<?xml version="1.0" encoding="UTF-8" ?>
<modsCollection xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" xmlns:slims="http://slims.web.id" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-3.xsd">
<mods version="3.3" id="58962">
 <titleInfo>
  <title>Web Forensic on Container Services Using Grr Rapid Response Framework</title>
 </titleInfo>
 <name type="Personal Name" authority="">
  <namePart>Riadi Imam</namePart>
  <role>
   <roleTerm type="text">Primary Author</roleTerm>
  </role>
 </name>
 <typeOfResource manuscript="no" collection="yes">mixed material</typeOfResource>
 <genre authority="marcgt">bibliography</genre>
 <originInfo>
  <place>
   <placeTerm type="text">Semarang</placeTerm>
   <publisher>Universitas Negeri Semarang</publisher>
   <dateIssued>2020</dateIssued>
  </place>
 </originInfo>
 <language>
  <languageTerm type="code">e</languageTerm>
  <languageTerm type="text">English</languageTerm>
 </language>
 <physicalDescription>
  <form authority="gmd">Artikel Jurnal</form>
  <extent>hlm : 33-42</extent>
 </physicalDescription>
 <relatedItem type="series">
  <titleInfo/>
  <title>Scientific Journal of Informatics</title>
 </relatedItem>
</mods>
<note>&#13;
Abstract&#13;
&#13;
Cybercrime on Internet that keeps increasing does not only take place in the environmentÂ that running web applications traditionally under operating system, but also webÂ applications that are running in more advance environment like container service. DockerÂ is a currently popular container service in Linux operating system needs to be secured andÂ implements incident response mechanisme that will investigate web server that wasÂ attacked by DDoS in fast, valid, and comprehesive way. This paper discusses theÂ investigation using Grr Rapid Response framework on web server that was attacked byÂ DDoS running in container service on Linux operating system, and the attacker usingÂ Windows oprating system that runs DDos script. This research has succesfully investigatedÂ digital evidence in the form of log file from web server running on container service andÂ digital evidence through netstat on Windows computer.&#13;
</note>
<note type="statement of responsibility"></note>
<subject authority="">
 <topic>Informatika</topic>
</subject>
<classification>SJI</classification>
<identifier type="isbn">24077658</identifier>
<location>
 <physicalLocation>Perpustakaan Teknik UPI YAI </physicalLocation>
 <shelfLocator>SJI V7N1 MAY 2020</shelfLocator>
 <holdingSimple>
  <copyInformation>
   <numerationAndChronology type="1">SJI1-004</numerationAndChronology>
   <sublocation>Perpustakaan FT UPI YAI</sublocation>
   <shelfLocator>SJI V7N1 MAY 2020</shelfLocator>
  </copyInformation>
 </holdingSimple>
</location>
<slims:image>SJI_V7N1_May_2020.png.png</slims:image>
<recordInfo>
 <recordIdentifier>58962</recordIdentifier>
 <recordCreationDate encoding="w3cdtf">2023-02-07 14:20:45</recordCreationDate>
 <recordChangeDate encoding="w3cdtf">2023-02-07 14:20:45</recordChangeDate>
 <recordOrigin>machine generated</recordOrigin>
</recordInfo>
</modsCollection>