SlideShare a Scribd company logo
Method To Uncover IP Spoofing Attack
On Network Forensics Using NFAT and
IP Correlation As Combined Approach
ICOIACT 2019 Yogyakarta
(24 – 25 July 2019)
Presented By :
Suryo P. Utomo (National Anti – Narcotics Agency Republic of Indonesia)
Issue
• Cyber Attack on Government Service using IP Spoofing
• Perpetrator's real IP is difficult to trace
• Proprietary solution mostly to defense network not to trace the
attacker
IP Spoofing / IP Address Forgery
• Yearly report form ID SIRTII (Indonesia Cyber
Incident Response Team under BSSN)
• 232.447.974 total attack
• Go.id become the most victim
Some
Research to
Address Issue
• Synergizes NFAT (Network Forensic Analysis
Tool) with IDS (Intrusion Detection System) with
Firewalls (Correy2002)
• IP Correlation
• Matrix based visualization for network
forensics (Shi2016)
• Payload attribution scheme (Hosseini2018)
Research Method
Opportunity
• A sufficient researches to address the issue already been there but
unfortunately is not unified
• How to integrate this research products into one solution
• Break it into component then glue into a prototype
Component
• Sniffer
• Input / Filter
• IP Correlation
• Threat Source
• Analyst Tool
Proposed Prototype Model
Gap & Findings
• The gap :
• Real network implementation
• Theoretical domain
• The findings of the proposed integrated system
• Reliable feeding information from threat crowd and the capacity of evidence
fusion database storage
Conclusion
• An integrated solution to address the issue of IP spoofing attack using
the previous studies is possible to answer the difficulty in uncovering
digital trace from the attacker who is using IP spoofing to avoid
detection from law enforcer agency.
• This proposed solution has advantage that borrows from previous
research
Future Works
• Develop prototype
• Test in virtual networks

More Related Content

Similar to Method To Uncover IP Spoofing Attack (ICOIACT)

Trend Internet of Things
Trend Internet of ThingsTrend Internet of Things
Trend Internet of Things
Deris Stiawan
 
509286-Aki_Koivu-Review
509286-Aki_Koivu-Review509286-Aki_Koivu-Review
509286-Aki_Koivu-Review
Aki Koivu
 
PRIVACY-PRESERVING MACHINE AUTHENTICATED KEY AGREEMENT FOR INTERNET OF THINGS
PRIVACY-PRESERVING MACHINE AUTHENTICATED KEY AGREEMENT FOR INTERNET OF THINGSPRIVACY-PRESERVING MACHINE AUTHENTICATED KEY AGREEMENT FOR INTERNET OF THINGS
PRIVACY-PRESERVING MACHINE AUTHENTICATED KEY AGREEMENT FOR INTERNET OF THINGS
IJCNCJournal
 
A signature-based data security and authentication framework for internet of...
A signature-based data security and authentication framework  for internet of...A signature-based data security and authentication framework  for internet of...
A signature-based data security and authentication framework for internet of...
IJECEIAES
 
Trend & challenges Internet of Things
Trend & challenges Internet of ThingsTrend & challenges Internet of Things
Trend & challenges Internet of Things
Deris Stiawan
 
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
IJECEIAES
 
IoT and the implications on business IT architecture and security
IoT and the implications on business IT architecture and securityIoT and the implications on business IT architecture and security
IoT and the implications on business IT architecture and security
DeniseFerniza
 
Unauthorized Access Detection in IoT using Canary Token Algorithm
Unauthorized Access Detection in IoT using Canary Token AlgorithmUnauthorized Access Detection in IoT using Canary Token Algorithm
Unauthorized Access Detection in IoT using Canary Token Algorithm
IJSRED
 
Analysis of Honeypot Networks and Intrusion Prevention System IPS on Wireless...
Analysis of Honeypot Networks and Intrusion Prevention System IPS on Wireless...Analysis of Honeypot Networks and Intrusion Prevention System IPS on Wireless...
Analysis of Honeypot Networks and Intrusion Prevention System IPS on Wireless...
ijtsrd
 
