Sistem Keamanan Jaringan Local Area Network Menggunakan Teknik De-Militarized Zone

2018 ◽  
Vol 5 (2) ◽  
pp. 91-106
Author(s):  
Ino Anugrah ◽  
Raden Hengki Rahmanto

ABSTRACT   Islamic University”45” computer network needs a safe network to strengthen the network security systems to protect servers from attacks such as Port Scanning and DoS attack (Denial of Service). One of the network security techniques is De-Militarized Zone (DMZ) that is a mechanism to protect the internal system from hacker attacks or other parties who want to enter the system with no access. The purpose of this Project is to implement LAN network security system using De-Militarized Zone (DMZ) technique, with a single firewall that supports the internal and external networks. The results of the DMZ technique implementation at the Islamic University's "45", it is found that filter DoS attack can be implemented well.  Data analysis results show DoS attack with the type of ICMP Flooding attack, and UDP Flooding attack can be blocked with Percentage of success is 98%.   Keywords : attack, network security,  de-militarized zone     ABSTRAK   Jaringan komputer Universitas Islam “45” memerlukan keamanan jaringan untuk dapat memperkuat sistem keamanan jaringan pada server dari serangan seperti Port Scanning dan DoS (Denial of Service). Salah satu teknik keamanan jaringan yaitu De-Militarized Zone (DMZ) yang merupakan mekanisme untuk melindungi sistem internal dari serangan hacker atau pihak-pihak lain yang ingin memasuki sistem tanpa mempunyai hak akses. Tujuan Tugas Akhir ini adalah untuk mengimplementasikan sistem keamanan jaringan LAN menggunakan teknik De-Militarized Zone (DMZ). metode dasar adalah dengan menggunakan firewall tunggal yang menjadi penyangga jaringan internal dan external. Hasil penelitian implementasi teknik DMZ pada layanan server jaringan komputer Universitas Islam “45” dapat melakukan filter DoS attack dengan baik, data hasil analisa  menunjukan DoS attack dengan jenis ICMP Flooding attack, dan UDP Flooding attack dapat di-block dengan Persentase keberhasilan sebesar 98%.   Kata kunci : Serangan,  Keamanan jaringan,  De-Militarized Zone

2014 ◽  
Vol 687-691 ◽  
pp. 1884-1887
Author(s):  
Yu Dong ◽  
Jun Hua Guo

With the rapid expansion of the rapid development of computer network technology and network coverage, campus network security issues are increasingly complex and outstanding looks up. In this paper, we have the analysis of the campus CAN security situation, put forward the principle of network security policy-making process to be followed, clearly a number of network security policy are also pointed out to build a more complete network security solution ideas. For the current campus CAN security issues, we discuss the principles and methods of the CAN network design process involved in the security system, and propose specific means for the campus CAN technology features. Meanwhile, we have researched and explored the characteristics and design of school network management, combined with the existence of the campus local area network insecurity, indicated security needs of the campus network, and to developed appropriate the security policy of campus network.


2014 ◽  
Vol 1079-1080 ◽  
pp. 595-597
Author(s):  
Jian Hang Wang ◽  
Hai Bo Wang

Development of computer network technology has greatly improved the sharing rate and utilization of information resources, many areas are widely used local area network, widely used degree gradually expose their security and confidentiality issues. In particular, people lack knowledge on security policy and network security control mechanisms, leading network security becomes more complex. In this paper, the main problem with the current computer Local Area Network security and the starting point, the focus of the analysis and management of their security and confidentiality measures, hope to further enhance the computer LAN security.


2018 ◽  
Vol 1 (1) ◽  
Author(s):  
Hongyan Han

The 21st century is the information age, information has become an important strategic resource for social development, social information has become the development trend of the world today and the core, and information security in the information society will play a very important role. With the continuous development of computer networks, global information has become the trend of human development. However, because the computer network has the form of connection diversity, terminal distribution inhomogeneity and network openness, interconnection and other characteristics, resulting in the network vulnerable to hackers, malware and other malicious attacks, the former will cause unpredictable impact on the user , While the latter often causes the system to crash. Whether in the local area network or in the wide area network, there are natural and man-made and many other factors of vulnerability and potential threats. Therefore, the network security measures should be able to all aspects of a variety of threats and vulnerabilities, so as to ensure the confidentiality of network information, integrity and availability.  A t t h e beginning of this article, the beginning of this article, through the analysis of hacker behavior and typical attacks, summarizes the inevitable reasons for the existence of network security vulnerabilities, and summarizes the status of computer network security, as well as the specifi c concepts, classifi cation and limitations of vulnerability scanning technology. The focus of this paper is to improve the original system of the theme module, and the original system to add some features to make it more perfect function. Finally, the shortcomings of the system and some suggestions for further improvement and expansion are put forward.


2013 ◽  
Vol 397-400 ◽  
pp. 2090-2093
Author(s):  
An Hong Tian ◽  
Cheng Biao Fu

Due to the problem of network structure, security, redundant path in traditional network, this can be solved by Virtual Local Area Network (VLAN) technology. As the network laboratory in colleges and universities is not perfect because of high cost, a virtual simulation tools named Packet Tracer has been introduced to computer network experimental curriculum, this paper put forwards the detail design scheme by the example of VLAN with three switches, and provides the experiment and theoretical analysis and simulation verification .The practice has proved this method not only deepens students comprehension of network, but also cultivates the students' actual comprehensive ability.


2021 ◽  
Vol 12 (06) ◽  
pp. 4750-4762
Author(s):  
Yakubu Ajiji Makeri ◽  
Giuseppe T. Cirella ◽  
Francisco Javier Galas ◽  
Hamid Mohsin Jadah ◽  
Adetayo Olaniyi Adeniran

1999 ◽  
Vol 9 ◽  
pp. 23-28 ◽  
Author(s):  
Chris Brown

Talking Drum is an interactive computer network music installation designed for the diffusion of cyclically repeating rhythms produced by four electronically synchronized instruments separated by distances up to 50 feet (16 m). The reverberant character of the performance space and the distance-related time-delays between stations combine with the speed and rhythms of the music to create a complex, multifocal mix that audiences explore by moving independently through the installation. The software uses Afro-Cuban musical concepts as a model for creating an interactive drum machine. It implements a simple genetic algorithm to mediate the interaction between pre-composed and improvised rhythms.


2012 ◽  
Vol 532-533 ◽  
pp. 1517-1521
Author(s):  
Jia Li ◽  
Li Gan ◽  
Fang Fang Du

As the daughter of modern wireless communication technology & computer network technology, Wireless Local Area Network(WLAN) is being used widely in many areas. It is well known that WLAN has the advantages such as simple network configuration, high transmission rate, good extensibility and mobility, and convenience to carry, etc. However, its security mechanism is not perfect to guarantee its security because of some design flaws in safety precautions. The application of AES in WLAN improves its data confidentiality. The work presented in this paper focuses on present AES encryption algorithm security problem and optimization of its S Box. The improved algorithm this paper put forward in WLAN, is proved to be efficient.


Sign in / Sign up

Export Citation Format

Share Document