Impersonation Attack-Defense Tree
ARTICLE
Yusep Rosmansyah, Ignatius Hendarto, Demby Pratama, Bandung Institute of Technology
iJET Volume 15, Number 19, ISSN 1863-0383 Publisher: International Journal of Emerging Technology in Learning, Kassel, Germany
Abstract
Nowadays, online learning or e-learning has become increasingly popular and evolved. Many academic institutions use the Learning Management System (LMS) as a medium for delivering e-learning. A vital feature in such a system is the electronic examination (e-exam), where verifying student’s authentic competence is a challenge. This paper aims to present countermeasures for impersonation attacks. This research was a more focused effort and a continuation of previously owned one and many others found in works of literature. The method of protection is presented in the form of an attack-defense tree model.
Citation
Rosmansyah, Y., Hendarto, I. & Pratama, D. (2020). Impersonation Attack-Defense Tree. International Journal of Emerging Technologies in Learning (iJET), 15(19), 239-246. Kassel, Germany: International Journal of Emerging Technology in Learning. Retrieved March 28, 2024 from https://www.learntechlib.org/p/217913/.