Development of Sustainable Home-Network Security Tool |
Hamid, Erman
(Information Security Forensics and Computer Networking (INSFORNET), Fakulti Teknologi Maklumat dan Komunikasi, Universiti Teknikal Malaysia Melaka (UTeM))
Hasbullah, M. Syafiq E. (Information Security Forensics and Computer Networking (INSFORNET), Fakulti Teknologi Maklumat dan Komunikasi, Universiti Teknikal Malaysia Melaka (UTeM)) Harum, Norharyati (Information Security Forensics and Computer Networking (INSFORNET), Fakulti Teknologi Maklumat dan Komunikasi, Universiti Teknikal Malaysia Melaka (UTeM)) Anawar, Syarulnaziah (Information Security Forensics and Computer Networking (INSFORNET), Fakulti Teknologi Maklumat dan Komunikasi, Universiti Teknikal Malaysia Melaka (UTeM)) Ayop, Zakiah (Information Security Forensics and Computer Networking (INSFORNET), Fakulti Teknologi Maklumat dan Komunikasi, Universiti Teknikal Malaysia Melaka (UTeM)) Zakaria, Nurul Azma (Information Security Forensics and Computer Networking (INSFORNET), Fakulti Teknologi Maklumat dan Komunikasi, Universiti Teknikal Malaysia Melaka (UTeM)) Shah, Wahidah Md (Information Security Forensics and Computer Networking (INSFORNET), Fakulti Teknologi Maklumat dan Komunikasi, Universiti Teknikal Malaysia Melaka (UTeM)) |
1 | N. A. Fadzil and N. Jaafar, "Sikap Pelajar Sekolah Menengah Arab Jabatan Agama Islam Melaka Terhadap Pembelajaran Bahasa Arab," e-Prosiding PASAK 4. 24-25 April 2019, vol. 4, no. April, pp. 191-202, 2019. |
2 | T. Al-Kadi, Z. Al-Tuwaijri, and A. Al-Omran, "Arduino Wi-Fi network analyzer," in Procedia Computer Science, 2013, vol. 21, pp. 522-529, doi: 10.1016/j.procs.2013.09.073. DOI |
3 | A. Setiawan and A. I. Purnamasari, "Pengembangan Smart Home Dengan Microcontrollers ESP32 Dan MC-38 Door Magnetic Switch Sensor Berbasis Internet of Things (IoT) Untuk Meningkatkan Deteksi Dini Keamanan Perumahan," J. RESTI (Rekayasa Sist. dan Teknol. Informasi), vol. 3, no. 3, pp. 451-457, 2019, doi: 10.29207/resti.v3i3.1238. DOI |
4 | D. Gajjar and A. Prajapati, "EasyChair Preprint Working of Offline Cloud Storage Using FTP , RDP and RPC with Router," Am. J. Eng. Res., vol. 5, no. 6, pp. 38-42, 2020. |
5 | D. E. Goncharov, S. V. Zareshin, R. V. Bulychev, and D. S. Silnov, "Vulnerability analysis of the Wifi spots using WPS by modified scanner vistumbler," in Proceedings of the 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering, ElConRus 2018, 2018, vol. 2018-Janua, pp. 48-51, doi: 10.1109/EIConRus.2018.8317027. DOI |
6 | A. Moallem, "Why should home networking be complicated?," in Advances in Usability Evaluation: Part II, CRC Press, 2013, pp. 4169-4178. |
7 | R. Mortier et al., "Control and understanding: Owning your home network," 2012 Fourth Int. Conf. Commun. Syst. Networks (COMSNETS 2012), pp. 1-10, Jan. 2012, doi: 10.1109/COMSNETS.2012.6151322. DOI |
8 | G. Conti and K. Abdullah, "Passive visual fingerprinting of network attack tools," in VizSEC/DMSEC '04: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, 2004, pp. 45-54, doi: 10.1145/1029208.1029216. DOI |
9 | J. L. Chen and K. C. Yen, "Transparent bridging support for bluetooth-IP service interworking," Int. J. Netw. Manag., vol. 12, no. 6, pp. 379-386, 2002, doi: 10.1002/nem.454. DOI |
10 | A. Rahman, K. R. Kawshik, A. A. Sourav, and A.-A. Gaji, "Advanced Network Scanning," Am. J. Eng. Res., no. 5, pp. 38-42, 2016, [Online]. Available: www.ajer.org. |
