Impersonation Attack-Defense Tree
DOI:
https://doi.org/10.3991/ijet.v15i19.12699Keywords:
attack-defense tree, impersonation, online examAbstract
Nowadays, online learning or e-learning has become increasingly popular and evolved. Many academic institutions use the Learning Management System (LMS) as a medium for delivering e-learning. A vital feature in such a system is the electronic examination (e-exam), where verifying student’s authentic competence is a challenge. This paper aims to present countermeasures for impersonation attacks. This research was a more focused effort and a continuation of previously owned one and many others found in works of literature. The method of protection is presented in the form of an attack-defense tree model.
Downloads
Published
2020-10-05
How to Cite
Rosmansyah, Y., Hendarto, I. L. S., & Pratama, D. (2020). Impersonation Attack-Defense Tree. International Journal of Emerging Technologies in Learning (iJET), 15(19), pp. 239–246. https://doi.org/10.3991/ijet.v15i19.12699
Issue
Section
Short Papers