You are here:

Impersonation Attack-Defense Tree
ARTICLE

, , , Bandung Institute of Technology

iJET Volume 15, Number 19, ISSN 1863-0383 Publisher: International Journal of Emerging Technology in Learning, Kassel, Germany

Abstract

Nowadays, online learning or e-learning has become increasingly popular and evolved. Many academic institutions use the Learning Management System (LMS) as a medium for delivering e-learning. A vital feature in such a system is the electronic examination (e-exam), where verifying student’s authentic competence is a challenge. This paper aims to present countermeasures for impersonation attacks. This research was a more focused effort and a continuation of previously owned one and many others found in works of literature. The method of protection is presented in the form of an attack-defense tree model.

Citation

Rosmansyah, Y., Hendarto, I. & Pratama, D. (2020). Impersonation Attack-Defense Tree. International Journal of Emerging Technologies in Learning (iJET), 15(19), 239-246. Kassel, Germany: International Journal of Emerging Technology in Learning. Retrieved March 28, 2024 from .