scholarly journals Implementasi Proxy dan Snort Sebagai Gateway Antivirus

Author(s):  
Andreas Sebayang ◽  
Indrastanti Ratna Widiasari

Technology and internet networks are two things that are always related, because in today's era the internet has become a much-needed medium for learning, communicating, exchanging data, and even playing. With the activity of using the internet network, a problem will arise, namely network security. Network security is a very important aspect as a defense in a network, to minimize the risk of data theft and unwanted access in an internet network. The purpose of this study is to implement the control and security of internet use in an agency with minimal costs. namely using the Linux operating system Ubuntu Server 18.04, Proxy Server, and Snort. The result of the system that has been created has a function to perform caching so that it can save bandwidth and can function as filtering content to minimize unwanted things on the network. In addition, the system created is very helpful for network admins to monitor the network in real-time, even can also enforce rules to protect the network.

2018 ◽  
Vol 1 (2) ◽  
pp. 137
Author(s):  
Khairul Saleh ◽  
Tini Fitriani

Abstrack - The application of information technology at this time is very closely related to everyday life. Komunikas which at first was only conveyed in a very simple way, namely "mouth by mouth" (coming directly between one human and another). In addition, the speedy internet network security system is also used as a process to prevent and identify unauthorized users (intruders) from the internet network. The aim is to anticipate the risk of internet networks that can be either physical or logical threats. What is meant by physical threat is that can damage the physical part of the computer or computer hardware while the threat of logic is in the form of theft of data or intruders who break into someone's account.   Keywords - Security System, Speedy Network


Repositor ◽  
2020 ◽  
Vol 2 (5) ◽  
pp. 541
Author(s):  
Denni Septian Hermawan ◽  
Syaifuddin Syaifuddin ◽  
Diah Risqiwati

AbstrakJaringan internet yang saat ini di gunakan untuk penyimpanan data atau halaman informasi pada website menjadi rentan terhadap serangan, untuk meninkatkan keamanan website dan jaringannya, di butuhkan honeypot yang mampu menangkap serangan yang di lakukan pada jaringan lokal dan internet. Untuk memudahkan administrator mengatasi serangan digunakanlah pengelompokan serangan dengan metode K-Means untuk mengambil ip penyerang. Pembagian kelompok pada titik cluster akan menghasilkan output ip penyerang.serangan di ambil sercara realtime dari log yang di miliki honeypot dengan memanfaatkan MHN.Abstract The number of internet networks used for data storage or information pages on the website is vulnerable to attacks, to secure the security of their websites and networks, requiring honeypots that are capable of capturing attacks on local networks and the internet. To make it easier for administrators to tackle attacks in the use of attacking groupings with the K-Means method to retrieve the attacker ip. Group divisions at the cluster point will generate the ip output of the attacker. The strike is taken as realtime from the logs that have honeypot by utilizing the MHN.


2019 ◽  
Vol 10 (03) ◽  
pp. 114-121
Author(s):  
Armanto Armanto

ABSTRACT The problem in this study is that more and more internet users in the Bina Insan Lubuklinggau University building specifically the Faculty of Computer internet connection often experience problems, the internet network is still unstable, and ways to divide internet access points in the Computer Faculty. This study uses data collection methods by observing and recording directly at the research site (Observation), conducting question and answer directly to the source (Interview), and documentation by reading literature books. The results showed that the internet is often experiencing constraints and unstable internet networks and ways to divide internet access points at the Computer Faculty of the University of Bina Insan Lubuklinggau by using Policy Base Routing and Failover Implementation using a Mikrotik Router. It can be concluded that the internet network connection is stable and shows the results of the distribution of internet access points at the Faculty of Computer Bina Insan Lubuklinggau. Keywords: Mikrotik, Policy Base Routing, Failover


Author(s):  
Gabriel PETRICĂ

Solutions that can be implemented to secure a LAN include firewalls and intrusion detection / prevention systems (IDS / IPS). For a wireless network, security is a challenge considering the specific elements of this type of network: the physical area from which the connection is possible, and the weaknesses of the protocols used for data encryption. This article presents a case study on the most widely used protocols (WEP, WPA and WPA2) to secure wireless networks and the methodology by which passwords can be decrypted using Kali Linux distribution - available for free on the Internet - and applications included in this operating system.


