scholarly journals Monitoring Server dengan Prometheus dan Grafana serta Notifikasi Telegram

2020 ◽  
Vol 1 (4) ◽  
pp. 133-138
Author(s):  
Dede Rahman ◽  
Hidra Amnur ◽  
Indri Rahmayuni

The network administrator is a person who is responsible for managing computer networks. One of the duties of a network administrator is network monitoring because errors on the server and services running on the server cannot be known when it happened. This can be difficult if the administrator is far from a surveillance center. This situation can be fatal if there is an error on the server and suddenly the service from the server is not running properly without being noticed because the network administrator is not on the spot. By utilizing Prometheus and Grafana with a telegram notification system that uses a Linux-based server, network administrators can get information on server conditions and services running on the server quickly. The result obtained is a system that is able to assist network administrators in monitoring servers and services that are running on the server anytime and anywhere to keep servers and services running on the server stable even though the network administrator is not in the monitoring center

2018 ◽  
Vol 7 (2) ◽  
pp. 61-67
Author(s):  
Iga Revva Princiss Jeinever

Computer networks are basically not safe to access freely. Security gaps in the network can be seen by irresponsible people with various techniques. Opening a port for access carries a high risk of being attacked by an attacker. In this connection, network administrators are required to work more to be able to secure the computer network they manage. One form of network security that is often used by network administrators in server management is through remote login such as ports on telnet, SSH, etc. A port that is always open is a network security hole that can be used by people who are not responsible for logging into the server. Focusing on these problems, in this study, Random Port Knocking is the right way and can be used to increase network security. With Random Port Knocking, the port will be opened as needed, the port will automatically change when it fails to log in more than three times and IP will automatically be blocked and access will not continue so that attacks on the network can be avoided and network security stability can be further improved. The final result of this research shows that the method applied in this research makes server safe. Because port randomization and IP block make irresponsible parties try harder to penetrate firewall walls.


KOMTEKINFO ◽  
2020 ◽  
Vol 7 (2) ◽  
pp. 159-170
Author(s):  
Heri Yanto ◽  
Febri Hadi

Network security is an important factor in guaranteeing data. Guaranteed security can avoid losses caused by attacks that occur in the network. Administrators play an important role in maintaining data or file security, but administrators cannot at all times monitor the security of the network. This problem can be overcome by adding a system for data traffic detection or called IDS. IDS will be linked by SMS Alert so that administrators can receive notifications of interruptions on the network. In this study, researchers conduct analysis and testing of problems that arise so that it will produce a system that is able to detect attacks or disruptions on the network quickly and can provide warnings to network administrators, so that administrators can take steps to anticipate these disruptions. Attacks can be detected from the pattern of attacks that are in the IDS rule so that intruders who try to enter will be detected and the system will send an SMS notification to the administrator.


Author(s):  
Shao Ying Zhu ◽  
Gerald Schaefer

Computer networks have evolved dramatically in recent years and consequently qualified and experienced network administrators are highly sought after, which in turn has led to the development of specialised computer networking courses at many universities. In this chapter, the authors investigate the use of network simulation tools as an alternative to be employed in computer networking laboratories. Network simulation tools provide students with the opportunity to freely experiment with virtual computer networks and equipment without the expensive costs associated with real networking hardware. The results of their research show that students appreciate the use of network simulators and see them as an effective approach to learning computer networking concepts and gaining the relevant experience. This was also confirmed by the actual performance of students who experienced different levels of exposure to networks simulators during their studies. The authors furthermore investigate the use of interactive, electronically assessed lab sessions, where students get immediate and interactive feedback while they are going through lab exercises. Their research shows that this approach not only releases the lecturer from less demanding students to better support weaker students, but that this will also lead to improved student performance and better student retention.


Author(s):  
Miguel Jose Hernandez y Lopez ◽  
Carlos Francisco Lerma Resendez

This chapter discusses the basic aspects of Honeypots, how they are implemented in modern computer networks, as well as their practical uses and implementation in educational environments, providing the reader with the most important points regarding the main characteristics of Honeypots and Honeynets. Honeypots are defined as “closely monitored network decoys” that can be set by network administrators to deal with a wide variety of attacks and interact with users in different levels (Provos, 2004). The implementation of Honeypots provides an answer to a common question posted by the field of information security and forensics: How to dissect the elements that make up an attack against a computer system. The chapter will summarizes the different features and capabilities of Honeypots once they are set up in a production environment to clarify the elements that are needed to be configured in order for a Honeypot to accomplish its main tasks and in order for it to be considered an effective tool. The end of the chapter will shift towards the analysis of virtualization as an important tool that maximizes the practical use of Honeypots in controlled environments that are focused towards the study of attacks, responses and analysis methods.


Author(s):  
Ali Al Shidhani ◽  
Khalil Al Maawali ◽  
Dawood Al Abri ◽  
Hadj Bourdoucen

Nowadays, the heavy reliance on computer networks necessitates minimizing outage time, increasing the availability of services, and preventing network related problems. Such realization requires continuous monitoring and observation. This is not a trivial task. Thus, automatic network monitoring tools are deployed to monitor and analyze the traffic trespassing network devices. There is an increasing demand for automated network monitoring tools and selecting a suitable candidate can become a challenging task. Some computerized network monitoring tools and systems are available, including expensive proprietary/closed-source solutions and Free Open Source Software (FOSS) systems. Three of the most popular FOSS network monitoring systems are: Nagios, OpenNMS and Zabbix. They are solid competitors to the available proprietary solutions. This paper evaluates the strengths and weaknesses of these tools. A qualitative and quantitative evaluation of the tools were conducted through monitoring real-time network traffic. The paper presents a thorough comparison between the tools. The comparison results are vital for network administrators wishing to adopt the studied monitoring tools.


