To see the other types of publications on this topic, follow the link: DHCP-server.

Journal articles on the topic 'DHCP-server'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'DHCP-server.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Kadafi, Muamar, and Khusnawi Khusnawi. "Analisis Rogue DHCP Packets Menggunakan Wireshark Network Protocol Analyzer." Creative Information Technology Journal 2, no. 2 (2015): 165. http://dx.doi.org/10.24076/citec.2015v2i2.46.

Full text
Abstract:
Rogue DHCP server adalah salah satu pemanfaatan celah keamanan pada mekanisme konfigurasi alamat jaringan menggunakan DHCP. Rogue DHCP server memberikan konfigurasi alamat jaringan yang salah kepada client yang tergabung di dalam jaringan dengan tujuan menciptakan serangan jaringan berupa man in the middle, sehingga dapat menimbulkan ancaman terhadap privasi client yang tergabung di dalam jaringan.Penelitian difokuskan pada analisis DHCP packets seperti DHCPDISCOVER, DHCPREQUEST, DHCPOFFER, DHCPACK yang melewati sebuah Bridge Mikrotik menggunakan aplikasi Wireshark Network Protocol Analyzer sebelum dan setelah adanya Rogue DHCP server di dalam jaringan DHCP, sehingga dapat diamati bagaimana DHCP server asli dan Rogue DHCP server saling bertukar paket DHCP dengan DHCP client yang selanjutnya dilakukan analisis terhadap Rogue DHCP packets.Dari hasil analisis didapatkan informasi parameter-parameter yang terkandung di dalam Rogue DHCP Packets yang difungsikan untuk membangun sistem keamanan jaringan DHCP berupa monitoring dan pencegahan terhadap Rogue DHCP Server menggunakan DHCP Alert yang dikombinasikan dengan Firewall Filter Rule pada sebuah Bridge Mikrotik, dengan diperoleh hasil bahwa sistem dapat mendeteksi dan mencegah adanya Rogue DHCP Server di dalam jaringan DHCP berbasis IPv4.Rogue DHCP server is one of exploiting security holes in the mechanism of configuration the network address using DHCP. Rogue DHCP server provides incorrect configuration network address to a client who joined in the network with the aim of creating a network attacks such as “man in the middle”, so it can pose a threat to client privacy who joined in the network.The research focused on the analysis of DHCP packets such as DHCPDISCOVER, DHCPREQUEST, DHCPOFFER, DHCPACK which passes through a Bridge Mikrotik using Wireshark Network Protocol Analyzer application before and after the Rogue DHCP server in the DHCP network, so it can be observed how the original DHCP server and Rogue DHCP Server exchanging packets with a DHCP Client and then make an analysis of the Rogue DHCP packets.The result of analysis obtained information of parameters that contained in the Rogue DHCP Packets that enabled to build a DHCP network security system in the form of monitoring and prevention of Rogue DHCP server using DHCP Alert combined with Firewall Filter Rule on a Bridge Mikrotik, with result that the system can detect and prevent existence of Rogue DHCP Server in the DHCP based IPv4 network.
APA, Harvard, Vancouver, ISO, and other styles
2

Pradana, Dio Aditya, and Ade Surya Budiman. "The DHCP Snooping and DHCP Alert Method in Securing DHCP Server from DHCP Rogue Attack." IJID (International Journal on Informatics for Development) 10, no. 1 (2021): 38–46. http://dx.doi.org/10.14421/ijid.2021.2287.

Full text
Abstract:
DHCP Server as part of the network infrastructure in charge of distributing host configurations to all devices has the potential to be controlled. If the DHCP Server is successfully controlled, all network devices connected to the server can potentially be controlled. From the observations made at PT. Rekayasa Engineering found a vulnerability in the DHCP Server that has the potential to experience DHCP Rogue or DHCP Spoofing, where the client will fail to communicate with the authorized DHCP Server, as well as open the door for attackers to enter the network. For this reason, DHCP Snooping and DHCP Alert methods are implemented. DHCP Snooping will ensure that every data traffic has been filtered and directed to the registered interface. Meanwhile, the use of DHCP Alert is required in monitoring data traffic during the Discover, Offer, Request, and Acknowledge (DORA) process. In the tests performed, DHCP Snooping and DHCP Alert managed to anticipate attacks that tried to placed DHCP Rogue on the network infrastructure. DHCP Alert, configured on the proxy router, ensures that the DORA process can only occur between an authorized DHCP server and a client. DHCP Snooping test also shows that communication from clients can only be replied to by Trusted DHCP Server. The existence of DHCP Snooping and DHCP Alert makes the host configuration fully controlled by the authorized DHCP Server.
APA, Harvard, Vancouver, ISO, and other styles
3

Maneka, Alex Dangi, and Marak Luta Lapu Kahewu. "Analisis Keamanan Jaringan Local Area Network Perpustakaan Universitas Kristen Wira Wancana Sumba Mengunakan DHCP server Berbasic Cisco Packet Tracer." Reputasi: Jurnal Rekayasa Perangkat Lunak 2, no. 1 (2021): 42–47. http://dx.doi.org/10.31294/reputasi.v2i1.384.

Full text
Abstract:
Abstrak - Di dalam jurnal ini bertujuan memecahkan masalah metode saragan jaringan DHCP server yang merupakan fitur keamanan jaringan yang jarang digunakan orang, karena kurang mengetahui pentingnnya keamanan jaringan menyebapkan jaringan kurang meperhatikan masalah keamanan jaringan. Jurnal ini akan membahas bagaimana menangkal DHCP server dan bagaiman mengiplimentasi security tersebut fitur jaringan. Selain itu untuk Template Paper ini digunakan sebagai panduan untuk penulisan paper (makalah ilmiah) untuk publikasi di Jurnal-jurnal yang dikelola oleh Bina Sarana Informatika. Penulis paper harus mengikuti instruksi yang diberimembuktikan apakah penguna fitur DHCP server mampu menangkal DHCP. Peneliatan yang digunakan penulis dengan melakukan penelitian yang mengunakan jaringan simulasi karena mengunkankan DHCP server berbasis cisco, maka penulis akan melakukan penelitian dimana jaringan simulasi dibuat dalam aplikasi simulasi cisco packet trecer khusus untuk simulasi cisco khusus untuk perangkat keras. Dari hasil perbandingan dan kesempulan penelitian, penulis menyatakan jaringan biasa saja yang tidak mengunakan fitur keamana DHCP server serangan rogue menyebapkan peretas dapat mengotrol seluruh jaringan hanya dengan menyebarkan IP dari peretas DHCP server ke jaringan. Di sisi lain. Jaringan yang mengunakan fitur keamanan jarigan DHCP server sepenuhnya menangkal IP yang yang disebarkan dari peretas klien hanya mendapatkan IP dari pejabat perusahaan DHCP server, sehingga jaringan aman dan terlindungi dari kendali hacker. 
 
