scholarly journals Ancaman, Serangan dan Tindakan Perlindungan pada Keamanan Jaringan atau Sistem Informasi : Systematic Review

UNISTEK ◽  
2020 ◽  
Vol 7 (2) ◽  
pp. 59-70
Author(s):  
Agustani Bustami ◽  
Syamsul Bahri

Keamanan jaringan atau sistem informasi sangat berdampak dengan kehadiran berbagai ancaman atau serangan yang dapat menyebabkan kebocoran informasi sensitif dan rahasia serta penurunan kinerja organisasi. Terdapat beraneka ragam ancaman atau serangan pada keamanan jaringan atau sistem informasi seperti insider attacks, eavesdropping, masquerading, man-in-the-middle-attack, virus attack atau denial of service attack dan lain sebagainya. Teknologi keamanan yang sesuai dapat ditetapkan sebagai antisipasi dan perlindungan dari beragam ancaman atau serangan keamanan. Agar penentuan teknologi keamanan dapat sesuai dengan kebutuhan organisasi, maka diperlukan pemetaan terlebih dahulu antara jenis ancaman atau serangan dengan teknologi keamanan yang ada berdasarkan kepada aspek keamanan, yaitu: kerahasiaan (confidentiality), integritas (integrity) dan ketersediaan (availability) [1][2]. Firewall, IDS, antivirus system dan cryptographic system menjadi teknologi keamanan pilihan disebabkan kehandalan mereka dalam mengantisipasi dan melindungi jaringan atau sistem informasi pada aspek keamanan yang berbeda-beda

Author(s):  
Ankur Dumka ◽  
Hardwari Lal Mandoria ◽  
Anushree Sah

The chapter surveys the analysis of all the security aspects of software-defined network and determines the areas that are prone to security attacks in the given software-defined network architecture. If the fundamental network topology information is poisoned, all the dependent network services will become immediately affected, causing catastrophic problems like host location hijacking attack, link fabrication attack, denial of service attack, man in the middle attack. These attacks affect the following features of SDN: availability, performance, integrity, and security. The flexibility in the programmability of control plane has both acted as a bane as well as a boon to SDN. Like the ARP poisoning in the legacy networks, there are several other vulnerabilities in the SDN architecture as well.


Security is the main concern for IOT devices as are expected to share a lot of crucial information about the user and his surroundings. The traditional security mechanisms are ineffective against sophisticated and advanced security attacks such as Man in the Middle Attack, Denial of Service attack, Identity cloning. Different solutions have been proposed for user authentication. Device authentication is crucial in IOT environment and cannot be neglected. Despite this device authentication has not gained equal attention from the research community. The aim of this research is to develop a lightweight and robust device authentication algorithm by Artificial Immune System to ensure data integrity in IoT networks. The concepts of Artificial Immune system are utilized for generating a non-redundant device signature which is used to differentiate between authentic and malicious nodes. The device signature is generated dynamically and is non reusable. This property makes the proposed algorithm secure against numerous high-level attacks such as frequency analysis attacks, Man in the Middle attack, side channel attacks, Denial of Service attack. The developed algorithm is tested in real time and prevents malicious nodes from entering the network. In addition to being immune against the high level attacks the proposed algorithm functions with low communication cost. The proposed algorithm can be used for providing security in IOT devices with limited battery life and processing power such as IOT enabled and remotely deployed Wireless Sensor Networks for forest fire detection, power plant monitoring , remote military applications and many others.


Sign in / Sign up

Export Citation Format

Share Document