IRJET - Cyber Security Threats and Measures in Context with IoT
IRJET -  	  Cyber Security Threats and Measures in Context with IoTIRJET -  	  Cyber Security Threats and Measures in Context with IoT
IRJET - Cyber Security Threats and Measures in Context with IoT
IRJET Journal
 
Running head INTERNET OF THINGS1INTERNET OF THINGS10.docx
Running head INTERNET OF THINGS1INTERNET OF THINGS10.docxRunning head INTERNET OF THINGS1INTERNET OF THINGS10.docx
Running head INTERNET OF THINGS1INTERNET OF THINGS10.docx
cowinhelen
 
A survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusA survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current status
vivatechijri
 
A survey on cyber law
A survey on cyber lawA survey on cyber law
A survey on cyber law
Santosh Panda
 
SPEEDA INSIGHTS_Market Prospects for the Security Industry
SPEEDA INSIGHTS_Market Prospects for the Security IndustrySPEEDA INSIGHTS_Market Prospects for the Security Industry
SPEEDA INSIGHTS_Market Prospects for the Security Industry
Kyna Tsai
 
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docxINTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
vrickens
 
DEDA: An algorithm for early detection of topology attacks in the internet of...
DEDA: An algorithm for early detection of topology attacks in the internet of...DEDA: An algorithm for early detection of topology attacks in the internet of...
DEDA: An algorithm for early detection of topology attacks in the internet of...
IJECEIAES
 
Korea EU workshop - solutions and challenges for a Cognitive IoT
Korea EU workshop - solutions and challenges for a Cognitive IoTKorea EU workshop - solutions and challenges for a Cognitive IoT
Korea EU workshop - solutions and challenges for a Cognitive IoT
Raffaele Giaffreda
 
Internet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything ConnectivityInternet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything Connectivity
YogeshIJTSRD
 
Ph.D. Thesis: A Methodology for the Development of Autonomic and Cognitive In...
Ph.D. Thesis: A Methodology for the Development of Autonomic and Cognitive In...Ph.D. Thesis: A Methodology for the Development of Autonomic and Cognitive In...
Ph.D. Thesis: A Methodology for the Development of Autonomic and Cognitive In...
Universita della Calabria,
 
Lecture1_Introduction.pptx
Lecture1_Introduction.pptxLecture1_Introduction.pptx
Lecture1_Introduction.pptx
ishwar69
 

Similar to Method To Uncover IP Spoofing Attack (ICOIACT) (20)

Trend Internet of Things
Trend Internet of ThingsTrend Internet of Things
Trend Internet of Things
 
509286-Aki_Koivu-Review
509286-Aki_Koivu-Review509286-Aki_Koivu-Review
509286-Aki_Koivu-Review
 
PRIVACY-PRESERVING MACHINE AUTHENTICATED KEY AGREEMENT FOR INTERNET OF THINGS
PRIVACY-PRESERVING MACHINE AUTHENTICATED KEY AGREEMENT FOR INTERNET OF THINGSPRIVACY-PRESERVING MACHINE AUTHENTICATED KEY AGREEMENT FOR INTERNET OF THINGS
PRIVACY-PRESERVING MACHINE AUTHENTICATED KEY AGREEMENT FOR INTERNET OF THINGS
 
A signature-based data security and authentication framework for internet of...
A signature-based data security and authentication framework  for internet of...A signature-based data security and authentication framework  for internet of...
A signature-based data security and authentication framework for internet of...
 
Trend & challenges Internet of Things
Trend & challenges Internet of ThingsTrend & challenges Internet of Things
Trend & challenges Internet of Things
 
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
 
IoT and the implications on business IT architecture and security
IoT and the implications on business IT architecture and securityIoT and the implications on business IT architecture and security
IoT and the implications on business IT architecture and security
 
Unauthorized Access Detection in IoT using Canary Token Algorithm
Unauthorized Access Detection in IoT using Canary Token AlgorithmUnauthorized Access Detection in IoT using Canary Token Algorithm
Unauthorized Access Detection in IoT using Canary Token Algorithm
 
Analysis of Honeypot Networks and Intrusion Prevention System IPS on Wireless...
Analysis of Honeypot Networks and Intrusion Prevention System IPS on Wireless...Analysis of Honeypot Networks and Intrusion Prevention System IPS on Wireless...
Analysis of Honeypot Networks and Intrusion Prevention System IPS on Wireless...
 