 Abstract - This journal aims to solve the problem of the DHCP server network attack method, which is a network security feature that is rarely used by people, because it is less important for network security, causing the network to pay less attention to network security problems. This journal will discuss how to circumvent DHCP servers and how to implement these security features of the network. In addition, this Paper Template is used as a guide for papers (scientific papers) for publication in journals managed by Bina Sarana Informatika. The author of the paper must follow an evidence whether the user features a DHCP server that is capable of blocking DHCP. The research used by the author is by conducting research using a simulation network because it uses a Cisco-based DHCP server, so the authors will conduct a research where the simulation network is created in a Cisco packet trecer simulation application specifically for Cisco simulations specifically for hardware. From the results of comparisons and research conclusions, an ordinary writer who does not use the rogue attack DHCP server security features can control the entire network by simply applying the IP of the DHCP server to the network. On the other hand. Networks that use DHCP server network security features are controlled by IPs that are transmitted from hackers, clients only get IPs from DHCP server officials, so that the network is safe and protected from hacker control.
APA, Harvard, Vancouver, ISO, and other styles
4

Saputra, Brian Rinanto. "Simulasi Keamanan Jaringan Dengan Metode DHCP Snooping Dan VLAN Mengggunakan CISCO." JATISI (Jurnal Teknik Informatika dan Sistem Informasi) 9, no. 4 (2022): 3481–88. http://dx.doi.org/10.35957/jatisi.v9i4.2730.

Full text
Abstract:
Jaringan komputer memiliki kelemahan karena akses jaringan hanya diberikan melalui DHCP server. Akibat yang dapat ditimbulkan dari hal tersebut adalah terjadinya DHCP Rogue yang merupakan server palsu yang memberikan alamat gateway yang salah pada komputer client sehingga komputer tidak dapat terhubung jaringan dan internet. dengan DHCP snooping diharapkan dapat membantu keamanan jaringan internet karena akses ke IP address atau MAC address yang telah terdaftar di router dan penyerang tidak bisa masuk ke dalam jaringan tersebut. Metode penelitian menggunakan Software Cisco Packet Tracer 8.0 dengan topologi 2 buah router. Hasil implementasi didapatkan bahwa DHCP Snooping dapat membatasi DHCP Server yang tidak disetujui atau tidak diketahui untuk memberikan informasi berbahaya kepada client sehingga dapat membantu keamanan lebih baik
APA, Harvard, Vancouver, ISO, and other styles
5

Purun, Elisa Stefano Franli, and Dian Widiyanto Chandra. "Analisis Keamanan DHCP Menggunakan RADIUS Accounting." Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) 9, no. 3 (2025): 906–12. https://doi.org/10.35870/jtik.v9i3.3667.

Full text
Abstract:
Setiap komputer membutuhkan dan harus memiliki IP Address untuk terhubung dengan pengguna jaringan komputer lainnya, IP Address akan dibagikan otomatis kepada pengguna jaringan menggunakan Router sebagai DHCP Server. Selain DHCP, Router memiliki layanan DHCP Accounting yang dapat meningkatkan keamanan jaringan dengan fitur AAA dan RADIUS Server yang dapat diimplementasikan dengan Freeradius. DHCP Accounting memiliki kemampuan akuntansi untuk transmisi pesan START dan STOP yang aman, namun kapasitas flash memori pada router C2691 sekitar 32 MB membuat layanan DHCP Accounting tidak akan berjalan maksimal apabila memiliki banyak user. Penggunaan MySQL sebagai database dapat menjadi solusi permasalahan ini. Pada saat menggunakan fitur DHCP Accounting, data-data dari DHCP Accounting akan dikirim dan terpusat pada Freeradius. Data accounting yang terpusat pada Freeradius akan disimpan menggunakan database MySQL sehingga ruang penyimpanan yang tersedia akan jauh lebih besar dan dapat menampung lebih banyak data dari DHCP Accounting, serta memonitoring jaringan sehingga meningkatkan keamanan jaringan bagi pengguna.
APA, Harvard, Vancouver, ISO, and other styles
6

Ahmad Zaki Hamidi, Eki, Mufid Ridlo Effendi, and Nanang Ismail. "The Implementation of DHCP Relay Using Pox Controller on Openflow Protocol." International Journal of Engineering & Technology 7, no. 2.29 (2018): 821. http://dx.doi.org/10.14419/ijet.v7i2.29.14264.

Full text
Abstract:
The fastest of development in a network which is longer more complex, it needed developing and managing efficiently. On a network which has more computer, it needed effectivity of regulation of IP with DHCP server, many more of a subnet, has become DHCP Relay to be a solution. DHCP relay or agent relay is a protocol Bootstrap which is DHCP asks to have a message between client and server for DHCP to the different network. Software Defined Network (SDN) offers a new paradigm in network design, manage, and implementation, especially to support a needed and innovation in this case, which is longer more complex..
APA, Harvard, Vancouver, ISO, and other styles
7

Buamona, Nur Qamar, Mustamin Hamid, and Erwin Gunawan. "Analisis Dan Implmentasi Keamanan Jaringan Menggunakan Metode DHCP Snooping dan Swirch Port Security." Jurnal Teknik Informatika (J-Tifa) 6, no. 1 (2023): 23–31. http://dx.doi.org/10.52046/j-tifa.v6i2.1680.

Full text
Abstract:
Akses jaringan Internet sangat dibutuhkan oleh setiap kalangan bahkan sudah menjadi kebutuhan pokok bagi penggunanya dalam memperoleh informasi. Semakin banyaknya pengguna internet menyebabkan keamanan jaringan sangat dibutuhkan terutama jaringan internet pada instansi besar. Dengan tersebarnya jaringan internet tersebut maka sangat berpotensi akan adanya DHCP server palsu, hal ini bisa jadi menyebabkan client mendapatkan IP address bukan dari DHCP yang sebenarnya melainkan dari DHCP Server palsu tersebut dan juga dengan penggunaan Switch yang tersebar menyebabkan switch bisa di akses oleh siapa saja yang memungkinkan penyalahgunaan port switch oleh orang – orang yang tidak berkepentingan. Karena metode untuk mencegah pelanggaran keamanan jaringan disebabkan adanya server lain yang tidak dipercaya dan untuk mencegah akses dari perangkat tidak dikenal yang ingin terhubung ke jaringan yang dapat mengakibatkan komputer client tidak terhubung pada sebuah jaringan yang semestinya jadi metode keamanan jaringan perlu ditingkatkan lagi yaitu dengan menggunakan metode DHCP Snooping client hanya akan mendapatkan Ip address dari DHCP server yang dipercaya dan metode Switch Port Security hanya mengijinkan perangkat yang Mac addressnya sudah terdaftar saja yang bisa terhubung ke Switch.
APA, Harvard, Vancouver, ISO, and other styles
8

Marzuki, Khairan, Mia Mubiatma, and Raisul Azhar. "OTOMASI MANAJEMEN VLAN INTERVLAN DAN DHCP SERVER PADA CISCO MENGGUNAKAN ANSIBLE." Jurnal Informatika dan Rekayasa Elektronik 4, no. 2 (2021): 171–80. http://dx.doi.org/10.36595/jire.v4i2.461.

