DESIGN AND IMPLEMENTATION OF ONLINE EXAM SECURITY SYSTEM ON LMS USING CHALLENGE QUESTIONS METHOD BASED ON PROFILE WITH TIME LIMITATION
Internet technologies has been growing, including technologies for delivering educational material. E-learning or online learning, as most notable of them, has evolved and become more popular. Online assessment or online exam as a tool for evaluate student is an important part of online learning. Pr...
Saved in:
Main Author: | |
---|---|
Format: | Theses |
Language: | Indonesia |
Online Access: | https://digilib.itb.ac.id/gdl/view/43410 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Institut Teknologi Bandung |
Language: | Indonesia |
Summary: | Internet technologies has been growing, including technologies for delivering educational material. E-learning or online learning, as most notable of them, has evolved and become more popular. Online assessment or online exam as a tool for evaluate student is an important part of online learning. Practically, the answers of examination are submitted online by students without face-to-face interaction. Verifying the true students who submitted the exam by authenticating them becomes a big challenge.
This paper is made in order to mitigate potential threats to student authentication, especially impersonation attack, in the online exam. Study has analyzed limitation and benefits of the previous research in student authentication. Based on paper about attack-defense tree secure exam attack, impersonation is part of cheating attack node. In rural areas, there are several factors, such as bandwidth and infrastructure, need to be considered to choose authentication methods. One defense that can be use is challenge questions method.
Last research about challenge questions showed that impersonation attack using smartphone was successful. For this purpose, we propose authentication using challenge questions with limited time answer to validate students in examinations, specifically in e-learning environment. Challenge questions were delivered to student before examination. The questions consist of profil and activity of students. The profil and activity data gathered from LMS, academic information system and other informations systems. If the duration of time respon is 11 second per question, it was found that the impostor made wrong answer to the system with a percentage of 48.46% of the total questions given. In this paper, we showed that limit time respon successful mitigate impersonation attack whose share credentials using smartphone. |
---|