scholarly journals Network Security Analysis and Bandwidth Management

Author(s):  
Bagus Aji Saputro

Computer network users have to spend a lot of money to use the Internet. The Internet has given a very big change in the dissemination of information, so that many people are using data through the Internet. This problem can be solved by MikroTik as a regulator of Internet data traffic and limiting bandwidth that can interfere with computer network activities in accordance with the regulations that have been applied. As a result of not being limited in bandwidth, it causes an overload on a network which has an impact on disrupting internet traffic on that network. Each agency should implement bandwidth restrictions according to the needs of users using the internet. Result from this research is not being limited in bandwidth, it causes an overload on a network which has an impact on disrupting internet traffic on that network. Each agency should implement bandwidth restrictions according to the needs of users using the internet.

Author(s):  
Inderjeet Singh Sodhi

This chapter highlights the constant increase in the number of attacks on computer network systems, which has pushed governments, researchers, and experts to devise better security policies and strategies. However, the rapid growth of systems, components, and services offered has increased the difficulty of administering them. In many organizations in developed and developing countries, more emphasis is being given on use of Automatic Computing for proper network security. The chapter clarifies how various projects and tools could be relevant for network security. The chapter provides insights about what steps have been taken for network security in a developing country like India. It looks into various strategies adopted for communication data and network security in India. It emphasizes that, with increasing demand for basic/citizen services over the Internet, it has become important to protect data and ensure efficient backup and data recovery. The chapter proposes a need for better and effective policy and strategy for communication data and network security to make the government citizen-oriented in developing countries.


Author(s):  
Ravindra Kumar Singh Rajput ◽  
Dinesh Goyal

Every software application has its own minimum set of requirements like CPU, storage, memory, networking, and power. These have to be integrated into a specific configuration to allow the smooth functioning of the software application. When data traffic becomes higher than expected, higher resources are required. There may not be enough time to provision new resources manually; in such cases, an auto-scaling system is required for managing these situations. Cloud computing means using data, programs, and other resources pooled in the data center and accessed through the internet instead of the user's computer. In the chapter, the authors discussed some aspects related to cloud computing like cloud workload, load balancing, load balancing algorithms, scaling techniques, and auto-scaling to fulfill cloud workload balancing requirements.


2017 ◽  
Vol 11 (4) ◽  
pp. 1-15 ◽  
Author(s):  
Nagesh K. ◽  
Sumathy R. ◽  
Devakumar P. ◽  
Sathiyamurthy K.

Security is concerned with protecting assets. The aspects of security can be applied to any situation- defense, detection and deterrence. Network security plays important role of protecting information, hardware and software on a computer network. Denial of service (DOS) attacks causes great impacts on the internet world. These attacks attempt to disrupt legitimate user's access to services. By exploiting computer's vulnerabilities, attackers easily consume victim's resources. Many special techniques have been developed to protest against DOS attacks. Some organizations constitute several defense mechanism tools to tackle the security problems. This paper has proposed various types of attacks and solutions associated with each layers of OSI model. These attacks and solutions have different impacts on the different environment. Thus the rapid growth of new technologies may constitute still worse impacts of attacks in the future.


2019 ◽  
Vol 4 (1) ◽  
pp. 19-24
Author(s):  
M. Agus Syamsul Arifin ◽  
Antoni Zulius

Abstrak Pengamanan Jaringan merupakan salah satu tindakan untuk menjaga data yang terdapat di server selain menggunakan metode enskripsi data terdapat juga salah satu Teknik yang di gunakan untuk mengamankan jaringan yaitu dengan menggunakan Teknik DMZ (Demilitarized Zone). DMZ merupakan sebuah area dalam jaringan yang di bangun untuk melindungi sistem internal dengan cara memisahkan lalulintas Data yang ada pada jaringan. Lalulintas data pada Jaringan Universitas Bina Insan Lubuklinggau tidak terfilter sehingga sistem internal yang ada  dalam hal ini adalah perangkat server tidak memiliki pengamanan selain sistem keamanan built in yang ada pada sistem operasi yang di gunakan oleh server Universitas (Firewall Sistem Operasi) pengguna yang mengakses jaringan Internet menggunakan IP Address yang biasa di gunakan mahasiswa dapat juga memasuki jaringan yang di gunakan oleh server secara langsung tanpa terfilter, dengan menggunakan Teknik DMZ lalulintas data Server yang ada akan dipisah dari Jaringan yang di gunakan oleh mahasiswa dan Jaringan Luar, sehingga mahasiswa dan pengguna hanya akan dapat mengakses port yang sudah di tentukan saja. Penggunaan Teknik DMZ nantinya akan menjadi sistem lapis pengamanan pertama dari server yang ada di Universitas Bina Insan Lubuklinggau agar beberapa port dapat terlindungi dari pengguna yang berusaha mengakses lebih dalam ke dalam Server. Kata kunci : Demilitarized Zone (DMZ), Keamanan Jaringan, Server Abstract  Network Security is one of the ways to maintain the data contained on the server besides using data encryption methods, there is also one of the techniques used to secure the network by using the DMZ (Demilitarized Zone) technique. DMZ is an area in a network that is built to protect internal systems by separating traffic data on the network. Data traffic on the Bina University Network Lubuklinggau Staff is not filtered so that the internal system in this case is that the server device has no security other than the built-in security system that is on the operating system used by the University server (Firewall Operating System) users accessing the Internet network using an IP address that is commonly used by students can also enter the network that is used directly by the server without filtering, using the DMZ technique data traffic Existing servers will be separated from the network used by students and the outside network, so students and users will only can only access the specified port. The use of the DMZ Technique will later become the first security layer system from the server at Bina University, Lubuklinggau, so that several ports can be protected from users trying to access deeper into the Server.  Keywords : Demilitarized Zone (DMZ), Network Security, Server