Full text
Abstract:
Menurut Gartner (2018) terdapat 71 persen jaringan yang masih dikendalikan secara manual dimana salah satunya melalui Command Line Interface (CLI). Konfigurasi yang dilakukan secara manual akan memunculkan beragam permasalahan seperti sering terjadinya human error, dan waktu yang di butuhkan untuk konfigurasi tersebut cenderung lebih lama. Termasuk ketika melakukan konfigurasi Virtual Local Area Network (VLAN), InterVLAN dan Dynamic Host Configuration Protocol (DHCP) Server pada perangkat router maupun switch. Permasalahan lain yang muncul adalah lamanya waktu yang dibutuhkan ketika melakukan konfigurasi pada perangkat switch dan router dalam skala besar secara manual dan dilakukan secara satu persatu serta memiliki konfigurasi yang identic sehingga dilakukan secara berulang. Untuk itu diperlukan solusi sehingga proses pembuatan Vlan InterVlan dan Dhcp Server dapat dilakukan dengan cepat dan meminimalkan terjadinya kesalahan. Penerapan sistem otomasi menggunakan ansible dapat mengefisienkan proses tersebut yang dilakukan secara manual. Metodologi penelitian yang digunakan pada penelitian ini yaitu metode waterfall. Tahapan yang digunakan yaitu tahap analisa kebutuhan, desain sistem, penulisan kode program, pengujian program. Hasil dari penelitian ini berupa sistem yang dapat mengotomasi pembuatan create Vlan interVlan, Delete Vlan InterVlan, Show Vlan InterVlan, Mengatur PortNumbership, Mengaktifkan Trunk, menonaktifkan Trunk, Create Dhcp Server, Delete Dhcp Server, Show Dhcp Server pada perangkat router dan switch. Adapun kesimpulan dari penelitian ini adalah ansible playbook berhasil digunakan untuk mengotomasi dan dapat mempercepat proses pembuatan kesembilan scenario pada 1 switch 4 switch dan 1 router dan 4 router.Menurut Gartner (2018) terdapat 71 persen jaringan yang masih dikendalikan secara manual dimana salah satunya melalui Command Line Interface (CLI). Konfigurasi yang dilakukan secara manual akan memunculkan beragam permasalahan seperti sering terjadinya human error, dan waktu yang di butuhkan untuk konfigurasi tersebut cenderung lebih lama. Termasuk ketika melakukan konfigurasi Virtual Local Area Network (VLAN), InterVLAN dan Dynamic Host Configuration Protocol (DHCP) Server pada perangkat router maupun switch. Permasalahan lain yang muncul adalah lamanya waktu yang dibutuhkan ketika melakukan konfigurasi pada perangkat switch dan router dalam skala besar secara manual dan dilakukan secara satu persatu serta memiliki konfigurasi yang identic sehingga dilakukan secara berulang. Untuk itu diperlukan solusi sehingga proses pembuatan Vlan InterVlan dan Dhcp Server dapat dilakukan dengan cepat dan meminimalkan terjadinya kesalahan. Penerapan sistem otomasi menggunakan ansible dapat mengefisienkan proses tersebut yang dilakukan secara manual. Metodologi penelitian yang digunakan pada penelitian ini yaitu metode waterfall. Tahapan yang digunakan yaitu tahap analisa kebutuhan, desain sistem, penulisan kode program, pengujian program. Hasil dari penelitian ini berupa sistem yang dapat mengotomasi pembuatan create Vlan interVlan, Delete Vlan InterVlan, Show Vlan InterVlan, Mengatur PortNumbership, Mengaktifkan Trunk, menonaktifkan Trunk, Create Dhcp Server, Delete Dhcp Server, Show Dhcp Server pada perangkat router dan switch. Adapun kesimpulan dari penelitian ini adalah ansible playbook berhasil digunakan untuk mengotomasi dan dapat mempercepat proses pembuatan kesembilan scenario pada 1 switch 4 switch dan 1 router dan 4 router.
APA, Harvard, Vancouver, ISO, and other styles
9

Razaque, Abdul, and Khaled Elleithy. "Controlling Attacks of Rogue Dynamic Host Configuration Protocol (DHCP) to Improve Pedagogical Activities in Mobile Collaborative Learning (MCL) Environment." Journal of Communications and Computer Engineering 3, no. 1 (2012): 15. http://dx.doi.org/10.20454/jcce.2013.426.

Full text
Abstract:
Mobile collaborative learning (MCL) is extremely recognized as focusing archetype in educational institutions. It demonstrates cerebral synergy of assorted collective minds. It handles several problems in order to motivate social activity for mutual communication. To advance and promote baseline for MCL; several supporting frameworks, architectures including number of different mobile applications have been introduced. But, no one has mainly focused to augment the security of those architectures. The paper handles issues of rogue DHCP server that highly affects network resources during MCL. The rogue DHCP is illegal server that issues the fake IP address to users for sniffing the legal traffic. This contribution specially targets the malicuius attacks that weaken the security of mobile supported collaborative framework (MSCF). The paper introduces multi-frame signature-cum anomaly-based intrusion detection system (MSAIDS) that blocks an unlawful behavior of rogue DHCP server. This novel security method emphasize confidence of users and secures also network from illegitimate interference of rogue DHCP server. Finally, paper confirms scheme through simulations. The simulations comrises of testbed, ns2 and discrete simulation.
APA, Harvard, Vancouver, ISO, and other styles
10

Trombeta, Lucas, and Nunzio Torrisi. "DHCP Hierarchical Failover (DHCP-HF) Servers over a VPN Interconnected Campus." Big Data and Cognitive Computing 3, no. 1 (2019): 18. http://dx.doi.org/10.3390/bdcc3010018.

Full text
Abstract:
This work presents a strategy to scale out the fault-tolerant dynamic host configuration protocol (DHCP) algorithm over multiple interconnected local networks. The proposed model is open and used as an alternative to commercial solutions for a multi-campus institution with facilities in different regions that are interconnected point-to-point using a dedicated link. When the DHCP scope has to be managed and structured over multiple geographic locations that are VPN connected, it requires physical redundancy, which can be provided by a failover server. The proposed solution overcomes the limitation placed on the number of failover servers as defined in the DHCP failover (DHCP-F) protocol, which specifies the use of one primary and one secondary server. Moreover, the presented work also contributes to improving the DHCP-F specification relative to a number of practical workarounds, such as the use of a virtualized DHCP server. Therefore, this research assumes a recovery strategy that is based on physical servers distributed among different locations and not centralized as clustered virtual machines. The proposed method was evaluated by simulations to investigate the impact of this solution in terms of network traffic generated over the VPN links in order to keep the failover service running using the proposed approach.
APA, Harvard, Vancouver, ISO, and other styles
11

Ariyadi, Tamsir, Aidil Nur Riyansyah, M. Agung, and M. Alzi Ikrar. "ANALISIS SERANGAN DHCP STARVATION ATTACK PADA ROUTER OS MIKROTIK." JURNAL ILMIAH INFORMATIKA 11, no. 01 (2023): 85–93. http://dx.doi.org/10.33884/jif.v11i01.7162.

