scholarly journals Optimasi Keamanan Web Server terhadap Serangan Broken Authentication Menggunakan Teknologi Blockchain

2021 ◽  
Vol 6 (3) ◽  
pp. 139-148
Author(s):  
Imam Riadi ◽  
Herman ◽  
Aulyah Zakilah Ifani

The aspect of the internet that needs to be considered a security is the login system. The login system usually uses a username and password as an authentication method because it is easy to implement. However, data in the form of usernames and passwords are very vulnerable to theft, so it is necessary to increase the security of the login system. The purpose of this research is to investigate the security of the system. Whether the system is good at protecting user data or not, minimizing execution errors from the system and minimizing risk errors on the system so that the login system can be used safely. This research is conducted to test the system security with Burp Suite on the login system that has been built. Testing the security of this system by experimenting with POST data which is secured using blockchain technology makes the data sent in the form of hash blocks safer and more confidential so that the system is safer than before. Blockchain technology has successfully secured usernames and passwords from broken authentication attacks. By using the Burp Suite testing system, login is more specific in conducting security testing.

2020 ◽  
Author(s):  
Shreya Reddy ◽  
Lisa Ewen ◽  
Pankti Patel ◽  
Prerak Patel ◽  
Ankit Kundal ◽  
...  

<p>As bots become more prevalent and smarter in the modern age of the internet, it becomes ever more important that they be identified and removed. Recent research has dictated that machine learning methods are accurate and the gold standard of bot identification on social media. Unfortunately, machine learning models do not come without their negative aspects such as lengthy training times, difficult feature selection, and overwhelming pre-processing tasks. To overcome these difficulties, we are proposing a blockchain framework for bot identification. At the current time, it is unknown how this method will perform, but it serves to prove the existence of an overwhelming gap of research under this area.<i></i></p>


2018 ◽  
Vol 35 (2) ◽  
pp. 40-47
Author(s):  
S. M. Doguchaeva

The era of digital transformation provides the opportunity for leading companies to change priorities - to begin to take care of the support environment using innovative technologies and become a leading creative platform open for innovation. The successful development of the digital world, the blockchain technology, the Internet of things – the mechanism which will change the financial world. 


2021 ◽  
Vol 5 (6) ◽  
pp. 1137-1142
Author(s):  
Hamdi Alchudri ◽  
Zaini

The incidence of fire and theft is very threatening and causes disruption to people's lifestyles, both due to natural and human factors resulting in loss of life, damage to the environment, loss of property and property, and psychological impacts. The purpose of this study is to create a building security system using Kinect Xbox 360 which can be used to detect fires and loss of valuable objects. The data transmission method uses the Internet of Things (IoT) and skeletal tracking. Skeletal detection uses Arduino Uno which is connected to a fire sensor and Kinect to detect suspicious movements connected to a PC. Kinect uses biometric authentication to automatically enter user data by recognizing objects and detecting skeletons including height, facial features and shoulder length. The ADC (Analog to Digital Converter) value of the fire sensor reading has a range between 200-300. The fire sensor detects the presence of fire through optical data analysis containing ultraviolet, infrared or visual images of fire. The data generated by Kinect by detecting the recognition of the skeleton of the main point of the human body known as the skeleton, where the reading point is authenticated by Kinect from a range of 1.5-3 meters which is declared the optimal measurement, and if a fire occurs, the pump motor will spray water randomly. to extinguish the fire that is connected to the internet via the wifi module. The data displayed is in the form of a graph on the Thingspeak cloud server service. Notification of fire and theft information using the delivery system from input to database


Author(s):  
Aditya Tepalwar ◽  
Asha Sherikar ◽  
Prajyot Mane ◽  
Vishal Fulpagare

Smart appliance design that includes multimedia intelligence to deliver comfortable, convenient, and secure personal services in the home is becoming increasingly crucial in the age of information and communication technology. This research looks at the design and execution of a novel interactive multimedia mirror system called as "smart mirror." The glass that will be used is the foundation of the design of a smart mirror. Two-way glass is suggested because it allows the visuals on the display to be seen more clearly. Our way of life has evolved to the point where making the best use of one's time is critical. Based on user surveys and prototype implementation, we propose the development of an innovative appliance that incorporates interactive information services delivered via a user interface on the surface of a mirror. Our work is based on the assumption that we all check ourselves in the mirror before leaving the house, so why shouldn't the mirror be intelligent? Smart Mirrors will eventually replace regular mirrors, providing users with both mirror and computer-assisted information services as technology improves. Because of the Raspberry Pi microcontroller cards aboard, the devices can connect to the internet, download data from the internet, and show that data on the mirror. Weather data, time and location data, current event data, and user data gathered from web services using a Raspberry Pi 3 microcontroller card are all included in the designed intelligent mirror system. The mirror will light up when the user steps in front of it. When thinking about this project, phrases like Smart Mirror, Interactive services, Raspberry Pi , and Web services come to mind.


