Impersonation Attack-Defense Tree

Yusep Rosmansyah, Ignatius Leo Sri Hendarto, Demby Pratama

Abstract


Nowadays, online learning or e-learning has become increasingly popular and evolved. Many academic institutions use the Learning Management System (LMS) as a medium for delivering e-learning. A vital feature in such a system is the electronic examination (e-exam), where verifying student’s authentic competence is a challenge. This paper aims to present countermeasures for impersonation attacks. This research was a more focused effort and a continuation of previously owned one and many others found in works of literature. The method of protection is presented in the form of an attack-defense tree model.

Keywords


attack-defense tree; impersonation; online exam

Full Text:

PDF


Copyright (c) 2020 Yusep Rosmansyah, Ignatius Leo Sri Hendarto, Demby Pratama


International Journal of Emerging Technologies in Learning (iJET) – eISSN: 1863-0383
Creative Commons License
Indexing:
Scopus logo Clarivate Analyatics ESCI logo EI Compendex logo IET Inspec logo DOAJ logo DBLP logo Learntechlib logo EBSCO logo Ulrich's logo Google Scholar logo MAS logo