scholarly journals Analysis of Digital Evidence on Denial of Service (DoS) Attack Log Based

2020 ◽  
Vol 2 (2) ◽  
pp. 70
Author(s):  
Galih Fanani ◽  
Imam Riadi

This research is carried out an analysis and investigation of digital log file data retrieval from DoS (Denial of Service) attacks, on internet networks that have been detected by IDS (Intrusion Detection System) and using Wireshark as Tools Analysis Network. The research phase begins with the design of an experimental scenario which is often carried out daily where users access the internet network. The next stage is an attack in the form of ping flood on the target computer connected to the internet network, the final stage of data retrieval which will be analyzed later. Testing research using UAT (User Acceptance Test), to prove that the analysis has been received by the user. The results of research conducted to obtain data in the form of an attacker's IP (Internet Protocol), target IP, protocol type, the port used and the time of the attack. In the UAT test results, the obtained value of 18% of students disagrees, 58% of students agree, and 24% of students strongly agree. This research has conducted an analysis of random data attacks using Wireshark applications received by users.

Repositor ◽  
2020 ◽  
Vol 2 (5) ◽  
pp. 541
Author(s):  
Denni Septian Hermawan ◽  
Syaifuddin Syaifuddin ◽  
Diah Risqiwati

AbstrakJaringan internet yang saat ini di gunakan untuk penyimpanan data atau halaman informasi pada website menjadi rentan terhadap serangan, untuk meninkatkan keamanan website dan jaringannya, di butuhkan honeypot yang mampu menangkap serangan yang di lakukan pada jaringan lokal dan internet. Untuk memudahkan administrator mengatasi serangan digunakanlah pengelompokan serangan dengan metode K-Means untuk mengambil ip penyerang. Pembagian kelompok pada titik cluster akan menghasilkan output ip penyerang.serangan di ambil sercara realtime dari log yang di miliki honeypot dengan memanfaatkan MHN.Abstract The number of internet networks used for data storage or information pages on the website is vulnerable to attacks, to secure the security of their websites and networks, requiring honeypots that are capable of capturing attacks on local networks and the internet. To make it easier for administrators to tackle attacks in the use of attacking groupings with the K-Means method to retrieve the attacker ip. Group divisions at the cluster point will generate the ip output of the attacker. The strike is taken as realtime from the logs that have honeypot by utilizing the MHN.


2019 ◽  
Vol 10 (03) ◽  
pp. 114-121
Author(s):  
Armanto Armanto

ABSTRACT The problem in this study is that more and more internet users in the Bina Insan Lubuklinggau University building specifically the Faculty of Computer internet connection often experience problems, the internet network is still unstable, and ways to divide internet access points in the Computer Faculty. This study uses data collection methods by observing and recording directly at the research site (Observation), conducting question and answer directly to the source (Interview), and documentation by reading literature books. The results showed that the internet is often experiencing constraints and unstable internet networks and ways to divide internet access points at the Computer Faculty of the University of Bina Insan Lubuklinggau by using Policy Base Routing and Failover Implementation using a Mikrotik Router. It can be concluded that the internet network connection is stable and shows the results of the distribution of internet access points at the Faculty of Computer Bina Insan Lubuklinggau. Keywords: Mikrotik, Policy Base Routing, Failover


2022 ◽  
Vol 11 (1) ◽  
pp. 6
Author(s):  
Dheeraj Basavaraj ◽  
Shahab Tayeb

With the emergence of networked devices, from the Internet of Things (IoT) nodes and cellular phones to vehicles connected to the Internet, there has been an ever-growing expansion of attack surfaces in the Internet of Vehicles (IoV). In the past decade, there has been a rapid growth in the automotive industry as network-enabled and electronic devices are now integral parts of vehicular ecosystems. These include the development of automobile technologies, namely, Connected and Autonomous Vehicles (CAV) and electric vehicles. Attacks on IoV may lead to malfunctioning of Electronic Control Unit (ECU), brakes, control steering issues, and door lock issues that can be fatal in CAV. To mitigate these risks, there is need for a lightweight model to identify attacks on vehicular systems. In this article, an efficient model of an Intrusion Detection System (IDS) is developed to detect anomalies in the vehicular system. The dataset used in this study is an In-Vehicle Network (IVN) communication protocol, i.e., Control Area Network (CAN) dataset generated in a real-time environment. The model classifies different types of attacks on vehicles into reconnaissance, Denial of Service (DoS), and fuzzing attacks. Experimentation with performance metrics of accuracy, precision, recall, and F-1 score are compared across a variety of classification models. The results demonstrate that the proposed model outperforms other classification models.


