scholarly journals Model Pemantauan Keamanan Jaringan Melalui Aplikasi Telegram Dengan Snort

Author(s):  
Natanael Christianto ◽  
Wiwin Sulistyo

Network security is the main of the development of today's technology. The ease in accessing the internet also requires protection on users is required. The ease of accessing the internet by people can also cause the occurrence of cyber crime. Cyber crime can be done by all internet users, without exception, to earn a profit. Security monitoring system server through the app messenger Telegram can help administrators in the work because always be on standby in front of the server computer. Notice of Snort as IDS via Telegram also quicked and can be accepted anywhere. In taking action when the server something happened not too late. Target cyber crime also can attack anyone without exception. A system should be a strength, with the protection of a secure network that will be difficult to hack by hackers. The server is the main target in the conduct of cyber crime. The use of the server must maintain to secure all the data is not misused by persons who are not responsible. Each server is a system that should be an administrator as a guard on duty watching and taking action when something happens on the server. To monitor a server, an administrator should always standby in front of the server computer so as not to late take action when the server is about to happen something.

Author(s):  
Aarthee R. ◽  
Ezhilmaran D.

This chapter describes how cybercrime, likewise called computer crime, is any illicit activity that includes a PC or system associated gadget. While numerous magnificent items have been produced to secure our information correspondence frameworks, these items must be upgraded significantly more. What is additionally required more are the individuals who know how to explore PC network security episodes and the individuals who have both investigative gifts and specialized knowledge of how the internet truly functions. This allows for an investigative structure which can withstand attack, alongside information of how the internet functions and the instruments to examine cybercrime apparatus to tell the who, where, what, when, why, and how. Cybercrime apparatus make our work substantially more productive.


2013 ◽  
Vol 648 ◽  
pp. 319-322
Author(s):  
Shao Feng Lin ◽  
Xiao Peng Li

In the network security monitoring system, it is important to trace information source timely and accurately, which is an important way to investigate and collect evidence. But because of public network’s IP limited resources, LAN hosts usually share the public network’s IP resources by NAT way, and conceal internal network structure, which make the network security monitoring system unable to locate the real effective sensitive information source in LAN. Based on the study of WINPCAP network sniffing technology and the ARP deception protocol in exchange network environment, a network security monitoring system with mechanical properties suitable for LAN environment is designed and realized, which locate information source accurately through filtering and matching the sensitive information transmitting in LAN by setting the capture factors as key words of document, web site shared by FTP, QQ number etc.


Internet has become an innovative relief for the modern generation, at it also promote a burden on the society. The internet acts as the genesis and breeding ground for a new kind of crime called the “cyber crime”. Common internet users are not aware of cyber crimes and they are not conscious on the precautionary aspects to over come such attacks from taking place. This paper aims to analyze the awareness levels of internet users towards various forms of cyber crimes. This study was conducted in Krishna and Guntur districts of Andhra Pradesh. Descriptive Research Design was adopted for the study and a sample size of 160 respondents were selected using Random Sampling Technique involving both the genders among the internet users. The findings of the study shows that the awareness levels of the internet users towards cyber crimes in the study area are very low and they have very less perception towards various forms of cyber crimes that exists in the modern times.


2021 ◽  
Vol 18 (2) ◽  
pp. 257-266
Author(s):  
Vićentije Darijević

The development of the Internet affects human society in two ways: it enables society to progress and endangers security.Online access platforms facilitate business, education and contacts.On the other hand, individuals who access virtual platforms expose their privacy and their assets to the risk of cyber attacks.Unfortunately, one gets the impression that legislation cannot keep pace with technological advances so that many crimes committed on the internet remain unsanctioned. This paper points out the characteristics of cybercrime, gives an overview of international documents aimed at establishing cyber security.A list of domestic legislative regulations by which the Republic of Serbia seeks to solve the problems caused by cybercrime is also given.It also points out the characteristics of this type of crime that directly affect the impossibility of global regulation and protection of Internet users.


2021 ◽  
Vol 1 (2) ◽  
pp. 113-122
Author(s):  
Rachmat Muwardi ◽  
Hongmin Gao ◽  
Harun Usman Ghifarsyam ◽  
Mirna Yunita ◽  
Andika Arrizki ◽  
...  

The development of information technology nowadays has become faster, and this makes network security become important. A huge increasing number of computers that are connected makes many gaps in a network. An administrator has an important role in protecting the security of the network. The problem comes when an administrator has human problems such as pain, negligence, and tiredness while needing rapid information when there is an intrusion on the network. This problem can be solved by adding a data traffic detection system known as Intrusion Detection System (IDS). IDS will be connected to Mail Gateway until that administrator can receive notifications such as alerts during an intrusion to the network anytime and anywhere. Snort as one of the network security systems should be developed as a security detection system and network security. A security intrusion prevention system or an Intrusion Prevented System (IPS). The author tries to do analysis and testing on the subjects above to produce a system capable of detecting the intruder in a network that is mobile and also makes it easy for administrators to open data anywhere and anytime using any device.


Author(s):  
Prof. Simranpreet Kaur

Abstract: The crime that involves and uses computer devices and Internet, is known as cybercrime. Cybercrime can be committed against an individual or a group; it can also be committed against government and private organizations. It may be intended to harm someone’s reputation, physical harm, or even mental harm. Due to gradually increase of the internet users and netizens, abusage of technology is broadening gradually which tends to cyber-crimes. Cybercrime causes loss of billions of USD every year. Cyber Security, a mechanism by which computer information and the equipments are protected from unauthorized and illegal access. This paper illustrates and focuses on cybercrime, how society suffered, types of threats, and cyber security. Keywords: Cybercrime, Types, Protection, Cyber security, Hackers, Impact.


Nowadays, the Computer Networks and the internet are increased. Lots of information is accessed and allowed to the users to share the information to the Internet. One of the major issues with internet was different types of attack. Ransomware is a one kind of attack or it is malicious software that threatens to publish the victim's data. A variety of threats is the main target for the effective network security and avoids them from spreading or entering to the networks the network security on computer essential for computer networks. Ransom ware is a critical threat in network security since each day the raising of ransomware gets abundant. The major problem by the researchers is the prediction of ransomware. This paper planned to carry out a review on the different method to detect ransomware. Ransomware detection is very much helpful on minimizing the workload of analyst and for determining the variation in hidden Ransomware samples. Using machine learning algorithms Ransomware detected efficiently and trustfully.


Sign in / Sign up

Export Citation Format

Share Document