Implementasi dan Analisis Attack Tree pada Aplikasi DVWA Berdasar Metrik Time dan Cost
(1) Universitas Telkom, Indonesia
(2) Universitas Telkom, Indonesia
(3) Universitas Telkom, Indonesia
(*) Corresponding Author
Abstract
Full Text:
PDFReferences
Adem Tekerek, & Omer Faruk Bay. (2019). Design And Implementation Of An Artificial Intelligence-Based Web Application Firewall Model. Neural Network World, 29(4), 189–206. https://doi.org/10.14311/NNW.2019.29.013.
Andria. (2020). Analisis Celah Keamanan Website Menggunakan Tools WEBPWN3R di Kali Linux. Juli 2020 Generation Journal, 4(2). http://www.starrybyte.com.
Sampurna, M. R., Korespondensi, P., Muhammad, :, & Sampurna, R. (2022). Implementasi Hydra, FFUF Dan WFUZZ Dalam Brute Force DVWA. NetPLG Journal of Network and Computer Applications, 1(2).
Namit Gupta, & Abakash Saikia. (2007). Web Application Firewall.
Darojat, E. Z., Sediyono, E., & Sembiring, I. (2022). Vulnerability Assessment Website E-Government dengan NIST SP 800-115 dan OWASP Menggunakan Web Vulnerability Scanner. Jurnal Sistem Informasi Bisnis, 12(1), 36–44. https://doi.org/10.21456/vol12iss1pp36-44.
Kuipers, L. (2020). Analysis of Attack Trees: fast algorithms for subclasses.
Ingoldsby, T. R. (2009). Attack Tree-based Threat Risk Analysis. www.amenaza.com
DOI: https://doi.org/10.30645/kesatria.v4i4.234
DOI (PDF): https://doi.org/10.30645/kesatria.v4i4.234.g232
Refbacks
- There are currently no refbacks.
Published Papers Indexed/Abstracted By: