secure shell
Recently Published Documents


TOTAL DOCUMENTS

73
(FIVE YEARS 18)

H-INDEX

9
(FIVE YEARS 0)

2021 ◽  
Vol 9 (1) ◽  
pp. 45-55
Author(s):  
Abdul Djalil Djayali ◽  
Rifaldi Nurdin ◽  
Rachmat Saleh Sukur

Keamanan berbanding terbalik dengan kenyamanan, semakin nyaman dalam penerapan teknologi maka akan berdampak pada sisi keamanan sistem. Server merupakan salah satu infratruktur yang penting dalam mengelolah data. Mencegah serangan pada Server penting untuk dilakukan. Penerapan firewall dapat meminimalisir serangan yang membahayakan Server. Salah satunya dengan menerapkan aplikasi Intrusion Detection System (IDS) seperti Snort yang memiliki kemampuan untuk mendeteksi serangan yang terjadi pada sistem Server. Pada penelitian ini, penulis melakukan pengembangan sistem yang diberi nama R-Wall. Penerapan R-Wall bertujuan untuk mampu memonitor dan mengamankan server terhadap beberapa metode serangan, antara lain yaitu distribution denial of service (DDoS) ping of death, port scanning, brute force pada layanan file transfer protocol (FTP) dan brute force pada layanan secure shell (SSH). Hasil penerapan ini mampu memberikan notifikasi serangan yang dikirimkan melalui robot Telegram dengan total 247 serangan DDoS ping of death, 8 serangan port scanning, 247 serangan brute force pada layanan FTP dan 208 serangan pada layanan brute force SSH. R-Wall juga mampu melakukan pembatasan akses terhadap penyerang.


2021 ◽  
Vol 9 (01) ◽  
pp. 127-132
Author(s):  
Sourabh Saroha ◽  

Fortifying any Linux server is significant to safeguard the user information, highbrow chattels, and stretch, commencing from hackers. The coordination supervisor is in authority for safekeeping the Linux packet. Underneath maximum system formations, operator appellations, open sesame, FTP / tel-net / r-sh guidelines and relocated documentations be able to be seized by everyone programmed in the identical environment. To overcome this problem the user or the server can use secure shell, secure FTP, or file transfer protocol with transport layer security. The operating system can be protected more securely by using the above protocols. The security of the linux modules can be protected by using security enhancement technique, trappings numerous measures to avert unlicensed coordination convention. The safe keeping structural design rummage-sale is called Flask, and delivers a spotless different protection strategy and implementation. This paper is a gestalt of the Flask architecture and the execution in Linux.


2021 ◽  
pp. 18-26
Author(s):  
Navod Neranjan Thilakarathne ◽  
◽  
◽  
◽  
N.T .. ◽  
...  

The rapid growth of Information and Communication Technology (ICT) in the 21st century has resulted in the emergence of a novel technological paradigm; known as the Internet of Things, or IoT. The IoT, which is at the heart of today's smart infrastructure, aids in the creation of a ubiquitous network of things by simplifying interconnection between smart digital devices and enabling Machine to Machine (M2M) communication. As of now, there are numerous examples of IoT use cases available, assisting every person in this world towards making their lives easier and more convenient. The latest advancement of IoT in a variety of domains such as healthcare, smart city, smart agriculture has led to an exponential growth of cyber-attacks that targets these pervasive IoT environments, which can even lead to jeopardizing the lives of people; that is involved with it. In general, this IoT can be considered as every digital object that is connected to the Internet for intercommunication. Hence in this regard to analyze cyber threats that come through the Internet, here we are doing an experimental evaluation to analyze the requests, received to exploit the opened Secure Shell (SSH) connection service of an IoT device, which in our case a Raspberry Pi devices, which connected to the Internet for more than six consecutive days. By opening the SSH service on Raspberry Pi, it acts as a Honeypot device where we can log and retrieve all login attempt requests received to the SSH service opened. Inspired by evaluating the IoT security attacks that target objects in the pervasive IoT environment, after retrieving all the login requests made through the open SSH connection we then provide a comprehensive analysis along with our observations about the origin of the requests and the focus areas of intruders; in this study.


2020 ◽  
Vol 13 (2) ◽  
pp. 1-9
Author(s):  
Farid Jatri Abiyyu ◽  
Ibnu Ziad ◽  
Ade Silvia Handayani

Diskless server is a cluster computer network which uses SSH (Secure Shell) protocol to grant the client an access to the host's directory and modify it's content so that the client don't need a hardisk (Thin Client). One way to design a diskless server is by utilizing "Linux Terminal Server Project", an open source-based script for Linux. However, using Linux has it own drawback, such as it can't cross platform for running an aplication based on Windows system which are commonly used. This drawback can be overcomed by using a compatibility layer that converts a windows-based application's source code. The data which will be monitored is the compatibility layer implementation's result, and the throughput, packet loss, delay, and jitter. The result of measurement from those four parameters resulting in "Excellent" for throughput, "Perfect" for packet loss and delay, and "Good" for jitter.


