PERBANDINGAN DDOS ATTACK MENGGUNAKAN TOOLS LOIC, HOIC DAN HULK DALAM MELAKUKAN PENYERANGAN PADA SUATU WEBSITE
DOI:
https://doi.org/10.51401/jinteks.v4i4.2190Keywords:
DDoS, Serangan, Website, HasilAbstract
In the Cyber world, attacks that are often carried out by hackers are DDoS attacks or DDoS Attacks. DDoS Attack is a form of attack that is carried out by sending packets continuously to a computer system or network. This DDoS attack, will result in the computer system or network being inaccessible and used by the user. Given the number of attacks that occur, the mechanism of DDOS attacks and how to deal with them can occur. These DDoS attacks are now already targeting specific services, which causes the targeted application to fail, while other network components (links, switches, routers) are fine.
References
Badriyah, M. (2011). Brute Force Attack. July, 1–7. http://edocs.ilkom.unsri.ac.id/1109/1/MuhamadRifki_09011181320049 [Accessed November 20, 2022].
Dinata, R. K., Safwandi, S., Hasdyna, N., & Mahendra, R. (2020). Kombinasi Algoritma Brute Force dan Stemming pada Sistem Pencarian Mashdar. CESS (Journal of Computer Engineering, System and Science), 5(2), 273–278. https://doi.org/10.24114/cess.v5i2.17989 [Accessed Januari 11, 2023].
Merlang, R. (2022). Simulasi Penetration Testing Center of e-Learning and Education for Students (Cerdas) Universitas Islam Riau Dengan Metode Brute Force Menggunakan Hatch. Fakultas Teknik Universitas Islam Riau Pekanbaru [Accessed Januari 10, 2023].
Mulyanto, Y., & Algi Fari, A. (2022). Analisis Keamanan Login Router Mikrotik Dari Serangan Brute force Menggunakan Metode Penetration Testing (Studi Kasus: SMK Negeri 2 Sumbawa). Jurnal Informatika, Teknologi Dan Sains, 4(3), 145–155. https://doi.org/10.51401/jinteks.v4i3.1897 [Accessed Januari 10, 2023].
Pramudita, K. E. (2018). Brute Force Attack dan Penerapannya pada Password Cracking. Makalah IF3051 Strategi Algoritma – Sem. I Tahun 2018, I(2011).https://informatika.stei.itb.ac.id/~rinaldi.munir/Stmik/20102011/Makalah2010/MakalahStima2010-062 [Accessed November 21, 2022].
R. R. Asaad, “Penetration Testing: Wireless Network Attacks Method on Kali Linux OS,” Acad. J. Nawroz Univ., vol. 10, no. 1, p. 7, 2021, doi: 10.25007/ajnu.v10n1a998.
Syani, M. (2020). Implementasi Intrusion Detection System (Ids) Menggunakan Suricata Pada Linux Debian 9 Berbasis Cloud Virtual Private Servers (Vps). Jurnal Inkofar, 1(1), 13–20. https://doi.org/10.46846/jurnalinkofar.v1i1.155 [Accessed November 20, 2022].
Sayed Achmady. (2557). Analysis Dictionary Attack dan Modifikasi Password Cracking Serta Strategi Antisipasi. 4(1), 88–100. http://journal.unigha.ac.id/index.php/JSR/article/view /12/10 [Accessed November 22, 2022].
Sampurna, M. R. (2022). Implementasi Hydra, FFUF Dan WFUZZ Dalam Brute Force DVWA: Implementasi Hydra, FFUF Dan WFUZZ Dalam Brute Force DVWA. Journal of Network and Computer Applications …, 1(2), 25–33. http://jurnal.netplg.com/index.php/jnca/article/view/11 [Accessed November 18, 2022].
Zikrillah, M. (2017). Analisa Serangan Password Cracking Pada Windows 10 Menggunakan Tools Pwdump v7.1 dan Cain & Abel. 1–13 [Accessed November 18, 2022]
Zaim, S., Nazori, A., & Syahrial, H. (2013). Perancangan Implementasi SHA-1 Password Cracking Berbasis FPGA: Studi Kasus Instansi XYZ. Jurnal TELEMATIKA MKOM, 5(1), 240–247 [Accessed Januari 10, 2023]
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 Alit Alit Juniska, Ni Made Gita Ayu Padmasari, Ni Ketut Rika Suryani, Komang Widhi Dharma Pratiwi, I Made Edy Listartha, Gede Arna Jude Saskara

This work is licensed under a Creative Commons Attribution 4.0 International License.
