2011 ◽  
Vol 474-476 ◽  
pp. 75-78
Author(s):  
Kun Zhang ◽  
Hai Feng Wang ◽  
Jian Feng Zhu ◽  
Zhuang Li

With the continuous development of the Internet, it while brings each kind of beneficial information to the people , the hacker, viral as well as the malicious destruction and so on bad factor also multiplies along with it the spread, the network security and the reliability have become the focal point which various countries pay attention together .


2020 ◽  
Vol 12 (1) ◽  
pp. 40
Author(s):  
Tri Lestari ◽  
Imam Riadi ◽  
Rusydi Umar

AbstractThe digital age is a sign of the progress of the internet that has made everything easy and fast. Tix Id is one of the many e-commerce applications that have developed in the digital age. This application requires that consumers are satisfied with promotions and services. Even though the Tix Id application already provides the best service, there are still some customers who feel unsatisfied using the application, a problem that often occurs is that there is often a one-sided ticket booking cancellation by Tix Id, the transaction process has been successfully carried out, besides that the consumer is also harmed by Tix's complaints My ID-consumer refunds remain reduced, and there are also often errors that contain seats not available. One way to optimize this application in the transaction process, namely by improving the information infrastructure, before improving the technology infrastructure, security analysis will be done first by using the intrusion detection system (IDS) [1], and this IDS is the process of finding active solutions suspicious on a system or network so that it can be identified the cause that occurs in the Tix Id application transaction process. The results obtained from this study are errors that often occur in Tix Id applications can not be identified whether it is an attack or not, but this research has resulted in the design of the need to optimize network security in Tix Id applications.Keywords: Security, Transactions, Tix Id, Intrusion Detection System (IDS), SnortAbstrakEra digital merupakan tanda kemajuan internet yang menyebabkan semua menjadi mudah dan cepat. Tix Id adalah salah satu dari sekian banyak aplikasi e-commerce yang berkembang di era digital. Aplikasi ini berusaha agar konsumen merasa puas dengan promosi dan pelayanan. Meskipun aplikasi Tix Id sudah berusaha memberikan pelayanan terbaik namun masih ada beberapa konsumen yang merasa kurang puas menggunakan aplikasi tersebut, masalah yang sering terjadi adalah sering terjadi pembatalan pemesanan tiket sepihak oleh Tix Id padahal proses transaksi sudah berhasil dilakukan, selain itu konsumen juga merasa dirugikan ketika pihak Tix Id me-refund konsumen namun saldo konsumen tetap berkurang, dan juga sering terjadi error yang berisi pesan kursi tidak tersedia. Salah satu cara untuk mengoptimasi aplikasi tersebut kususnya dalam proses transaksi, yaitu dengan memperbaiki infrastruktur teknologi informasi, sebelum diperbaiki infrastruktur teknologinya, akan dilakukan terlebih dahulu analisis keamanan dengan menggunakan metode intrusion detection system (IDS) [1], dimana IDS ini merupakan proses untuk mendeteksi aktivias mencurigakan pada sebuah sistem atau jaringan sehingga dapat diketahui penyebab kesalahan yang terjadi pada proses transaksi aplikasi Tix Id. Hasil yang diperoleh dari penelitian ini adalah kesalahan yang sering terjadi pada aplikasi Tix Id belum dapat teridentifikasi apakah merupakan serangan atau bukan, namun penelitian ini telah menghasilkan rancangan kebutuhan untuk mengoptimalisasi keamanan jaringan pada aplikasi Tix Id.Kata Kunci: Keamanan, Transaksi, Tix Id, Intrusion Detection System (IDS), Snort


2018 ◽  
Vol 10 (3) ◽  
pp. 11-25
Author(s):  
Rizki Nurdin

With the existence of this information will be easily obtained, the exchange of data that occurs in the virtual world will increase. In addition to the development of this technology, unwittingly evolved also crimes that occur in cyberspace that can harm users who access these sites, ranging from the delivery of viruses, spamming or other types of crime. So that institutions connected in an Internet network will be very vulnerable to network security at the institution. This is given that the productivity of an institution or company will depend on the performance of the network in it. Damage that occurs in a network will result in data exchange that occurs on the network will slow or even damage the network system. Therefore a mechanism that is used to analyze network security is required. Computer network security systems connected to the Internet must be planned and well understood in order to protect the resources within the network effectively. Keywords : Nessus and Ethereal, Internet Security


Sign in / Sign up

Export Citation Format

Share Document