Author(s):  
Catherine R. Alimboyong

<span>The infections in computer networks are complex. Its spread is analogous to a contagious disease which can cause destruction within a few seconds. Viruses in a computer or computer networks can spread rapidly by various means such as access to online social networking sites like twitter, Facebook, and opening of email attachments.  Thus, infections can go from being little dangerous to significantly harmful for a network. This paper proposed a simulation model that can predict the propagation of virus including the trend and the average infection rate using NetLogo software. Observed and simulated data sets were validated using chi-square tests. Results of the experiment have demonstrated accurate performance of the proposed model. The model could be very helpful for network administrators in mitigating the virus propagation and obstruct the spread of computer virus other than the usual prevention scheme particularly the use of antivirus software and inclusion of firewall security. </span>


2017 ◽  
Vol 5 (3) ◽  
Author(s):  
Fajar Cahyo Utomo ◽  
Nafila Nafila

The aims of this study is to analyze the influence of leadership style and motivation on employee performance. The sample used is a saturated sample, which makes all employees (40 people in total) are respondents. The result of this study proves that leadership style has an effect on employee performance, it indicates that there are 4 (four) indicators on leadership style that must be maintained which is (1) Credible leader in managing the organization's future, (2) Committed to wages for the good performance on subordinates, (3) Realistically assessing the environmental constraints, and (4) Understand the ability of subordinates. Motivation also affects employee performance, where there are also 3 (three) maintained indicators which is (1) The leader provides real guidance according to work standards, (ii) Providing adequate working facilities and (3) comfortable working atmosphere


JURTEKSI ◽  
2019 ◽  
Vol 5 (2) ◽  
pp. 113-118
Author(s):  
Mohd. Siddik

Abstract: The use of computer networks at this time has proven to be a very reliable means of communication and source of information. Government agencies, offices are now using the network as a medium for disseminating information. At present, in the implementation of computer networks, it is very necessary for management to optimize the network itself. Therefore it is necessary to do QoS (Quality of Service) Analysis, in order to get optimal network. QoS (Quality of Service) is a technology that can be applied in computer networks to provide optimal services for network users. With the existence of QoS (Quality of Service) allows network administrators to be able to perform bandwidth management to handle various effects due to congestion (congestion) in packet flow traffic in the network. In performing QoS (Quality of Service), a device that can do bandwidth management to the network is built. Mikrotik Routerboard750 is a network device using Linux-based MicroticOS that can be used in the application of QoS (Quality of Service). Keywords: Computer Network, QoS (Quality of Service), Mikrotik Routerboard750  Abstrak: Penggunaan Jaringan komputer pada saat ini telah terbukti sebagai sarana komunikasi dan sumber informasi yang sangat diandalkan. Seluruh instansi pemerintahan, perkantoran saat ini sudah memanfaatkan jaringan sebagai media sarana penyebaran informasi. Saat ini dalam implementasinya jaringan komputer sangat butuh dilakukan manajemen guna optimalimalisasi jaringan itu sendiri. Maka dari itu perlu dilakukan Analasis QoS (Quality of Service), guna mendapatkan jaringan yang optimal. QoS (Quality of Service) merupakan teknologi yang dapat diterapkan dalam jaringan komputer guna memberikan layanan yang optimal bagi para pengguna jaringan. Dengan adanya QoS (Quality of Service) memungkinkan administrator jaringan untuk dapat melakukan manajemen bandwidth guna menangani berbagai efek akibat terjadinya kemacetan (congestion) pada lalu lintas aliran paket di dalam jaringan. Dalam melakukan QoS (Quality of Service) dibutauhan sebuah perangkat yang dapat melakukan manajemen bandwidth terhadap jaringan. Mikrotik Routerboard750 adalah perangkat jaringan menggunakana  MikrotikOS berbasis Linux yang dapat digunakan dalam penerapan QoS (Quality of Service) ini. Kata Kunci: Jaringan Komputer, QoS (Quality of Service), Mikrotik Routerboard750


Author(s):  
Febrian Wahyu Christanto ◽  
Mohammad Sani Suprayogi

Computer networks have evolved with the presence of cloud computing technology to accommodate the problem of inadequate computer devices and application services that are not integrated. USM (Universitas Semarang) which located in Indonesia is an educational institution that has implemented cloud computing technology using ROCCA (Roadmap for Cloud Computing Adoption) to accommodate the needs of internal application systems at this institution. The problem arises because the system administrator of the computer network is difficult to monitor the condition of the virtual server running because physically, the virtual server cannot be seen and touched. If there is a problem in one service, then the repair process takes a long time because there is not enough notification system to provide fast and detailed information about the condition of the virtual server running so that it will interfere with the quality of service from internal application system. The solution of these problems enhances the NMS (Network Monitoring System) functionality with notification system technology. Use PPDIOO method, this research will combine Pandora FMS and Telegram based on Android platform to implement a fast notification system in monitoring conditions virtual server resources which directly sent the message to the system administrator’s smartphone. The expectation of this research is the quality of internal application service at USM (Universitas Semarang) can be properly maintained.


Sign in / Sign up

Export Citation Format

Share Document