IRJET - Cyber Security Threats and Measures in Context with IoT
IRJET -  	  Cyber Security Threats and Measures in Context with IoTIRJET -  	  Cyber Security Threats and Measures in Context with IoT
IRJET - Cyber Security Threats and Measures in Context with IoT
 
Running head INTERNET OF THINGS1INTERNET OF THINGS10.docx
Running head INTERNET OF THINGS1INTERNET OF THINGS10.docxRunning head INTERNET OF THINGS1INTERNET OF THINGS10.docx
Running head INTERNET OF THINGS1INTERNET OF THINGS10.docx
 
A survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusA survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current status
 
A survey on cyber law
A survey on cyber lawA survey on cyber law
A survey on cyber law
 
SPEEDA INSIGHTS_Market Prospects for the Security Industry
SPEEDA INSIGHTS_Market Prospects for the Security IndustrySPEEDA INSIGHTS_Market Prospects for the Security Industry
SPEEDA INSIGHTS_Market Prospects for the Security Industry
 
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docxINTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
INTERNET OF THINGS A STUDY ON SECURITY AND PRIVACY THREATSMd .docx
 
DEDA: An algorithm for early detection of topology attacks in the internet of...
DEDA: An algorithm for early detection of topology attacks in the internet of...DEDA: An algorithm for early detection of topology attacks in the internet of...
DEDA: An algorithm for early detection of topology attacks in the internet of...
 
Korea EU workshop - solutions and challenges for a Cognitive IoT
Korea EU workshop - solutions and challenges for a Cognitive IoTKorea EU workshop - solutions and challenges for a Cognitive IoT
Korea EU workshop - solutions and challenges for a Cognitive IoT
 
Internet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything ConnectivityInternet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything Connectivity
 
Ph.D. Thesis: A Methodology for the Development of Autonomic and Cognitive In...
Ph.D. Thesis: A Methodology for the Development of Autonomic and Cognitive In...Ph.D. Thesis: A Methodology for the Development of Autonomic and Cognitive In...
Ph.D. Thesis: A Methodology for the Development of Autonomic and Cognitive In...
 
Lecture1_Introduction.pptx
Lecture1_Introduction.pptxLecture1_Introduction.pptx
Lecture1_Introduction.pptx
 

Recently uploaded

Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 

Recently uploaded (20)

Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 

Method To Uncover IP Spoofing Attack (ICOIACT)

  • 1. Method To Uncover IP Spoofing Attack On Network Forensics Using NFAT and IP Correlation As Combined Approach ICOIACT 2019 Yogyakarta (24 – 25 July 2019) Presented By : Suryo P. Utomo (National Anti – Narcotics Agency Republic of Indonesia)
  • 2. Issue • Cyber Attack on Government Service using IP Spoofing • Perpetrator's real IP is difficult to trace • Proprietary solution mostly to defense network not to trace the attacker
  • 3. IP Spoofing / IP Address Forgery
  • 4. • Yearly report form ID SIRTII (Indonesia Cyber Incident Response Team under BSSN) • 232.447.974 total attack • Go.id become the most victim
  • 5. Some Research to Address Issue • Synergizes NFAT (Network Forensic Analysis Tool) with IDS (Intrusion Detection System) with Firewalls (Correy2002) • IP Correlation • Matrix based visualization for network forensics (Shi2016) • Payload attribution scheme (Hosseini2018)
  • 7. Opportunity • A sufficient researches to address the issue already been there but unfortunately is not unified • How to integrate this research products into one solution • Break it into component then glue into a prototype
  • 8. Component • Sniffer • Input / Filter • IP Correlation • Threat Source • Analyst Tool
  • 10. Gap & Findings • The gap : • Real network implementation • Theoretical domain • The findings of the proposed integrated system • Reliable feeding information from threat crowd and the capacity of evidence fusion database storage
  • 11. Conclusion • An integrated solution to address the issue of IP spoofing attack using the previous studies is possible to answer the difficulty in uncovering digital trace from the attacker who is using IP spoofing to avoid detection from law enforcer agency. • This proposed solution has advantage that borrows from previous research
  • 12. Future Works • Develop prototype • Test in virtual networks

