Anda di halaman 1dari 4

DAFTAR PUSTAKA

Adriana, Alfin. 2010. Monitoring Jaringan dengan Analisis Penggunaan Firewall


pada Keamanan Jaringan di Bakosurtanal. Bandung: Universitas
Komputer Indonesia.

AlFardan.N.J dan Kenneth G. Paterson. 2005. An Analysis of DepenDNS. (Online),


(http://www.isg.rhul.ac.uk, diakses 28 Desember 2013).

Ariyapperuma, Siranjith dan Chris J. Mitchell. 2013. Security Vulnerability in DNS


and DNSSEC. Information Science Journal, (Online),
(www.elsevier.com/locate/ins, diakses 28 Desember 2013).

Bassil, Ramzi. dkk. 2008. Security Analysis and Solution for Thwarting Cache
Poisoning Attack in the Domain Name System, (Online),
(http://www.researchgate.net, diakses 28 Desember 2013).

Bellovin, S. M. 1995. Using the Domain Name System fo System Brea-ins. UENIX
UNIX Security Symposium tahun 1995.

Cheung, Steven. 2005. Denial of Service Agains the Domain Name System: Threats
and Countermeasures. (Online), (www.csl.sri.com, diakses 28 Desember
2013).

Coloma, P. Jorba. 2009. DNS Cache Poisoning: Techniques and Solutions.


(Online), (http://dat.etsit.upm.es, diakses 13 Januari 2014).

Dwiyanto, Philip dkk. 2010. Studi Kasus Perancangan Intrusion Prevention System
Terhadap Serangan Man-in-the-Middle pada Jaringan Lokal. (Online),
(http://eprints.binus.ac.id/, diakses 21 Agustus 2014).

Hubert, A. dan R. Van Mook. 2009. Measures for Making DNS More Resilent
Againts Forged Answer. (Online), (http://tools.ietf.org/html/rfc5452,
diakses 28 Desember 2013).

Kak, Avi. 2013. DNS and DNS Cache Poisoning Attack. (Online),
(https://engineering.purdue.edu, diakses 28 Desember 2013).

79
Klein, Amit. 2007. BIND 8 DNS Cache Poisoning. (Online),
(http://packetstorm.wowhacker.com, diakses 13 Januari 2014).

Kolkman, Olaf, 2009. DNSSEC HOWTO, a tutorial in disguise, (Online),


(http://www.nlnetlabs.nl/publications/dnssec_howto, diakses 20 Desember
2013).

Laboratory For Computer Security Education. 2009. DNS Pharming Attack Lab.
(Online), (http://discovery.csc.ncsu.edu, diakses 13 Januari 2014).

Mockapetris, P. 1983. Domain Names Concept and Facilities. RFC 882. (Online),
(http://tools.ietf.org/html/rfc882, diakses 19 September 2014).

Murayama, Junichi. dkk. 2010. Traffic Monitoring and Analysis Technologies.


Special Feature : Trend of Network Security Technologies, Jilid 8, Nomor
7, Juli 2010.

Newman, D. 1999. Benchmarking Terminology for Firewall Performance.


(Online), (http://tools.ietf.org/html/rfc2647.html, diakses 21 Agustus 2014).

Northeaster University. 2009. Fundamentals of Computer Networking,


CS4700/CS5700 Fall 2009.

Osterweil, Eric. dkk. 2009. Deploying dan Monitoring DNS Security (DNSSEC),
(Online), (http://secspider.verisignlabs.com, diakses 20 Desember 2013).

Pathak, Dhrubajyoti dan Kaushik Baruah. 2013. An Intrution Detection System for
Kaminsky DNS Cache Poisoning. International Journal of Enginering
Research. (Online), Jilid 2, Nomor 5, Halaman : 357 361, (www.ijer.in,
diakses 28 Desember 2013).

Permatasari, W.D. 2008. Kerawanan Kemanan Jaringan Komputer pada DNS dan
BIND (BERKELEY INTERNET NAME DOMAIN). Bandung: Universitas
Sriwijaya.

Petr, Emanuel. 2009. An analysis of the DNS cache poisoning attack, (Online),
(www.nic.cz, diakses 16 Desember 2013).

80
Prais, A. dkk. 2008. Detecting Attacks Involving DNS Servers. (Online),
(http://essay.utwente.nl, diakses 28 Desember 2013).

Purbo, OW dan T Wiharjito. 2000. Keamanan Jaringan Internet. Bandung: Elex


Media Komputindo.

Rachmawanto, Eko Hari. 2010. Teknik Keamanan Data Menggunakan Kriptografi


dengan Algoritma Vernam Chiper dan Steganografi dengan Metode End of
File (EOF). Semarang : Universitas Dian Nuswantoro.

Rash, Michael. 2007. Linux Firewall: Attack Detection and Response with iptables,
psad and fwsnort. (Online), (http://www.cipherdyne.org/fwsnort/, diakses
24 Agustus 2014).

Ren, Pin. dkk. 2007. Visualizing DNS Traffic, (Online), (http://citeseerx.ist.psu.edu,


diakses 13 Januari 2014).

Sadikin, R. 2012. Kriptografi Untuk Keamanan Jaringan. Yogyakarta: Penerbit


Andi.

Sainstitute.org. 2003. Attacking the DNS Protocol Security Paper v2. Expert
Security Associate (ESA) Certification.

Sinha, Sachin Kumar. dkk. 2013. Security System for DNS using Cryptography.
International Journal of Engineering & Technology, Jilid 2.

Stewart, Joe. 2003. DNS Cache Poisoning The Next Generation, (Online),
(http://www.ida.liu.se, diakses 28 Desember 2013).

Syafrizal, Melwin. 2005. Pengantar Jaringan Komputer. Yogyakarta: Penerbit


Andi.

Tsai, Tien-Hao dkk. 2013. A Network-based Solution to Kaminsky DNS Cache


Poisoning Attacks. Dalam INTERNET 2013: The Fifth International
Conference on Evolving Internet, 2013 (1): 43-47.

81
Tzur-David, Shimrit. dkk. 2012. Delay Fast Packet (DPF): Prevention of DNS
Cache Poisoning. (Online), (http://www.cs.huji.ac.il, diakses 13 Januari
2014).

Utami, Ema. dkk. 2007. Metodologi Penelitian Pada Ilmu Komputer. Yogyakarta:
Seminar Nasional Teknologi 2007.

Wahid, Fathul. 2004. Metodologi Penelitian Sistem Informasi: Sebuah Gambaran


Umum. Yogyakarta: Media Informatika.

Wijaya, Sandi. 2004. Mekanisme dan Implementasi Cache Poisoning pada DNS
Server. Discussion List., (Online), (budi.insan.co.id, diakse 13 Januari
2014).

Wirawan, Fandi Surya. 2007. Analisis Kebutuhan Resource terhadap Kesesuaian


Protokol IPv4 dan IPv6 di PUSAIR Bandung. Bandung: Universitas
Komputer Indonesia.

Yopi, F. Herlina. 2008. Penerapan Kriptografi Algoritma RSA untuk Keamanan


Database (Studi Kasus pada Sistem Informasi Toko Buku. Bandung:
Universitas Komputer Indonesia.

Yuan, Lihua. dkk. 2013. A Proxy View of Quality of Domain Name Service,
Poisoning Attacks an Survival Strategies. ACM Transaction on Internet
Tecnology, Jilid 12, Nomor 3, Artikel 9.

Zam, Efvy. 2011. Buku Sakti Hacker. Jagakarsa : Mediakita.

82

Anda mungkin juga menyukai