Full text
Abstract:
Dynamic Host Configuration Protocol (DHCP) adalah protokol client-server yang berfungsi memberikan alamat IP kepada komputer client/ perangkat jaringan secara otomatis. Dalam menggunakan mikrotik OS melakukan analisis lebih lanjut terkait serangan pada DHCP starvation attack. Dimana attacker akan menjadi host pada salah satu komputer dan merequest IP ke mikrotik OS untuk mendapatkan informasi pribadi client yang selanjutnya akan direkam dan dianalisis serangan Man in the Middle. Tentunya hal ini dapat dicegah dengan teknik filtering yang ada pada miktorik OS. Tentunya hal ini dapat dicegah dengan teknik filtering yang ada pada mikrotik OS. Kuncinya dapat dilihat pada komputer hostname yang terdaftar pada mikrotik, sehingga pada proses DHCP Discover yang meminta IP pada DHCP Server mikrotik jika tidak terdaftar hostname nya maka akan di list untuk di blokir.
APA, Harvard, Vancouver, ISO, and other styles
12

Ariyadi, Tamsir. "Mitigasi Keamanan Dynamic Host Control Protocl (DHCP) Untuk Mengurangi Serangan Pada Local Area Network (LAN)." INOVTEK Polbeng - Seri Informatika 3, no. 2 (2018): 147. http://dx.doi.org/10.35314/isi.v3i2.455.

Full text
Abstract:
Keamanan jaringan telah menjadi perhatian lebih karena pesatnya pertumbuhan dan perluasan Internet. Sementara ada beberapa cara untuk memberikan keamanan pada layer application, transport, atau network layers, data link layer (Layer 2) keamanan belum bisa diterapkan secara maksimal. protokol data link layer yang digunakan dalam Local Area Network (LAN) tidak dirancang dengan keamanan yang secara signature. Dynamic Host Control Protocol (DHCP) adalah salah satu jaringan yang paling banyak digunakan untuk konfigurasi host yang bekerja dalam data menghubungkan lapisan. DHCP rentan terhadap sejumlah serangan, seperti serangan DHCP rogue Server, serangan DHCP Starvation, dan serangan DHCP Snooping. Pembahasan prototype terhadap keamanan jaringan yang disebut Mitigasi Keamanan Dynamic Host Control Protocol (DHCP) Untuk Mengurangi Serangan pada Local Area Network (LAN).
APA, Harvard, Vancouver, ISO, and other styles
13

Yakubu, Bello Musa, Majid Iqbal Khan, and Pattarasinee Bhattarakosol. "IPChain: Blockchain-Based Security Protocol for IoT Address Management Servers in Smart Homes." Journal of Sensor and Actuator Networks 11, no. 4 (2022): 80. http://dx.doi.org/10.3390/jsan11040080.

Full text
Abstract:
The dynamic host configuration protocol (DHCP) servers are forms of an Internet of Things (IoT) address management server (IoTAMS) that gives network configuration settings to newly connected hosts. Administrators of a network may save time by setting DHCP servers instead of every network node. However, the absence of a more robust authentication method for DHCP servers makes hosts susceptible to attacks since neither the server nor the users are able to check the other’s authenticity during DHCP connections. These concerns result in both internal and external threats to the system that have the potential to impair network services. Among these threats are malicious DHCP servers and DHCP starvation. This paper aims to provide a novel approach for tackling these issues and protect the DHCP protocol. The proposed model uses the Diffie–Hellman key exchange mechanism, the elliptic curve discrete logarithm problem (ECDLP), a one-way hash function, blockchain technology, and a smart contract. In addition, registration and validation processes provide support for the proposed model in combating DHCP risks for both internal and external system threats. Results from this study show that the proposed model has an average of 21.1% more resistance to a growing number of adversaries than the benchmark models, thus revealing that the model is better suited for the security of IoT address management servers in smart homes, thereby enhancing resilience against related threats and the success of IP address management.
APA, Harvard, Vancouver, ISO, and other styles
14

Permana Putra, Willy, and Muhamad Zulfikar Azis. "PENGGUNAAN METODE DHCP SNOOPING DALAM MELAKUKAN PENCEGAHAHAN TERHADAP DHCP ROGUE DI LABORATORIUM TEKNIK INFORMATIKA." Journal of Informatics and Computing 2, no. 1 (2023): 48–54. http://dx.doi.org/10.31884/random.v2i1.8.

Full text
Abstract:

 
 
 
 Koneksi jaringan memiliki peran penting bagi masyarakat khususnya bagi mahasiswa Politeknik Negeri Indramayu Jurusan Teknik Informatika. yang berfungsi untuk membantu kegiatan pratikum, yang dilakukan pada Laboratorium Jurusan Teknik Informatika. DHCP Rogue merupakan ancaman yang bisa terjadi pada suatu jaringan, yang dimana dapat membelokan paket data yang melintas. Tindakan ini bisa dilakukan oleh orang yang tidak bertanggung jawab. Oleh karena itu perlu adanya keamanan jaringan untuk mencegah ancaman dari DHCP Rogue, untuk mengatasi masalah tersebut diperlukanya metode DHCP Snooping yang digunakan untuk mencegah adanya DHCP Rogue pada jaringan. Mengingat ancaman tersebut, dilakukanya beberapa tahapan dengan mengkonfigurasi DHCP Snooping, konfigurasi DHCP server, dan Monitoring jaringan menggunakan aplikasi Wireshark. Yang di implementasikan pada Laboratorium Teknik Informatika, untuk menjaga paket data yang melintas, dan bisa mengetahui jika ada DHCP Rogue dalam jaringan. Pada artikel ini, hasil dari pencegahan DCHP Rogue bisa ditangani dengan menggunakan metode DHCP Snooping melalui hasil testing, dan monitoring pada jaringan.
 
 
 
APA, Harvard, Vancouver, ISO, and other styles
15

Boudjit, Saadi, Cédric Adjih, Paul Mühlethaler, and Anis Laouiti. "Duplicate Address Detection and Autoconfiguration in OLSR." JUCS - Journal of Universal Computer Science 13, no. (1) (2007): 4–31. https://doi.org/10.3217/jucs-013-01-0004.