Editor's Notes

  1. Thank you Chair Person for the opportunity. Ladies and gentlemen I would like to present our research on digital forensic with the title above. Based on the conference theme which is intelligent system for creative industries in disruption era. We know that the threat for creative industries is so massive.
  2. One of the example of disruption service in government is cyber attack using IP spoofing. This attack method is common to find in any digital forensic evidence. The use of IP spoofing is well known for the assailant to obfuscate his track. Unfortunately, proprietary and enterprise solution is focused to defense the network from threat. The capability to trace the attacker is not embedded.
  3. IP spoofing or the other name is IP address forgery is a method to change source up address with other IP address. This method usually use by the threat actor in MITM, DDOS, etc. The process to change one IP address to the other IP is not illegitimate action. We usually we find this behavior in NAT, proxy or VPN. It is a network feature by design. But if somebody use this feature to hide his criminal act then it could be a problem for the original owner of the Spoofed IP Address.
  4. This is information from the last year report from ID Sirtii. The attack on cyber infrastructure is quite humongous. We know the creative industry is build based on trust. If there is no trust then it is a matter of time when the industry will collapse. Example: data breach on Bukalapak and tokopedia which has impact to their user’s trust. The actor is still not arrested by law enforcer.
  5. So, in our journey to find solution for this research  problem. We found interesting proposal from Correy, Shi and Hosseini.  In bigger picture there are two approach to address IP Spoofing Issue, first, maximize the function of firewall and IDS by synergizes with NFAT, with this approach the forensic activity will begin before the incident or attack occurred thus it is possible to speed up investigation. Second, we must have capability to correlate every IP information faster, to do that an effective visualization and filter mechanism is a must. So that’s why these research become the core in our research.
  6. We used Design Research Methodology type 1 by Blessing and Chakrabakti as our research method. The main objective of this research is to find a prototype method or model to answer research problem. The research begin with research clarification, literature analysis is main input for this activity, the output is initial reference, impact and preliminary criteria. After the research clarification, we begin descriptive study with the input data analysis from previous stages with the output reference model and success criteria. This stages is reversible, if the descriptive study is not desired, it is possible to revert to stage 1.
  7. So, there is some opportunity that we find in these research, there are already sufficient research to address the issue and how an integrated proposed model can become a unified solution .
  8. There is five component in our proposed model: First, Sniffer component, we are using corey work as base to develop our sniffer. Second, filter component, we are using hosseini work For IP Correlation we are still using hosseini and also helped by zhihong work. For threat source we use crouwdsource database, which is from threatsource.org and also we borrow dempster-shafer theory and the last component we combine shi and sansoraah works for analyst tool.
  9. And so, this is our proposed prototype method / model solution. Here, you can see that firewall and IDS work together and synergize with NFAT, so forensic activity can begin before incident occurred. Every information captured by NFAT will be forward to filter, this filter is using payload attribute scheme, after that the filtered packet is send to evidence fusion database. The analyst will look the information via analyzer visualization tool that has packet logging traceback strategy.
  10. So, We must be honest that our research has gap which is real network implementation. This is because to implement traceback logging strategy, the router need to have probabilistic packet marking capability, and since some research still in theoretical domain, then we will have quite challenge to realize our models. And since we need reliable feeding information from threatcrowd database, we have a quite dependency with threatcrowd, and of course storage capacity can become issue for high traffic monitoring.
  11. And this is our conclusion, baca konklusi
  12. The last slide, this is our homework right now. We hope we can realize our models in the next year.