Respati ◽  
2019 ◽  
Vol 14 (2) ◽  
Author(s):  
Agus Fatkhurohman ◽  
Eli Pujastuti

 INTISARIPerkembangan zaman di era modern ini sudah memasuki era revolusi industri 4.0, dimana segala aspek sudah bergantung pada sebuah teknologi. Dimana bentuk teknologi ini sudah bergerak secara otomatis dan saling terhubung dengan jaringan internet. Teknologi yang digunakan sudah bergerak otomatis dan sudah banyak yang menggunakan sebuah system cerdas. Berbicara mengenai jaringan internet dan system cerdas, maka keterkaitan dengan sebuah data yang digunakan akan semakin besar bahkan bisa sampai tergolong data dengan kategori big data. Yang mana tempat penyimpanan data juga harus disesuaikan dengan kebutuhan datanya. Selain dengan kebutuhan data yang semakin besar di era revolusi industry ini yang selalu dikaitkan dengan jaringan internet maka keamanan sebuah data juga perlu dipertanyakan. Secara tidak langsung keamanan data juga bisa menjadi masalah besar. Dengan jaringan internet setiap orang di setiap dunia bisa mengakses sebuah data yang terkoneksi dengan jaringan internet. Tidak asing lagi sekarang sudah banyak kasus pencurian data karena terhubung dengan jaringan internet. Kasus pencurian data ini sering memanfaatkan website sebagai sarana untuk mencuri datanya yang sering disebut dengan istilah website phising. Phishing masih menjadi vektor serangan teratas yang memberi akses ke penyerang untuk membuka informasi pribadi seperti kredensial login dan nomor kartu kredit. Pada 2017 lalu, Indonesia menempati urutan ke-9 jumlah serangan phising yakni satu phishing insiden per 2.380 email. Laporan terbaru F5 yang bertajuk menyebutkan, insiden penipuan (fraud) pada Oktober, November, dan Desember melonjak 50% dari rata-rata tahunan. Berpura-pura menjadi seseorang atau entitas yang terkenal adalah taktik utama. Sebanyak 71% serangan phishing pada periode 1 september – 31 Oktober 2018 menggunakan modus mengaku dari perusahaan terkenal, khususnya di industri teknologi.Kata kunci :  jaringan, internet, sistem cerdas, website phising, serangan. ABSTRACT        The development of the era in this modern era has entered the era of industrial revolution 4.0, where all aspects have depended on a technology. Where this form of technology has moved automatically and interconnected with internet networks. The technology used has moved automatically and many have used an intelligent system. Talking about the internet network and intelligent systems, the linkages with the data used will be even greater and can even be classified as data with the big data category. Which is where the data storage must also be adjusted to the data requirements. In addition to the increasing data requirements in the industrial revolution era which are always associated with the internet network, the security of a data also needs to be questioned. Indirectly data security can also be a big problem. With the internet network everyone in every world can access a data that is connected to the internet network. No stranger now there are many cases of data theft because it is connected to the internet network. This data theft case often uses websites as a means to steal data which is often referred to as phishing websites.        Phishing is still the top attack vector that gives attackers access to private information such as login credentials and credit card numbers. In 2017, Indonesia ranked 9th in the number of phishing attacks, one phishing incident per 2,380 emails. The latest F5 report entitled, fraud in October, November and December increased by 50% from the annual average. Pretending to be someone or a famous entity is the main tactic. As many as 71% of phishing attacks in the period 1 September - 31 October 2018 use the mode claimed to be from a well-known company, especially in the technology industry.Keywords: network, internet, intelligents systems, website phishing, attack.


2014 ◽  
Vol 556-562 ◽  
pp. 5316-5320
Author(s):  
Yi Peng Zhang ◽  
Zheng Tao Jiang ◽  
Chen Yang

Routers are the key equipments connecting Wan, LAN and Internet network, and are the main part of the Internet. The reliability and security of routers is very important to the network performance and information data security. The analysis and research on the technologies of router security and protection is the core issue for network security. This paper mainly aims at providing a series of test and analysis on the vulnerabilities of Tenda wireless routers. Technically, it’s very difficult to crack the WPA /WPA2 wireless encryption. In this paper, we use the related vulnerabilities of wireless routers, and open Wifi Protection Setup (WPS) and Quick Security Settings (QSS) to get router PIN code, which can help us bypass the WPA/WPA2 encryption and, realizesd the router attack.