Full text
Abstract:
Mobile Ad hoc NETworks (MANETs) are infrastructure-free, highly dynamic wireless networks, where central administration or configuration by the user is very difficult. In hardwired networks nodes usually rely on a centralized server and use a dynamic host configuration protocol, like DHCP [Droms et al. 2003], to acquire an IP address. Such a solution cannot be deployed in MANETs due to the unavailability of any centralized DHCP server. For small scale MANETs, it may be possible to allocate free IP addresses manually. However, the procedure becomes impractical for a large-scale or open system where mobile nodes are free to join and leave.
APA, Harvard, Vancouver, ISO, and other styles
16

Ariya Pramudita and Rushendra Rushendra. "IMPLEMENTATION OF LOAD BALANCING WITH PER CONNECTION CLASSIFIER AND FAILOVER AND UTILIZATION OF TELEGRAM BOT (CASE STUDY : PT TUJUH MEDIA ANGKASA)." Jurnal Teknik Informatika (Jutif) 5, no. 1 (2024): 273–82. https://doi.org/10.52436/1.jutif.2024.5.1.1165.

Full text
Abstract:
For customers of PT. Seven Media Angkasa, which is engaged in providing fast online shopping services in Indonesia, definitely needs stable internet to process requests from customers. Even though it already has 2 ISPs, sometimes there are frequent downtimes which will disrupt the service process for customers who want to shop. In this case, one of the Load Balancing methods is the Per Connection Classifier (PCC) which is able to specify a packet to the gateway of a particular connection. Failover for backing up The weakness of the PCC method is Failover which can switch automatically if one of the systems fails so that it becomes a backup for the system that has failed. Added Telegram Bot as a DHCP Alert which can detect if there is a DHCP Rouge. By using the PCC method, it is able to maximize bandwidth usage and minimize the occurrence of downtime in sending or receiving data. So with the addition of the Failover method, if there is a temporary delay when many incoming requests can interfere with performance, Failover can move manually or automatically if one of the systems fails so that it becomes a backup for a failed system. If gateway 1 is disconnected, the backup gateway will replace gateway 1. If gateway 1 returns to normal, the connection path is used again to become gateway 1. Likewise with gateway 2 when it is disconnected. From testing on the speedtest.net tools, it was found that the Load Balancing applied was able to combine 2 ISPs into one, namely Download to 19.18 Mbps and Upload to 18.47 Mbps. The Telegram Bot is able to send notifications when there is a counter DHCP Server with the contents of the message successfully getting a Mac Address or unknown server from the counter DHCP server, namely DC: 2C: 6E: 81: CF: 34.
APA, Harvard, Vancouver, ISO, and other styles
17

Yosua Nggaba Patimay, Fajar Hariadi, and Raynesta Mikaela Indri Malo. "Implementation of Bridge Filtering to Prevent DHCP Starvation Attack (Case Study: SD Inpres Papindung)." Journal of Artificial Intelligence and Engineering Applications (JAIEA) 4, no. 2 (2025): 839–46. https://doi.org/10.59934/jaiea.v4i2.761.

Full text
Abstract:
The impact of internet cut off or disrupted at SD Inpres Papindung, the teachers will have difficulty finding teaching materials and may have to return to traditional methods that are less effective. Updating Dapodik data will also be disrupted, which could affect school administration and evaluation. The unavailability of an internet connection does occur due to technical reasons or due to intentional elements, one of which is the use of Yersinia software. Yersinia is a piece of software that is commonly used to attack available networks by sending fake MAC addresses continuously so that the IP address on the DHCP server runs out, so that the client does not get an IP address which causes the client unable to access the internet. This attack are called DHCP Starvation Attack. This can be prevented using Bridge Filtering method. Bridge Filtering can filter only recognized MAC addresses to transmit data or can request an IP address from the DHCP server, while MAC addresses that are not recognized or foreign devices will not be allowed to request from that port or will not receive an IP address from the DHCP server. The aim of implementing Bridge Filtering is to measure the creativity of the Bridge Filtering method in preventing DHCP Starvation Attack attacks so that clients who want to connect to the network can access the internet and improve network quality at SD Inpres Papindung.The results show that the Bridge Filtering method effective in preventing DHCP Starvation Attacks and improves network quality at SD Inpres Papindung which is shown by an increase of throughput, before implementation it was 794.66 Kbps and after implementation it was 1283.70 Kbps, there was a decrease of delay from 6.89 ms before implementation to 4.06 ms after implementation. There was also a decrease in jitter before implementation 10.56 ms and after implementation 6.05 ms, but caused an increase in packet loss which was 0.30% before implementation and after implementation increased to 0.79%. Of the four variables, all of them remain at the same level except for the throughput variable, where there is a change from the fair category to the good category, so that it has an impact on the quality of the internet network at SD Inpres Papindung after implementing Bridge Filtering which is stated to be better than before implementing Bridge Filtering on the internet network at SD Inpres Papindung.
APA, Harvard, Vancouver, ISO, and other styles
18

Dasmen, Rahmat Novrianda, Timur Dali Purwanto, Agung Wahyudi, Muhammad Nazhrun Nabil, and Albirr DoKoety. "Design and Implementation Internet Protocol Version 6 (IPv6) Pada Jaringan Komputer SMP Muhammadiyah 6 Palembang." DoubleClick: Journal of Computer and Information Technology 6, no. 1 (2022): 1. http://dx.doi.org/10.25273/doubleclick.v6i1.11738.

Full text
Abstract:
<span lang="EN-US">IPv6 dimaksudkan untuk mengizinkan klien untuk tidak bermain-main dengan pengaturan alamat Internet Protokol. PC klien yang terkait dengan organisasi IPv6 akan mendapatkan alamat Internet Protokol langsung dari switch sangat mirip dengan DHCP, sehingga nantinya server DHCP umumnya tidak diperlukan. Konfigurasi otomatis akan sangat membantu untuk peralatan web portabel karena klien tidak dipusingkan dengan pengaturan saat bertukar tempat dan organisasi. Dalam tinjauan ini, rencana IPv6 dilakukan untuk antarmuka jaringan web bersama dengan pemanfaatan pedoman yang telah dirujuk. Mulai dari tahap penyusunan, penyelidikan, perencanaan, pelaksanaan, dan penggunaan.</span>
APA, Harvard, Vancouver, ISO, and other styles
19

Ardianto, Feby, and Eliza Eliza. "PENGGUNAAN MIKROTIK ROUTER SEBAGAI JARINGAN SERVER." JURNAL SURYA ENERGY 1, no. 1 (2016): 24. https://doi.org/10.32502/jse.v1i1.444.