SinkrOn ◽  
2020 ◽  
Vol 5 (1) ◽  
pp. 129
Author(s):  
Rudi Arif Candra ◽  
Devi Satria Saputra ◽  
Dirja Nur Ilham ◽  
Herry Setiawan ◽  
Hardisal Hardisal

This study discusses the infusion detection device in a hospital room. This tool is designed to help hospital nurses to cope more quickly to avoid problems due to the infusion. Load cell sensors are used as heavy detectors that send notifications to the nurses through the telegram application that has been installed. The nurse will get a notification message sent to the telegram if the sensor has read the weight. The tool is made using a load cell sensor and NodeMCU Wi-FiESP866 which functions to send notification of the results of sensor data input to the Internet of Things (IOT) platform namely Telegram. Nurses need to be connected to the internet network to get notifications on the telegram. Test results show that the time needed to send and receive notifications on Telegram takes about 2-5 seconds. The message will be sent 3 times, first the infusion WARNING is almost exhausted (alert), second the infusion WARNING is almost exhausted (standby) and the infusion WARNING is almost exhausted (please replace). If the infusion is not replaced by the nurse, it will be warned by Buzzer. However, time can be influenced by the available internet network connectivity. However, time can be affected by the available internet network.


BUANA ILMU ◽  
2020 ◽  
Vol 5 (1) ◽  
pp. 106-121
Author(s):  
Bayu Priyatna ◽  
Fitria Nurapriani

The development of technology is currently so fast, the use of various fields, especially in telecommunications, is now increasingly being improved and developed, such as the internet network, which has now reached the fourth generation or 4G, now a new technology has emerged, namely 5G. In addition to the internet, some technologies are widely developed by Google, where Google is a United States company engaged in services, with its flagship product being the Web Browser, Google Map which is now in great demand by the public to find information, in addition to web browsers and google maps. Many other technologies are beneficial for software developers and the general public. The Android operating system currently dominates the market as an Open Sources platform used for making mobile-based applications by developers, ranging from games, e-learning, ebooks, e-commerce and so on both free and paid, DISKOMINFO which regulates all systems spread across the entire Bekasi district, but currently the problems faced by KOMINFO Bekasi are; The points of location for the distribution of consumers are not mapped so that the division of the area is difficult to determine, field officers, visit not on time and so on. The method in this research is using UCD. The test results using alpha testing from the field officer data showed that 79.62% strongly agreed, 9.26% agreed, and the rest disagreed. Most of the officers agreed with the system that had been made, and only a few officers disagreed with the application. From the admin officers and finance data, it shows that 90.44% strongly agree, 1.55% agree, and the rest disagree. It can be concluded that the monitoring system that has been created is easy and feasible to use.   Keywords: Google, DISKOMINFO, Monitoring, Alpha testing, Bekasi. Perkembangan Teknologi sekarang ini semaking cepat, pemanfaattan diberbagai bidang terutama pada telekomunikasi kini semakin terus diperbaiki dan dikembangkan sepertihannya jaringan internet yang kini sudah sampai kepada generasi ke empat atau 4G bakan kini sudah muncul teknologi baru yaitu 5G. Selain internet tedapat juga teknologi yang banyak dikembangkan oleh Google, dimana google merupakan perusahaan Amerika serikat yang bergerak dibidang jasa atau Service, dengan produk andalannya adalah Web Browser, Google Map yang kini banyak diminati oleh kalangan masyarakat untuk mencari informasi, selain web browser dan google map masih banyak teknologi lainnya yang sangat berguna bagi pengembang software maupun masyarakat umum. Android sistem operasi yang saat ini mendominasi pasar sebagai platform Open Sources yang digunakan untuk pembuatan aplikasi berbasis mobile oleh para pengembang, mulai dari games, e-learning, ebook, ecommerce dan lain sebagainya baik gratis maupun berbayar, DISKOMINFO yang mengatur seluruh sistem yang tersebar di seluruh wilayah kabupaten Bekasi, namun saat ini prmasalahan yang dihadapi KOMINFO Bekasi adalah; Titik-titik lokasi penyebaran konsumen tidak di petakan sehingga pembagian wilayah sulit untuk ditetapkan, Kunjungan petugas lapangan tidak tepat waktu dan lain sebagainya. Metode dalam pengembangan ini menggunakan UCD. Hasil pengujian menggunakan alpha testing dari data petugas lapangan menunjukan bahwa 79,62% menyatakan sangat setuju, 9,26% menyatakan setuju dan sisanya menyatakan tidak setuju. Sebagian banyak petugas setuju dengan sistem yang telah dibuat dan hanya sedikit petugas yang tidak setuju dengan aplikasi tersebut. Dari data admin petugas dan keuangan menunjukan bahwa 90,44% menyatakan sangat setuju, 1,55% menyatakan setuju dan sisanya menyatakan tidak setuju. Dapat disimpulkan bahwa sistem monitoring  yang telah dibuat mudah dan layak untuk digunakan. Kata Kunci:  Google, DISKOMINFO, Monitoring, Alpha testing, Bekasi.


