과제정보
The authors would like to thank the INSFORNET, Fakulti Teknologi Maklumat dan Komunikasi (FTMK), Universiti Teknikal Malaysia Melaka.
참고문헌
- R. Yu, X. Zhang, and M. Zhang, "Smart Home Security Analysis System Based on the Internet of Things," in 2021 IEEE 2nd International Conference on Big Data, Artificial Intelligence and Internet of Things Engineering, ICBAIE 2021, 2021, pp. 596-599, doi: 10.1109/ICBAIE52039.2021.9389849.
- N. Castelli, C. Ogonowski, T. Jakobi, M. Stein, G. Stevens, and V. Wulf, "What Happened in my Home ?: An End-User Development Approach for Smart Home Data Visualization," in 2017 CHI Conference on Human Factors in Computing Systems, 2017, pp. 853-866.
- E. Hamid, M. C. Ang, and A. Jaafar, "A Comparative Study on Visualization Technique for Home Network," in Progress in Intelligent Decision Science, 2021, pp. 71-85.
- V. C. Shekar, S. U. Rahman, S. V. B. DB, A. Mateen, and R. A.S, "Enhanced Network Security for IoT based Home Automation System," Int. J. Emerg. Res. Manag. Technol., vol. 6, no. 6, p. 278, 2018, doi: 10.23956/ijermt.v6i6.282.
- S. T. Ali, V. Sivaraman, A. Radford, and S. Jha, "A Survey of Securing Networks Using Software Defined Networking," IEEE Trans. Reliab., vol. 64, no. 3, pp. 1086-1097, 2015, doi: 10.1109/TR.2015.2421391.
- S. S. I. Samuel, "A review of connectivity challenges in IoT-smart home," in 2016 3rd MEC International Conference on Big Data and Smart City, ICBDSC 2016, 2016, pp. 364-367, doi: 10.1109/ICBDSC.2016.7460395.
- A. Crabtree, R. Mortier, T. Rodden, and P. Tolmie, "Unremarkable networking: the home network as a part of everyday life," Proc. Des. Interact. Syst. Conf. ACM., pp. 554-563, 2012, Accessed: Mar. 20, 2014. [Online]. Available: http://dl.acm.org/citation.cfm?id=2318039.
- A. Moallem, "Why should home networking be complicated?," in Advances in Usability Evaluation: Part II, CRC Press, 2013, pp. 4169-4178.
- R. Mortier et al., "Control and understanding: Owning your home network," 2012 Fourth Int. Conf. Commun. Syst. Networks (COMSNETS 2012), pp. 1-10, Jan. 2012, doi: 10.1109/COMSNETS.2012.6151322.
- C. Wilson, T. Hargreaves, and R. Hauxwell-Baldwin, "Benefits and risks of smart home technologies," Energy Policy, vol. 103, no. January, pp. 72-83, 2017, doi: 10.1016/j.enpol.2016.12.047.
- G. Conti and K. Abdullah, "Passive visual fingerprinting of network attack tools," in VizSEC/DMSEC '04: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, 2004, pp. 45-54, doi: 10.1145/1029208.1029216.
- J. L. Chen and K. C. Yen, "Transparent bridging support for bluetooth-IP service interworking," Int. J. Netw. Manag., vol. 12, no. 6, pp. 379-386, 2002, doi: 10.1002/nem.454.
- E. Anthi, S. Ahmad, O. Rana, G. Theodorakopoulos, and P. Burnap, "EclipseIoT: A secure and adaptive hub for the Internet of Things," Comput. Secur., vol. 78, pp. 477-490, 2018, doi: 10.1016/j.cose.2018.07.016.
- W. Rahman, P. T. Nguyen, M. Rusliyadi, E. Laxmi Lydia, and K. Shankar, "Network monitoring tools and techniques uses in the network traffic management system," Int. J. Recent Technol. Eng., vol. 8, no. 2 Special Issue 11, pp. 4182-4188, 2019, doi: 10.35940/ijrte.B1603.0982S1119.
- A. Rahman, K. R. Kawshik, A. A. Sourav, and A.-A. Gaji, "Advanced Network Scanning," Am. J. Eng. Res., no. 5, pp. 38-42, 2016, [Online]. Available: www.ajer.org.
- W. Da Chen and Z. X. Lin, "A Prototype Development of the Smart Mousetrap System Equipped with LoRa," 2018, doi: 10.1109/ICCE-China.2018.8448569.
- S. Ibnu Hunais, M. Yamin, "Penerapan Keamanan Jaringan Menggunakan Metode Host Based IDPS WLAN dan LAM Berbasis Web dan SMS Gateway," J. Sisfokom (Sistem Inf. dan Komputer), vol. 9, no. 1, p. 97, 2020. https://doi.org/10.32736/sisfokom.v9i1.770
- M. A. Doshi and P. Sharma, "Digital Forensics Analysis for Network Related Data," Int. Res. J. Eng. Technol., vol. 7, no. 4, pp. 1390-1398, 2020.
- D. Avasthi, "Network Forensic Analysis with Efficient Preservation for SYN Attack.," Int. J. Comput. Appl., vol. 46, no. 24, pp. 17-22, 2012, [Online]. Available: http://scholar.google.com/scholar?hl=en&btnG=Search&q=intitle:Network+Forensic+Analysis+with+Efficient+Preservation+for+SYN+Attack#0.
- C. Science, S. Madden, T. Supervisor, and A. Smith, "iNav: A Hybrid Approach to WiFi Localization and," 2008.
- M. R. Kurniawan and L. O. Sari, "Analisis Sistem Keamanan Wireless Local Area Network (Wlan) Pada Proses Tethering," Jom FTEKNIK, vol. 5, no. 2, pp. 1-7, 2018.