Full text
Abstract:
Teknologi yang menfaatkan komputer yang perkembanganya semakin hari semakin maju. Komunikasi, jaringan komputer mendorong terbentuknya sebuah jaringan yang berkembang menjadi jaringan yang sangat kompleks dan sangat luas dan tersebar diseluruh lapisan dunia., dikenal dengan interconnected network atau lebih akrab disebut dengan internet. untuk membagi-bagi koneksi ke beberapa komputer pengguna user diperlukan server untuk mengatur dan memanajemen jaringan, Mikrotik server memiliki fitur yang sangat lengkap diantaranya : Firewall dan Nat, Routing, Hotspot, Point to Point Tunneling Protocol, DNS server, DHCP server, Manajemen Bandwidth, dan keamanan. Menggunakan Mikrotik RouterOS pada server dengan tools GUI (ghrafis user interface ) winbox yang terinstal pada client dapat memperudah administrator dalampengaturan/remote sistem jaringan yang berjalan.
APA, Harvard, Vancouver, ISO, and other styles
20

Novianto, Dian, Yohanes Setiawan Japriadi, Lukas Tommy, and Sujono. "MITIGASI DHCP STARVATION ATTACK PADA ROUTERBOARD MIKROTIK DAN PENGARUHNYA TERHADAP PERFORMANSI." Jurnal Ilmiah Informatika Global 15, no. 2 (2024): 52–57. http://dx.doi.org/10.36982/jiig.v15i2.3930.

Full text
Abstract:
As people become more dependent on information technology, the need for Internet availability increases. Various types of devices are connected to the network, increasing the convenience of using information technology. However, this convenience can often be disrupted by attacks on the network infrastructure, one of which is a DHCP Starvation attack. The Dynamic Host Configuration Protocol (DHCP) is a client-server-based protocol used to automatically assign or obtain IP addresses for client computers or other network devices. Mitigating DHCP Starvation attacks is one form of protection for users. The impact of this attack is that the attacker can become one of the hosts on the network and perform a man-in-the-middle attack, so the impact of information leakage can occur. In addition, it is necessary to know the impact on router resources when a DHCP Starvation attack occurs, so that network managers can calculate how much resources are needed. The author uses a Filtering method based on Mac address es, ARP, and alerts on the Mikrotik router. In addition, the PPDIOO method is also used to develop this system, which consists of preparation, planning, design, Implementation, operation, and optimization. The test results showed that the application of this Filtering method proved to be very effective in preventing DHCP Starvation attacks, and the router board resources were not significantly affected when this Filtering method was applied.
APA, Harvard, Vancouver, ISO, and other styles
21

Marcus, Ronald David, Hudan Eka Rosyadi, and Fandi Yulian Pamuji. "Prototype Sistem Administrasi Dan Keamanan Jaringan Komputer Berbasis DHCP Server Mikrotik." Briliant: Jurnal Riset dan Konseptual 6, no. 3 (2021): 685. http://dx.doi.org/10.28926/briliant.v6i3.630.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Wintolo, Hero, Yuliani Indrianingsih, Wahyu Hamdani, and Syafrudin Abdie. "Descriptive Analysis and ANOVA Test with File Sending on Computer Networks Attacked with Rogue's Dynamic Host Configuration Protocol (DHCP)." Jurnal Ilmiah Teknik Elektro Komputer dan Informatika 9, no. 2 (2023): 375–84. https://doi.org/10.26555/jiteki.v9i2.26167.

Full text
Abstract:
The requirement for a computer that is physically connected to a computer network to be able to access existing resources on a computer network in the form of an IP address obtained statically or dynamically. On a static IP address, there are not many problems that arise because it is loaded directly into the computer, while for a dynamic IP address, security problems arise in the form of a dynamic IP address sharing server in the form of DHCP Rogue. The configuration that is added to the first router when the network is hit by a DHCP rogue attack is to configure the main router, in this case, the first router, and the switch used as a connecting device between computers. configuration on both switches is done by snooping trust which is useful for securing IP addresses to avoid IP attackers. This research was conducted to find out if a computer network with a dynamic IP address was attacked by sending files between computers. Files with the longest sending time indicate an attack on the computer network. The method used in this study is the ANOVA test with descriptive-based analysis. Based on the results of the analysis, it is known that the average file transfer time on networks affected by DHCP Rogue is higher than the average file transfer time on normal and mitigated networks, and the significant value of the ANOVA test results has a value of 0.004. In general, it can be concluded that there are differences in data transfer when the network is normal, the network is subject to DHCP Rogue, and the network has been mitigated with DHCP Rogue.
APA, Harvard, Vancouver, ISO, and other styles
23

Nishanth, R., David Mishael, Skanda V. Dheeraj, Darshan Y, and Chandra Gowda Naveen. "Hotel Management System, designing and implementing a hotel network." International Journal of Computing Learning and Intelligence 3, no. 1 (2024): 169–76. https://doi.org/10.5281/zenodo.10634539.

Full text
Abstract:
Modern Hotel network project which involves designing and implementing a modern hotel network with three floors and various departments. The project includes considerations like routers connecting each floor, specific VLANs for each department, Wi-Fi networks, printers, OSPF routing protocol, DHCP server configuration, SSH setup, and port security with a test PC. We emphasize the increasing complexity of each project, seeking viewer support through subscriptions and engagement.
APA, Harvard, Vancouver, ISO, and other styles
24

Yalestia Chandrawaty, Ni Made Anggrena, and I. Putu Hariyadi. "Implementasi Ansible Playbook Untuk Mengotomatisasi Manajemen Konfigurasi VLAN Berbasis VTP Dan Layanan DHCP." Jurnal Bumigora Information Technology (BITe) 3, no. 2 (2021): 107–22. http://dx.doi.org/10.30812/bite.v3i2.1577.

Full text
Abstract:
Penerapan otomatisasi manajemen konfigurasi jaringan dapat meningkatkan efisiensi dan meminimalkan risiko kesalahan konfigurasi. Penelitian terdahulu telah berhasil menerapkan otomatisasi manajemen konfigurasi Virtual Local Area Network (VLAN), InterVLAN dan Dynamic Host Configuration Protocol (DHCP) Server menggunakan Ansible pada infrastruktur jaringan berbasis Cisco. Namun rancangan sistem otomatisasi yang dibuat hanya dapat diterapkan pada rancangan jaringan ujicoba di penelitian tersebut. Konfigurasi kebijakannya masih dikelola secara statik dan digabungkan menjadi satu kesatuan didalam file Ansible playbook sehingga ketika terjadi perubahan harus diubah di dalam file tersebut secara langsung. Penelitian ini mengimplementasikan Ansible Playbook dengan variable files yang menampung kebijakan konfigurasi sehingga dapat mengotomatisasi manajemen konfigurasi VLAN berbasis VTP dan layanan DHCP secara dinamis. Metode penelitian yang digunakan adalah Network Developement Life Cycle. Rancangan jaringan ujicoba disimulasikan menggunakan PNETLab. Sistem otomatisasi yang dibangun dapat digunakan untuk manajemen konfigurasi perangkat jaringan baik router, switch maupun multilayer switch meliputi pembuatan dan penghapusan VLAN berbasis VTP dan DHCP di setiap lokasi. Selain itu sistem otomatisasi yang dibuat dapat mempercepat proses pengelolaan VLAN berdasarkan 3 (tiga) kali percobaan di setiap lokasi yaitu rata-rata 6 (enam) kali lebih cepat ketika operasi pembuatan konfigurasi. Sedangkan ketika operasi penghapusan konfigurasi, sistem otomatisasi rata-rata 3 (tiga) kali lebih cepat dibandingkan secara manual.
APA, Harvard, Vancouver, ISO, and other styles
25

Salau, Ayodeji Olalekan, Tsehay Admassu Assegie, Adedeji Tomide Akindadelo, and Joy Nnenna Eneh. "Evaluation of Bernoulli Naive Bayes model for detection of distributed denial of service attacks." Bulletin of Electrical Engineering and Informatics 12, no. 2 (2023): 1203–8. http://dx.doi.org/10.11591/eei.v12i2.4020.

