Analysis of Brute Force Attacks Using National Institute Of Standards And Technology (NIST) Methods on Routers

Catur Pamungkas, Purwono Hendradi, Dimas Sasongko, Afwan Ghifari
{"title":"Analysis of Brute Force Attacks Using National Institute Of Standards And Technology (NIST) Methods on Routers","authors":"Catur Pamungkas, Purwono Hendradi, Dimas Sasongko, Afwan Ghifari","doi":"10.20895/inista.v5i2.1039","DOIUrl":null,"url":null,"abstract":"Abstract
 The rapid development of technology, including the internet, can trigger data security issues that harm individuals, organizations, or government agencies. One type of attack often used is a Brute Force attack, which falls under the category of cybercrime. The National Institute of Standards and Technology (NIST) often analyzes digital evidence in these cases. This study analyzes Brute Force attacks using NIST methods on a router that is an additional router to the main router. On the network at the Faculty of Engineering, Universitas Muhammadiyah Magelang (UNIMMA), information about the attack and patterns used by the attacker were successfully obtained, including the IP address and time of the attack. It is concluded that the additional router is vulnerable to Brute Force attacks, and firewall settings are necessary to secure it.","PeriodicalId":499741,"journal":{"name":"Journal of Informatics, Information System, Software Engineering and Applications","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Informatics, Information System, Software Engineering and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.20895/inista.v5i2.1039","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Abstract The rapid development of technology, including the internet, can trigger data security issues that harm individuals, organizations, or government agencies. One type of attack often used is a Brute Force attack, which falls under the category of cybercrime. The National Institute of Standards and Technology (NIST) often analyzes digital evidence in these cases. This study analyzes Brute Force attacks using NIST methods on a router that is an additional router to the main router. On the network at the Faculty of Engineering, Universitas Muhammadiyah Magelang (UNIMMA), information about the attack and patterns used by the attacker were successfully obtained, including the IP address and time of the attack. It is concluded that the additional router is vulnerable to Brute Force attacks, and firewall settings are necessary to secure it.
使用美国国家标准与技术研究所(NIST)方法对路由器进行暴力破解攻击分析
摘要# x0D;包括互联网在内的技术的快速发展,可能引发伤害个人、组织或政府机构的数据安全问题。经常使用的一种攻击是蛮力攻击,属于网络犯罪的范畴。美国国家标准与技术研究所(NIST)经常分析这些案件中的数字证据。本研究分析了使用NIST方法对路由器进行暴力破解攻击,该路由器是主路由器的附加路由器。在Universitas Muhammadiyah Magelang (UNIMMA)工程学院的网络上,成功获取了攻击者的攻击信息和攻击模式,包括攻击的IP地址和攻击时间。结论是,额外的路由器容易受到蛮力攻击,防火墙设置是必要的,以确保它。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信