11 | S. Ibnu Hunais, M. Yamin, "Penerapan Keamanan Jaringan Menggunakan Metode Host Based IDPS WLAN dan LAM Berbasis Web dan SMS Gateway," J. Sisfokom (Sistem Inf. dan Komputer), vol. 9, no. 1, p. 97, 2020. DOI |
12 | Z. Ali, F. Naz, Javed, M. Qurban, M. Yasir, and S. Jehangir, "Analysis of VoIP over wired & wireless network with implementation of QoS CBWFQ & 802.11e," Int. J. Comput. Netw. Inf. Secur., vol. 12, no. 1, pp. 43-39, 2020, doi: 10.5815/ijcnis.2020.01.05. DOI |
13 | R. C. Joshi and E. S. Pilli, "Network Forensic Tools," in Fundamentals of Network Forensics., 2016, pp. 71-93. |
14 | W. Da Chen and Z. X. Lin, "A Prototype Development of the Smart Mousetrap System Equipped with LoRa," 2018, doi: 10.1109/ICCE-China.2018.8448569. DOI |
15 | M. Mongiovi, P. Bogdanov, R. Ranca, E. E. Papalexakisy, C. Faloutsos, and A. K. Singh, "NetSpot: Spotting significant anomalous regions on dynamic networks," in Proceedings of the 2013 SIAM International Conference on Data Mining, SDM 2013, 2013, pp. 28-36, doi: 10.1137/1.9781611972832.4. DOI |
16 | I. P. A. E. Pratama and P. A. Dharmesta, "Implementasi Wireshark Dalam Melakukan Pemantauan Protocol Jaringan ( Studi Kasus : Intranet Jurusan Teknologi Informasi Universitas Udayana )," Mantik Penusa, vol. 3, no. 1, pp. 94-99, 2019. |
17 | B. Camburn et al., "Design prototyping methods: State of the art in strategies, techniques, and guidelines," Des. Sci., vol. 3, 2017, doi: 10.1017/dsj.2017.10. DOI |
18 | S. A. Soomro, H. Casakin, and G. V. Georgiev, "Sustainable design and prototyping using digital fabrication tools for education," Sustain., vol. 13, no. 3, pp. 1-17, 2021, doi: 10.3390/su13031196. DOI |
19 | E. Hamid, N. Bahaman, A. Jaafar, A. M. Choo, and A. A. Malek, "Development of home network sustainable interface tools," Int. J. Adv. Comput. Sci. Appl., vol. 10, no. 2, pp. 72-76, 2019, doi: 10.14569/ijacsa.2019.0100210. DOI |
20 | W. Rahman, P. T. Nguyen, M. Rusliyadi, E. Laxmi Lydia, and K. Shankar, "Network monitoring tools and techniques uses in the network traffic management system," Int. J. Recent Technol. Eng., vol. 8, no. 2 Special Issue 11, pp. 4182-4188, 2019, doi: 10.35940/ijrte.B1603.0982S1119. DOI |
21 | M. A. Doshi and P. Sharma, "Digital Forensics Analysis for Network Related Data," Int. Res. J. Eng. Technol., vol. 7, no. 4, pp. 1390-1398, 2020. |
22 | C. Science, S. Madden, T. Supervisor, and A. Smith, "iNav: A Hybrid Approach to WiFi Localization and," 2008. |
23 | M. Akbar, "Perancangan Software Ids Snort Untuk Pendeteksian Serangan Interruption (Netcut) Pada Jaringan Wireless," J. INSTEK (Informatika Sains dan Teknol., vol. 3, no. 1, pp. 121-129, 2018, doi: 10.24252/instek.v3i1.5007. DOI |
24 | R. Yu, X. Zhang, and M. Zhang, "Smart Home Security Analysis System Based on the Internet of Things," in 2021 IEEE 2nd International Conference on Big Data, Artificial Intelligence and Internet of Things Engineering, ICBAIE 2021, 2021, pp. 596-599, doi: 10.1109/ICBAIE52039.2021.9389849. DOI |
25 | M. R. Kurniawan and L. O. Sari, "Analisis Sistem Keamanan Wireless Local Area Network (Wlan) Pada Proses Tethering," Jom FTEKNIK, vol. 5, no. 2, pp. 1-7, 2018. |
26 | A. Almaarif and S. Yazid, "ARP Cache Poisoning sebagai Teknik Alternatif untuk Membatasi Penggunaan Bandwidth berbasis Waktu," J. Rekayasa Sist. Ind., vol. 5, pp. 108-113, 2018, doi: 10.25124/jrsi.v6i1.367. DOI |