Full text
Abstract:
Distributed denial of service is a form of cyber-attack that involves sending several network traffic to a target system such as DHCP, domain name server (DNS), and HTTP server. The attack aims to exhaust computing resources such as memory and the processor of a target system by blocking the legitimate users from getting access to the service provided by the server. Network intrusion prevention ensures the security of a network and protects the server from such attacks. Thus, this paper presents a predicitive model that identifies distributed denial of service attacks (DDSA) using Bernoulli-Naive Bayes. The developed model is evaluated on the publicly available Kaggle dataset. The method is tested with a confusion matrix, receiver operating characteristics (ROC) curve, and accuracy to measure its performance. The experimental results show an 85.99% accuracy in detecting DDSA with the proposed method. Hence, Bernoulli-Naive Bayes-based method was found to be effective and significant for the protection of network servers from malicious attacks.
APA, Harvard, Vancouver, ISO, and other styles
26

Ayodeji, Olalekan Salau, Admassu Assegie Tsehay, Tomide Akindadelo Adedeji, and Nnenna Eneh Joy. "Evaluation of Bernoulli Naive Bayes model for detection of distributed denial of service attacks." Bulletin of Electrical Engineering and Informatics 12, no. 2 (2023): 1203~1208. https://doi.org/10.11591/eei.v12i2.4020.

Full text
Abstract:
Distributed denial of service is a form of cyber-attack that involves sending several network traffic to a target system such as DHCP, domain name server (DNS), and HTTP server. The attack aims to exhaust computing resources such as memory and the processor of a target system by blocking the legitimate users from getting access to the service provided by the server. Network intrusion prevention ensures the security of a network and protects the server from such attacks. Thus, this paper presents a predicitive model that identifies distributed denial of service attacks (DDSA) using BernoulliNaive Bayes. The developed model is evaluated on the publicly available Kaggle dataset. The method is tested with a confusion matrix, receiver operating characteristics (ROC) curve, and accuracy to measure its performance. The experimental results show an 85.99% accuracy in detecting DDSA with the proposed method. Hence, Bernoulli-Naive Bayesbased method was found to be effective and significant for the protection of network servers from malicious attacks.
APA, Harvard, Vancouver, ISO, and other styles
27

Wulandari, Heni, Suherman Suherman, and Razali Razali. "PELATIHAN ADMINISTRASI SISTEM JARINGAN BERBASIS WINDOWS PADA GURU DAN SISWA (STUDI KASUS: SEKOLAH SMK MADANI MARENDAL I)." RESWARA: Jurnal Pengabdian Kepada Masyarakat 3, no. 1 (2022): 185–90. http://dx.doi.org/10.46576/rjpkm.v3i1.1637.

Full text
Abstract:
Administarsi Sistem Jaringan merupakan salah satu mata pelajaran wajib pada paket keahlian TKJ. Pada pembelajaran tersebut mempelajari hal teknik tentang bagaimana cara administrasi server dalam sebuah jaringan. Sekolah SMK Madani Marendal I salah satu SMK di Marendal yang memiliki program keahlian Teknik Komputer dan Jaringan (TKJ) yang berfokus pada bidang Teknologi Informasi dan Komunikasi. SMK Madani Marendal I belum menerapkan administrasi sistem jaringan pada sekolah tersebut, khususnya pada lab komputer. Pelatihan administrasi sistem jaringan pada guru dan peserta didik diharapkan dapat memberikan pemahaman teori dan praktik tentang konsep serta implementasi dalam membangun server dengan sistem operasi berbasis windows. Pelatihan dilaksanakan selama satu hari dengan 3 sesi yaitu setiap sesi dilaksanakan selama 2 jam. Penyusunan pelatihan administrasi sistem jaringan berbasis windows di sekolah SMK Madani Marendal I berjalan dengan baik dan mudah. Hal ini dapat dilihat dari dari evaluasi angket yang dilakukan yaitu 90% menyatakan SS (sangat setuju) serta dapat dilihat dari berhasilnya guru dan peserta didik dalam melakukan konfigurasi DHCP Server, FTP Server dan Remote Server di lab komputer di sekolah SMK Madani Marendal I
APA, Harvard, Vancouver, ISO, and other styles
28

Listartha, I. Made Edy. "AUTOMASI WEBSITE BROWSER UNTUK MELAKUKAN AUTOLOGIN KE DALAM CAPTIVE PORTAL." Jurnal Ilmiah Informatika Komputer 25, no. 2 (2020): 98–106. http://dx.doi.org/10.35760/ik.2020.v25i2.2766.

Full text
Abstract:
Penggunaan captive portal dalam sekuriti jaringan komputer menuntut pengguna untuk selalu melakukan registasi pada halaman hotspot saat diperlukan. Penelitian ini menanfaatkan website browser lynx berbasis teks sebagai sarana untuk melakukan registrasi pada captive portal yang di automasi dengan script yang berisi username dan password pengguna. Perangkat penelitiannya sendiri menggunakan software simulasi yang menjalankan RouterOS mikrotik dan linux sebagai pengguna. Mikrotik dibangun sebagai captive portal dengan menggunaan setup wizard dengan konfigurasi IP 192.168.200.1/24, menjalankan fungsi DHCP Server pada sebuah interface1 yang terhubung langsung dengan OS Linux pengguna sehingga mendapatkan IP melalui DHCP Client. Halaman captive portal terbentuk pada alamat http://test.mikrotik.local dengan tampilan standar. Perekaman proses login melalui browser lynx dilakukan untuk mendapatkan script proses login dan digunakan untuk proses automasi login. Pengujian dilakukan dengan menjalankan perintah cmd_script berisi rekaman proses login dan menghapus sesi login pada mikrotik setelah berhasil untuk pengujian selanjutnya. Pengujian dilakukan sebanyak 20 kali dengan hasil tanpa adanya kegagalan jika tidak terdapat gangguan oleh pengguna maupun sistem saat proses automasi berjalan.
APA, Harvard, Vancouver, ISO, and other styles
29

Umaroh, Lia, and Machsun Rifauddin. "IMPLEMENTASI VIRTUAL PRIVATE NETWORK (VPN) DI PERPUSTAKAAN UNIVERSITAS ISLAM MALANG." BACA: JURNAL DOKUMENTASI DAN INFORMASI 41, no. 2 (2020): 193. http://dx.doi.org/10.14203/j.baca.v41i2.531.