Author(s):  
Angelo Victor Kraemer Foletto ◽  
Fábio Alexandrini

Há mais desabrigados em função de desastres naturais, do que por conflitos e violência no mundo. O crescimento populacional, ocupação desordenada, aumento da pobreza e a destruição da natureza são uns dos requisitos que colocam pessoas em perigo. Em Santa Catarina, os desastres naturais mais frequentes são as cheias e os deslizamentos em decorrência das chuvas. Inúmeras medidas foram ou estão sendo tomadas para prevenir algumas destas, como a utilização da tecnologia da informação para monitorar a situação decorrente. Atualmente, apenas os 3 rios maiores encontram-se monitorados pela Defesa Civil de Rio do Sul, que emite alertas à população periodicamente, porém não incluem as margeantes dos ribeirões que são afetadas por eventos climáticos com maior frequência devido às fortes chuvas que em questão de minutos provocam enxurradas. Diante deste contexto, torna-se possível empregar dispositivos vinculados ao conceito de Internet of Things (IoT) para otimizar o processo de monitoramento do nível da água de ribeirões. O presente estudo teve como objetivo desenvolver um protótipo autônomo capaz de mensurar o nível de água de ribeirão em tempo real. Para desenvolvimento do trabalho foram utilizados um minimicrocomputador Raspberry Pi 3B+, sensor ultrassônico TF-mini Plus e câmera módulo V2 para Raspberry Pi, acompanhado de um servidor físico, onde existe a persistência, pósprocessamento e disponibilização dos dados. A linguagem de programação utilizada foi o Python 2.7 e o banco de dados MariaDB 10.5.5 para integração dos ambientes. Foi criado um túnel de comunicação com o servidor por meio do software OpenVPN e a utilização massiva das ferramentas GIT e Secure Shell (SSH) para versionamento de arquivos e acesso remoto, respectivamente. Bash script para sincronização de softwares e configurações básicas sobre SystemD, garantindo o funcionamento correto das aplicações e gerenciamento básico de logs de dados. Com relação a efetividade do protótipo no ambiente foi verificado que a água translúcida gera problemas de aquisição dos dados, elevando a taxa de perca de eco e leituras inválidas devido a composição da água. Quando posicionado a metade do seu alcance máximo a taxa varia de 40% a 62%. Em situações contrárias, em ambiente com água não translúcida, as taxas variaram entre 0,5% e 5,7%. O protótipo permite agregar aos métodos tradicionais de aquisição dos dados de nível de água, garantindo o fácil acesso aos dados através do link http://monitrib.ifc-riodosul.edu.br/. De maneira geral, o protótipo desempenha bom funcionamento retornando medidas precisas e confiáveis, pois em maioria os ribeirões têm águas de aparência não translúcida e de agitação constante. Por serem compactos, dinâmicos e consumirem pouca energia, tendem a ser empregados devido a baixa necessidade de manutenção, permitindo a instalação em ambientes de difícil e/ou limitado acesso.


2020 ◽  
Vol 4 (1) ◽  
pp. 397-403
Author(s):  
Redo Pratama ◽  
Mira Orisa ◽  
FX Ariwibisono

Sistem monitoring server sangat dibutuhkan bagi seorang administrator. Sebab memastika setiap server dalam kondisi yang baik merupakan tugas utama dari administrator, karena sifat server yang harus dalam kondisi online atau hidup setiap Sistem monitoring yang saat ini digunakan ialah dengan cara mengecek setiap server yang dikelolanya. Dengan cara tersebut maka administrator dapat mengetahui kondisi fisik serta keadaan server dalam keadaan up atau down.                 Dengan menggunakan protocoi ICMP (Internet Control Message Protocol) untuk menjalankan fitur monitoring server secara real time, serta menggunakan protocol SSH (Secure Shell) untuk melakukan kontrol server dan juga melakukan transfer file ke server. Dalam Aplikasi monitoring dan kontrol server yang diterapkan dan diuji cobakan dalam sebuah jaringan lokal di Laboratorium Jaringan Komputer Tektnik Informatika S-1 ITN Malang.                 Kegiatan monitoring dapat dilakukan melalui aplikasi ini adalah memantau kondisi real time dari server yang dikelola dalam kondisi up atau down serta, apabila server dalam keadaan down maka administrator akan memperoleh sebuah notifikasi. Fitur kontrol server yang dapat dilakukan dalam aplikasi ini ialah mematikan atau menjalankan ulang server, mengolah service yang bejalan diserver, serta fitur untuk melakukan pengiriman file kesebuah server.


Sign in / Sign up

Export Citation Format

Share Document