2017 ◽  
Vol 8 (1) ◽  
pp. 50-57
Author(s):  
Dafwen Toresa

Abstrak- Pada saat ini sangat banyak organisasi, baik pendidikan, pemerintahan, maupun perusahaan swasta berusaha membatasi akses para pengguna ke internet dengan alasan bandwidth yang dimiliki mulai terasa lambat ketika para penggunanya mulai banyak yang melakukan browsing ke internet. Mempercepat akses browsing menjadi perhatian utama dengan memanfaatkan teknologi Proxy server. Penggunaan proxy server perlu mempertimbangkan sistem operasi pada server dan tool yang digunakan belum diketahui performansi terbaiknya pada sistem operasi apa. Untuk itu dirasa perlu untuk menganalisis performan Proxy server pada sistem operasi berbeda yaitu Sistem Operasi Linux dengan tools Squid dan Sistem Operasi Windows dengan tool Winroute. Kajian ini dilakukan untuk mengetahui perbandingan kecepatan browsing dari komputer pengguna (client). Browser yang digunakan di komputer pengguna adalah Mozilla Firefox. Penelitian ini menggunakan 2 komputer klien dengan pengujian masing-masingnya 5 kali pengujian pengaksesan/browsing web yang dituju melalui proxy server. Dari hasil pengujian yang dilakukan, diperoleh kesimpulan bahwa penerapan proxy server di sistem operasi linux dengan tools squid lebih cepat browsing dari klien menggunakan web browser yang sama dan komputer klien yang berbeda dari pada proxy server sistem operasi windows dengan tools winroute. Kata kunci: Proxy, Bandwidth, Browsing, Squid, Winroute Abstract- At this time very many organizations, both education, government, and private companies try to limit the access of users to the internet on the grounds that the bandwidth owned began to feel slow when the users began to do a lot of browsing to the internet. Speed up browsing access is a major concern by utilizing Proxy server technology. The use of proxy servers need to consider the operating system on the server and the tool used is not yet known the best performance on what operating system. For that it is necessary to analyze Performance Proxy server on different operating system that is Linux Operating System with Squid tools and Windows Operating System with Winroute tool. This study was conducted to determine the comparison of browsing speed of the user's computer (client). The browser used on the user's computer is Mozilla Firefox. This study uses two client computers with each test 5 times accessing web browsing / destination testing via proxy server. From the results of tests conducted, it can be concluded that the application of proxy server in linux operating system with squid tools faster browsing from client using the same web browser and client computer different from the proxy server windows operating system with winroute tools. Keywords: Proxy Server, Linux, Windows, Squid, Winroute


2020 ◽  
Vol 2 (2) ◽  
pp. 70
Author(s):  
Galih Fanani ◽  
Imam Riadi

This research is carried out an analysis and investigation of digital log file data retrieval from DoS (Denial of Service) attacks, on internet networks that have been detected by IDS (Intrusion Detection System) and using Wireshark as Tools Analysis Network. The research phase begins with the design of an experimental scenario which is often carried out daily where users access the internet network. The next stage is an attack in the form of ping flood on the target computer connected to the internet network, the final stage of data retrieval which will be analyzed later. Testing research using UAT (User Acceptance Test), to prove that the analysis has been received by the user. The results of research conducted to obtain data in the form of an attacker's IP (Internet Protocol), target IP, protocol type, the port used and the time of the attack. In the UAT test results, the obtained value of 18% of students disagrees, 58% of students agree, and 24% of students strongly agree. This research has conducted an analysis of random data attacks using Wireshark applications received by users.


2018 ◽  
Vol 10 (3) ◽  
pp. 11-25
Author(s):  
Rizki Nurdin

With the existence of this information will be easily obtained, the exchange of data that occurs in the virtual world will increase. In addition to the development of this technology, unwittingly evolved also crimes that occur in cyberspace that can harm users who access these sites, ranging from the delivery of viruses, spamming or other types of crime. So that institutions connected in an Internet network will be very vulnerable to network security at the institution. This is given that the productivity of an institution or company will depend on the performance of the network in it. Damage that occurs in a network will result in data exchange that occurs on the network will slow or even damage the network system. Therefore a mechanism that is used to analyze network security is required. Computer network security systems connected to the Internet must be planned and well understood in order to protect the resources within the network effectively. Keywords : Nessus and Ethereal, Internet Security


2018 ◽  
Vol 218 ◽  
pp. 03007 ◽  
Author(s):  
Mia Rosmiati ◽  
Mochammad Fachru Rizal ◽  
Irma Wanti

The number of child abduction cases in Indonesia today is always increasing every year, this has given concern to parents in leaving their children to play outside the home. Therefore, a device that can detect the presence of children when outside the home was needded. At this time, some devices can monitor ones location easily and quickly, such as Smartwatch and GPS Tracker, but the device must be connected to the internet With these conditions, it needs a device that can transmit information in real time without any dependence LoRa module are using low frequency radio as data transmission medium, can be built a Location monitoring prototype without connecting to internet network. From the examination results, the built system successfully shows the real time location coordinate point with a maximum data transmission limit of 2 KM for Line Of Sight (LOS).


Sign in / Sign up

Export Citation Format

Share Document