
spellingShingle Aseh Ginanjar
Nur Widiyasono
Rohmat Gunawan
WEB PHISING ATTACK ANALYSIS ON E-COMMERCE SERVICE USING NETWORK FORENSIC PROCESS METHOD
JUTEI (Jurnal Terapan Teknologi Informasi)
Cybercrime
e-commerce
phishing
wireshark
author_facet Aseh Ginanjar
Nur Widiyasono
Rohmat Gunawan
author_sort Aseh Ginanjar
title WEB PHISING ATTACK ANALYSIS ON E-COMMERCE SERVICE USING NETWORK FORENSIC PROCESS METHOD
title_short WEB PHISING ATTACK ANALYSIS ON E-COMMERCE SERVICE USING NETWORK FORENSIC PROCESS METHOD
title_full WEB PHISING ATTACK ANALYSIS ON E-COMMERCE SERVICE USING NETWORK FORENSIC PROCESS METHOD
title_fullStr WEB PHISING ATTACK ANALYSIS ON E-COMMERCE SERVICE USING NETWORK FORENSIC PROCESS METHOD
title_full_unstemmed WEB PHISING ATTACK ANALYSIS ON E-COMMERCE SERVICE USING NETWORK FORENSIC PROCESS METHOD
title_sort web phising attack analysis on e-commerce service using network forensic process method
publisher Universitas Kristen Duta Wacana
series JUTEI (Jurnal Terapan Teknologi Informasi)
issn 2579-3675
2579-5538
publishDate 2019-02-01
description The internet provides around the world facilities to reach customers without market restrictions, including e-commerce. As a result, the number of customers who depend on the Internet for purchases has increased dramatically. Potential cybercrime attacks such as phishing are criminal activities that attempt to obtain illegally sensitive information. The sensitive information can be in the form of a username, password, and credit card details. Then it is necessary to analyze the non-volatile data obtained in real and sourced from a Facebook forum. Data acquisition techniques use forensic live network data processing using Network Protocol Analyzer tools, namely Wireshark. The results of the investigation and analysis are summarized in the form of the table. The success of the investigation can be found in the source of the attack in the form of IP Address, URL phishing, DNS protocol, IMAP, username, password, FTP, SMTP, and HTTP. The analysis provides recommendations on how to avoid web phishing attacks.
topic Cybercrime
e-commerce
phishing
wireshark
url https://jutei.ukdw.ac.id/index.php/jurnal/article/view/111
work_keys_str_mv AT asehginanjar webphisingattackanalysisonecommerceserviceusingnetworkforensicprocessmethod
AT nurwidiyasono webphisingattackanalysisonecommerceserviceusingnetworkforensicprocessmethod
AT rohmatgunawan webphisingattackanalysisonecommerceserviceusingnetworkforensicprocessmethod
_version_ 1716816469404155905