Impersonation Attack-Defense Tree

Authors

DOI:

https://doi.org/10.3991/ijet.v15i19.12699

Keywords:

attack-defense tree, impersonation, online exam

Abstract


Nowadays, online learning or e-learning has become increasingly popular and evolved. Many academic institutions use the Learning Management System (LMS) as a medium for delivering e-learning. A vital feature in such a system is the electronic examination (e-exam), where verifying student’s authentic competence is a challenge. This paper aims to present countermeasures for impersonation attacks. This research was a more focused effort and a continuation of previously owned one and many others found in works of literature. The method of protection is presented in the form of an attack-defense tree model.

Author Biographies

Yusep Rosmansyah, Bandung Institute of Technology

School of Electrical Engineering and Informatics; Associate Professor

Ignatius Leo Sri Hendarto, Bandung Institute of Technology

School of Electrical Engineering and Informatics; Alumni

Demby Pratama, Bandung Institute of Technology

School of Electrical Engineering and Informatics; Graduate Students

Downloads

Published

2020-10-05

How to Cite

Rosmansyah, Y., Hendarto, I. L. S., & Pratama, D. (2020). Impersonation Attack-Defense Tree. International Journal of Emerging Technologies in Learning (iJET), 15(19), pp. 239–246. https://doi.org/10.3991/ijet.v15i19.12699

Issue

Section

Short Papers