2018 ◽  
Vol 1 (2) ◽  
pp. 137
Author(s):  
Khairul Saleh ◽  
Tini Fitriani

Abstrack - The application of information technology at this time is very closely related to everyday life. Komunikas which at first was only conveyed in a very simple way, namely "mouth by mouth" (coming directly between one human and another). In addition, the speedy internet network security system is also used as a process to prevent and identify unauthorized users (intruders) from the internet network. The aim is to anticipate the risk of internet networks that can be either physical or logical threats. What is meant by physical threat is that can damage the physical part of the computer or computer hardware while the threat of logic is in the form of theft of data or intruders who break into someone's account.   Keywords - Security System, Speedy Network


2020 ◽  
Vol 5 (1) ◽  
pp. 178
Author(s):  
Taufik Rahman ◽  
Sumarna Sumarna ◽  
Hafis Nurdin

The internet network enters various sectors and is used in various activities, especially in the automation, industry 4.0 trend. Where almost all applications, ranging from desktops, websites, mobile (android and ios) that are used in various fields of education, transportation, banks, logistics, services, of course use high complexity internet networks that need to be analyzed so that high performance can be obtained. Analyzing the performance of MikroTik on the internet is the aim of this research. Research by configuring includes ip route, firewall filter, NAT, Mangle for packet tagging, Queue (bandwidth management), bridge wireless, DHCP and ip cloud DDNS on MikroTik. The results concluded that moving the configuration center point on the modem (giving the IP address down) to the MikroTik router can be done well, it can also translate company, institutional, school and even parent policies to the home internet when children access the internet, such as when it is allowed to access the internet can be arranged, things that may or may not be arranged in order to educate children to use the internet positively, use MikroTik to analyze internet network performance. As for the further research by looking at problems that exist after MikroTik is configured.


Jurnal Ecogen ◽  
2021 ◽  
Vol 4 (1) ◽  
pp. 62
Author(s):  
Ricky Herpana Putra ◽  
Menik Kurnia Siwi

This study aims to determine the implementation of the Android-Based School Examination (USBA) at SMAN 3 Sungai Penuh. This type of research is descriptive with a qualitative approach. Data collection techniques by interview and documentation. The data sources used were primary data and secondary data, which were analyzed by using triangulation techniques. The number of informants in this study were 6 people, namely USBA operators and class XII students of SMAN 3 Sungai Penuh. The results showed that the USBA implementation process at SMAN 3 Sungai Penuh was the same as the conventional exam implementation process, but at USBA students were more independent. The advantages of USBA include exams that can be done anywhere, USBA costs are more efficient than paper exams, test results can be seen after students have finished taking exams, with this USBA minimizing the occurrence of cheating by students. Constraints in implementing USBA are the low capacity of the internet network. Comparing conventional exams with USBA, there are many differences between the two, this can be seen from the equipment used, the form of the questions, the time for taking the questions, the place and the operational costs of the exam.


2021 ◽  
Vol 7 (2) ◽  
pp. 95
Author(s):  
Mochamad Soebagja Budiana ◽  
Ridha Muldina Negara ◽  
Arif Indra Irawan ◽  
Harashta Tatimma Larasati

Message Queuing Telemetry Transport (MQTT) is one of the popular protocols used on the Internet of Things (IoT) networks because of its lightweight nature. With the increasing number of devices connected to the internet, the number of cybercrimes on IoT networks will increase. One of the most popular attacks is the Denial of Service (DoS) attack. Standard security on MQTT uses SSL/TLS, but SSL/TLS is computationally wasteful for low-powered devices. The use of fuzzy logic algorithms with the Intrusion Detection System (IDS) scheme is suitable for detecting DoS because of its simple nature. This paper uses a fuzzy logic algorithm embedded in a node to detect DoS in the MQTT protocol with feature selection nodes. This paper's contribution is that the nodes feature selection used will monitor SUBSCRIBE and SUBACK traffic and provide this information to fuzzy input nodes to detect DoS attacks. Fuzzy performance evaluation is measured against changes in the number of nodes and attack intervals. The results obtained are that the more the number of nodes and the higher the traffic intensity, the fuzzy performance will decrease, and vice versa. However, the number of nodes and traffic intensity will affect fuzzy performance.


2020 ◽  
Author(s):  
Citra Rahayu ◽  
Tri Hartati

SDN 001 Sekupang is a Public Elementary School located in Tanjung Riau Village, Sekupang District, Batam City. SDN 001 Sekupang has used the internet to carry out work activities with a total bandwidth of 20Mbps. The high access of the user to access the internet, makes the connection unstable, which makes the performance become fast or slow and the number of users use bandwidth simultaneously so that bandwidth pulls occur resulting in a decrease in performance on the internet network. The purpose of this study is to optimize and maximize the available bandwidth so that the available bandwidth can be used evenly and fairly. For this reason, it is necessary to build a method for security authentication and bandwidth management using proxy routerboard by implementing a simple queue method. The simple queue method is one of the methods found on the microtic routerboard which is quite reliable in implementing bandwidth management, which is to divide bandwidth fairly and evenly. For implementers, it is done by configuring the proxy router and conducting direct testing that is assisted by using speedtest.cbn.net.id. By applying security authentication and bandwidth management using microtic routerboard the test results obtained in applying the simple queue method are good enough and each computer gets bandwidth fairly and evenly and makes the performance of each computer stable.


Sign in / Sign up

Export Citation Format

Share Document