27 | N. Castelli, C. Ogonowski, T. Jakobi, M. Stein, G. Stevens, and V. Wulf, "What Happened in my Home ?: An End-User Development Approach for Smart Home Data Visualization," in 2017 CHI Conference on Human Factors in Computing Systems, 2017, pp. 853-866. |
28 | E. Hamid, M. C. Ang, and A. Jaafar, "A Comparative Study on Visualization Technique for Home Network," in Progress in Intelligent Decision Science, 2021, pp. 71-85. |
29 | S. T. Ali, V. Sivaraman, A. Radford, and S. Jha, "A Survey of Securing Networks Using Software Defined Networking," IEEE Trans. Reliab., vol. 64, no. 3, pp. 1086-1097, 2015, doi: 10.1109/TR.2015.2421391. DOI |
30 | S. S. I. Samuel, "A review of connectivity challenges in IoT-smart home," in 2016 3rd MEC International Conference on Big Data and Smart City, ICBDSC 2016, 2016, pp. 364-367, doi: 10.1109/ICBDSC.2016.7460395. DOI |
31 | V. C. Shekar, S. U. Rahman, S. V. B. DB, A. Mateen, and R. A.S, "Enhanced Network Security for IoT based Home Automation System," Int. J. Emerg. Res. Manag. Technol., vol. 6, no. 6, p. 278, 2018, doi: 10.23956/ijermt.v6i6.282. DOI |
32 | J. A. Yani, N. Palembang, and S. Selatan, "Evaluasi Penerapan Autentikasi Pengguna Wireless LAN Berbasis Radius Server Universitas Bina Darma," J. Mhs. Tek. Inform., no. 12, 2014. |
33 | V. Ndatinya, Z. Xiao, V. R. Manepalli, K. Meng, and Y. Xiao, "Network forensics analysis using Wireshark," Int. J. Secur. Networks, vol. 10, no. 2, pp. 91-106, 2015, doi: 10.1504/IJSN.2015.070421. DOI |
34 | J. Hong, A. Levy, L. Riliskis, and P. Levis, "Don't talk unless i say so! securing the internet of things with default-off networking," in Proceedings - ACM/IEEE International Conference on Internet of Things Design and Implementation, IoTDI 2018, 2018, pp. 117-128, doi: 10.1109/IoTDI.2018.00021. DOI |
35 | N. binti Harum, N. A. Zakaria, N. A. Emran, Z. Ayop, and S. Anawar, "Smart book reader for visual impairment person using IoT device," Int. J. Adv. Comput. Sci. Appl., vol. 10, no. 2, pp. 251-255, 2019, doi: 10.14569/ijacsa.2019.0100233. DOI |
36 | A. Crabtree, R. Mortier, T. Rodden, and P. Tolmie, "Unremarkable networking: the home network as a part of everyday life," Proc. Des. Interact. Syst. Conf. ACM., pp. 554-563, 2012, Accessed: Mar. 20, 2014. [Online]. Available: http://dl.acm.org/citation.cfm?id=2318039. |
37 | C. Wilson, T. Hargreaves, and R. Hauxwell-Baldwin, "Benefits and risks of smart home technologies," Energy Policy, vol. 103, no. January, pp. 72-83, 2017, doi: 10.1016/j.enpol.2016.12.047. DOI |
38 | E. Anthi, S. Ahmad, O. Rana, G. Theodorakopoulos, and P. Burnap, "EclipseIoT: A secure and adaptive hub for the Internet of Things," Comput. Secur., vol. 78, pp. 477-490, 2018, doi: 10.1016/j.cose.2018.07.016. DOI |
39 | D. Avasthi, "Network Forensic Analysis with Efficient Preservation for SYN Attack.," Int. J. Comput. Appl., vol. 46, no. 24, pp. 17-22, 2012, [Online]. Available: http://scholar.google.com/scholar?hl=en&btnG=Search&q=intitle:Network+Forensic+Analysis+with+Efficient+Preservation+for+SYN+Attack#0. |
40 | E. Nasr, M. Jalloul, J. Bachalaany, and R. Maalouly, "Wi-Fi Network Vulnerability Analysis and Risk Assessment in Lebanon," MATEC Web Conf., vol. 281, p. 05002, 2019, doi: 10.1051/matecconf/201928105002. DOI |
![]() |