Extended Generic Process Model for Analysis MITM Attack Based on Evil Twin

1Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The high of criminal level related to the field of networking, is a threat that is quite dangerous MITM. The perpetrators of this attack use a fake AP (access point) with different gateway settings that are legitimate AP, so this type of attack becomes quite difficult to detect. This is due to the lack of standard operating procedures (SOP) in handling this case. This research was conducted with the aim of making a forensic model based on the analysis stages in the Evil Twin based MITM case using the user side based live forensic method. The results of the forensic investigation in the study resulted in an investigative model of ENFGP (Extended NFGP) which was divided into 10 stages and consisted of 30 completion steps, obtained through the process of testing and implementation methods in the MITM based Evil Twin attack and further testing based on several previous forensic models.

Author supplied keywords

References Powered by Scopus

Get full text
Get full text
68Citations
54Readers
Get full text

Cited by Powered by Scopus

Analysis of Evil Twin, Deauthentication, and Disassociation Attacks on Wi-Fi Cameras

5Citations
9Readers
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Ahmad, M. S., Lutfi, S., & Abdullah, S. D. (2020). Extended Generic Process Model for Analysis MITM Attack Based on Evil Twin. In Journal of Physics: Conference Series (Vol. 1569). IOP Publishing Ltd. https://doi.org/10.1088/1742-6596/1569/2/022031

Readers over time

‘22‘23‘24‘2501234

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 3

100%

Readers' Discipline

Tooltip

Computer Science 2

67%

Engineering 1

33%

Save time finding and organizing research with Mendeley

Sign up for free
0