- E. Nasr, M. Jalloul, J. Bachalaany, and R. Maalouly, "Wi-Fi Network Vulnerability Analysis and Risk Assessment in Lebanon," MATEC Web Conf., vol. 281, p. 05002, 2019, doi: 10.1051/matecconf/201928105002.
- M. Akbar, "Perancangan Software Ids Snort Untuk Pendeteksian Serangan Interruption (Netcut) Pada Jaringan Wireless," J. INSTEK (Informatika Sains dan Teknol., vol. 3, no. 1, pp. 121-129, 2018, doi: 10.24252/instek.v3i1.5007.
- J. A. Yani, N. Palembang, and S. Selatan, "Evaluasi Penerapan Autentikasi Pengguna Wireless LAN Berbasis Radius Server Universitas Bina Darma," J. Mhs. Tek. Inform., no. 12, 2014.
- M. Mongiovi, P. Bogdanov, R. Ranca, E. E. Papalexakisy, C. Faloutsos, and A. K. Singh, "NetSpot: Spotting significant anomalous regions on dynamic networks," in Proceedings of the 2013 SIAM International Conference on Data Mining, SDM 2013, 2013, pp. 28-36, doi: 10.1137/1.9781611972832.4.
- Z. Ali, F. Naz, Javed, M. Qurban, M. Yasir, and S. Jehangir, "Analysis of VoIP over wired & wireless network with implementation of QoS CBWFQ & 802.11e," Int. J. Comput. Netw. Inf. Secur., vol. 12, no. 1, pp. 43-39, 2020, doi: 10.5815/ijcnis.2020.01.05.
- N. A. Fadzil and N. Jaafar, "Sikap Pelajar Sekolah Menengah Arab Jabatan Agama Islam Melaka Terhadap Pembelajaran Bahasa Arab," e-Prosiding PASAK 4. 24-25 April 2019, vol. 4, no. April, pp. 191-202, 2019.
- A. Almaarif and S. Yazid, "ARP Cache Poisoning sebagai Teknik Alternatif untuk Membatasi Penggunaan Bandwidth berbasis Waktu," J. Rekayasa Sist. Ind., vol. 5, pp. 108-113, 2018, doi: 10.25124/jrsi.v6i1.367.
- J. Hong, A. Levy, L. Riliskis, and P. Levis, "Don't talk unless i say so! securing the internet of things with default-off networking," in Proceedings - ACM/IEEE International Conference on Internet of Things Design and Implementation, IoTDI 2018, 2018, pp. 117-128, doi: 10.1109/IoTDI.2018.00021.
- T. Al-Kadi, Z. Al-Tuwaijri, and A. Al-Omran, "Arduino Wi-Fi network analyzer," in Procedia Computer Science, 2013, vol. 21, pp. 522-529, doi: 10.1016/j.procs.2013.09.073.
- A. Setiawan and A. I. Purnamasari, "Pengembangan Smart Home Dengan Microcontrollers ESP32 Dan MC-38 Door Magnetic Switch Sensor Berbasis Internet of Things (IoT) Untuk Meningkatkan Deteksi Dini Keamanan Perumahan," J. RESTI (Rekayasa Sist. dan Teknol. Informasi), vol. 3, no. 3, pp. 451-457, 2019, doi: 10.29207/resti.v3i3.1238.
- R. C. Joshi and E. S. Pilli, "Network Forensic Tools," in Fundamentals of Network Forensics., 2016, pp. 71-93.
- D. Gajjar and A. Prajapati, "EasyChair Preprint Working of Offline Cloud Storage Using FTP , RDP and RPC with Router," Am. J. Eng. Res., vol. 5, no. 6, pp. 38-42, 2020.
- V. Ndatinya, Z. Xiao, V. R. Manepalli, K. Meng, and Y. Xiao, "Network forensics analysis using Wireshark," Int. J. Secur. Networks, vol. 10, no. 2, pp. 91-106, 2015, doi: 10.1504/IJSN.2015.070421.
- I. P. A. E. Pratama and P. A. Dharmesta, "Implementasi Wireshark Dalam Melakukan Pemantauan Protocol Jaringan ( Studi Kasus : Intranet Jurusan Teknologi Informasi Universitas Udayana )," Mantik Penusa, vol. 3, no. 1, pp. 94-99, 2019.
- D. E. Goncharov, S. V. Zareshin, R. V. Bulychev, and D. S. Silnov, "Vulnerability analysis of the Wifi spots using WPS by modified scanner vistumbler," in Proceedings of the 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering, ElConRus 2018, 2018, vol. 2018-Janua, pp. 48-51, doi: 10.1109/EIConRus.2018.8317027.
- S. A. Soomro, H. Casakin, and G. V. Georgiev, "Sustainable design and prototyping using digital fabrication tools for education," Sustain., vol. 13, no. 3, pp. 1-17, 2021, doi: 10.3390/su13031196.
- B. Camburn et al., "Design prototyping methods: State of the art in strategies, techniques, and guidelines," Des. Sci., vol. 3, 2017, doi: 10.1017/dsj.2017.10.
- E. Hamid, N. Bahaman, A. Jaafar, A. M. Choo, and A. A. Malek, "Development of home network sustainable interface tools," Int. J. Adv. Comput. Sci. Appl., vol. 10, no. 2, pp. 72-76, 2019, doi: 10.14569/ijacsa.2019.0100210.
- N. binti Harum, N. A. Zakaria, N. A. Emran, Z. Ayop, and S. Anawar, "Smart book reader for visual impairment person using IoT device," Int. J. Adv. Comput. Sci. Appl., vol. 10, no. 2, pp. 251-255, 2019, doi: 10.14569/ijacsa.2019.0100233.