Abstract

The high of criminal level related to the field of networking, is a threat that is quite dangerous MITM. The perpetrators of this attack use a fake AP (access point) with different gateway settings that are legitimate AP, so this type of attack becomes quite difficult to detect. This is due to the lack of standard operating procedures (SOP) in handling this case. This research was conducted with the aim of making a forensic model based on the analysis stages in the Evil Twin based MITM case using the user side based live forensic method. The results of the forensic investigation in the study resulted in an investigative model of ENFGP (Extended NFGP) which was divided into 10 stages and consisted of 30 completion steps, obtained through the process of testing and implementation methods in the MITM based Evil Twin attack and further testing based on several previous forensic models

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.