Author(s):  
Savinay Mengi ◽  
Astha Gupta

A Blockchain protocol operates on top of the Internet, on a P2P network of computers that all run the protocol and hold an identical copy of the ledger of transactions, enabling P2P value transactions without a middleman though machine consensus. The concept of Blockchain first came to fame in October 2008, as part of a proposal for Bitcoin, with the aim to create P2P money without banks. Bitcoin introduced a novel solution to the age-old human problem of trust. The underlying blockchain technology allows us to trust the outputs of the system without trusting any actor within it. People and institutions who do not know or trust each other, reside in different countries, are subject to different jurisdictions, and who have no legally binding agreements with each other, can now interact over the Internet without the need for trusted third parties like banks, Internet platforms, or other types of clearing institutions. Ideas around cryptographically secured P2P networks have been discussed in the academic environment in different evolutionary stages, mostly in theoretical papers, since the 1980s. “Proof-of-Work” is the consensus mechanism that enables distributed control over the ledger. It is based on a combination of economic incentives and cryptography. Blockchain is a shared, trusted, public ledger of transactions, that everyone can inspect but which no single user controls. It is a distributed database that maintains a continuously growing list of transaction data records, cryptographically secured from tampering and revision.


2016 ◽  
Author(s):  
Jonathan Mellon

This chapter discusses the use of large quantities of incidentallycollected data (ICD) to make inferences about politics. This type of datais sometimes referred to as “big data” but I avoid this term because of itsconflicting definitions (Monroe, 2012; Ward & Barker, 2013). ICD is datathat was created or collected primarily for a purpose other than analysis.Within this broad definition, this chapter focuses particularly on datagenerated through user interactions with websites. While ICD has beenaround for at least half a century, the Internet greatly expanded theavailability and reduced the cost of ICD. Examples of ICD include data onInternet searches, social media data, and user data from civic platforms.This chapter briefly explains some sources and uses of ICD and thendiscusses some of the potential issues of analysis and interpretation thatarise when using ICD, including the different approaches to inference thatresearchers can use.


Author(s):  
Ibrahim Mahmood Ibrahim ◽  
Siddeeq Y. Ameen ◽  
Hajar Maseeh Yasin ◽  
Naaman Omar ◽  
Shakir Fattah Kak ◽  
...  

Today, web services rapidly increased and are accessed by many users, leading to massive traffic on the Internet. Hence, the web server suffers from this problem, and it becomes challenging to manage the total traffic with growing users. It will be overloaded and show response time and bottleneck, so this massive traffic must be shared among several servers. Therefore, the load balancing technologies and server clusters are potent methods for dealing with server bottlenecks. Load balancing techniques distribute the load among servers in the cluster so that it balances all web servers. The motivation of this paper is to give an overview of the several load balancing techniques used to enhance the efficiency of web servers in terms of response time, throughput, and resource utilization. Different algorithms are addressed by researchers and get good results like the pending job, and IP hash algorithms achieve better performance.


Author(s):  
Lilia Ervina Jeronimo Guterres ◽  
Ahmad Ashari

The current technology is changing rapidly, with the significant growth of the internet technology, cyber threats are becoming challenging for IT professionals in the companies and organisations to guard their system. Especially when all the hacking tools and instructions are freely available on the Internet for beginners to learn how to hack such as stealing data and information. Tic Timor IP is one of the organisations involved and engaged in the data center operation. It often gets attacks from the outside networks. A network traffic monitoring system is fundamental to detect any unknown activities happening within a network. Port scanning is one of the first methods commonly used to attack a network by utilizing several free applications such as Angry IP Scan, Nmap and Low Orbit Ion Cannon (LOIC).  On the other hand, the snort-based Intrusion Detection System (IDS) can be used to detect such attacks that occur within the network perimeter including on the web server. Based on the research result, snort has the ability to detect various types of attack including port scanning attacks and multiple snort rules can be accurately set to protect the network from any unknown threats.  


Sign in / Sign up

Export Citation Format

Share Document