Full text
Abstract:
This study aims to explain to use a VPN in the UNISMA Library. The research method used is descriptive-qualitative and data was obtained through interviews with five informants, observation, and documentation. Data analysis techniques by collecting data, data reduction, data presentation and drawing conclusions. While the validity of the data was obtained through triangulation. The results showed that the use of VPN in the UNISMA Library to speed up internet connection and data privacy. UNISMA library uses a proxy server router operating system for VPN networks. To be able to make Mikrotik a VPN server, configuration is required which includes IP pool configuration, IP router configuration, PPP configuration, DHCP server configuration, NAT by pass firewall configuration and IP security configuration. The library selection of VPN products considers the aspects of strong authentication, encryption that is strong enough, meets standards, integration with other field network services.
APA, Harvard, Vancouver, ISO, and other styles
30

Monteiro, Claudio de Castro, Paulo Roberto de Lira Gondim, and Vinícius de Miranda Rios. "Seamless Video Session Handoff between WLANs." Journal of Computer Systems, Networks, and Communications 2010 (2010): 1–7. http://dx.doi.org/10.1155/2010/602973.

Full text
Abstract:
Handoff in a distributed IEEE 802.11 Wireless LAN network is a source of significant amount of problems on the video transmission environment. The visual quality of video streaming applications is lowered when stations are in handoff status. In this paper, we introduce an architecture of a session proxy (SP), which tries to preserve the quality of the streaming video upon each handoff between access points. We have evaluated thresholds of RSSI and Loss Frame Rate (LFR) for deciding the moment when the handoff process shall begin. Our solution performance was evaluated in a testbed implementation for MPEG-4 video on demand with one video server (VLS) and two FreeBSD-based access points supporting Mobile IP, DHCP Server and IAPP approach.
APA, Harvard, Vancouver, ISO, and other styles
31

Muhammad Arifin, Fikri, Giva Andriana Mutiara, and Ismail Ismail. "Implementation of Management and Network Security Using Endian UTM Firewall." IJAIT (International Journal of Applied Information Technology) 1, no. 02 (2017): 43–51. http://dx.doi.org/10.25124/ijait.v1i02.874.

Full text
Abstract:
Internet is a source of information which is widely used today. However, the mode of internet abused becomes more various and unavoidable. The internet abused can be done from external or internal networks. Unified Threat Management (UTM) is one of a good solution to secure the networks, because it has several security features such as firewall, proxy, Intrusion Prevention System (IPS) and several other security features in one package. Endian is an UTM distro which is an open source in large community. Besides having some security features, Endian also has some network management features such as DHCP, routing, and VPN. This research put Endian as the center of a network topology that connected to the internal network/LAN, DMZ Server, and Internet Network/WAN. The tests are conducted in the form of implementation of DHCP feature, content filtering, port restrictions on interzone, and the response of the IPS features that exist on the Endian while receiving the attack. The results showed that Endian UTM is quite well in maintaining the security of the networks.
APA, Harvard, Vancouver, ISO, and other styles
32

Rendro, Dwi Bayu, Muhammad Rifqi Farhan, Saleh Dwiyatno, and Ngatono. "Rancang Bangun Sistem Voice Over Internet Protocol Pada Local Area Network Berbasis Software Mini Sip Server." Jurnal Teknik AMATA 3, no. 2 (2022): 36–50. http://dx.doi.org/10.55334/jtam.v3i2.306.

Full text
Abstract:
Voice Over Internet Protocol (VoIP) adalah sebuah teknologi yang mampu melewatkan trafik suara, video dan data yang berbentuk paket melalui jaringan IP. Penggunaan jaringan IP memungkinkan penghematan biaya dikarenakan tidak perlu membuat infrastruktur baru untuk komunikasi suara dan penggunaan lebar bandwith yang lebih kecil dibandingkan dengan telepon biasa. Penerapan sistem VoIP khususnya dalam penelitian ini penerapan sistem VoIP pada sekolah dengan memanfaatkan jaringan Local Area Network yang ada pada SMK AL – HIKMAH Curug Kab.Tangerang yang ada menggunakan beberapa hardware dan software tambahan seperti router MikroTik dan Access Point outdoor serta software Mini SIP Server dan Zoiper Softphone. Router MikroTik disini berfungsi sebagai DHCP Server untuk mengurangi memory load pada Access Point outdoor sehingga dapat berjalan dengan maksimal, dan untuk media transmisi pada sistem ini menggunakan Access Point outdoor dan kabel UTP sebagai jalur pengiriman paket suara pada sistem . Software Mini SIP Server menggunakan protokol Session Initation Protocol (SIP) berfungsi sebagai server VoIP yang memproses/memonitoring panggilan yang berada pada sistem VoIP, yang nanti nya sinyal VoIP akan di sebar dengan Access Point outdoor. Untuk endpoint di sini untuk memulai dan mengakhiri panggilan mengunakan softphone Zoiper.
APA, Harvard, Vancouver, ISO, and other styles
33

Hendrastuty, Nirwana, M. Ghufron An’Ars, Damayanti Damayanti, et al. "PELATIHAN JARINGAN KOMPUTER (MICROTIK) UNTUK MENAMBAH KEAHLIAN BAGI SISWA SMAN 8 BANDAR LAMPUNG." Journal of Social Sciences and Technology for Community Service (JSSTCS) 3, no. 2 (2022): 209. http://dx.doi.org/10.33365/jsstcs.v3i2.2105.

Full text
Abstract:
Seiring dengan perkembangan zaman kebutuhan informasi dan komunikasi, jaringan komputer mendorong terbentuknya sebuah jaringan yang berkembang menjadi jaringan yang sangat kompleks dan sangat luas dan tersebar diseluruh lapisan dunia. Jaringan yang kompleks inilah yang kemudian dikenal dengan Interconnected Network atau lebih akrab disebut dengan internet. Mikrotik merupakan sistem operasi router, yang di-rilease dengan nama mikrotik routerOs yang mampu diinstall pada komputer biasa, tidak seperti sistem operasi router lainya yang hanya bisa diinstall pada hardware tertentu. Mikrotik memiliki fitur yang sangat lengkap diantaranya : Firewall dan Nat, Routing, Hotspot, Point to Point Tunneling Protocol, DNS server, DHCP server, Manajemen Bandwidth, Konfigurasi Keamanan dan masih banyak fitur lainya (http://mikrotik.co.id/). Mudah dikonfigurasi dan tentunya harganya yang murah. Kepala Sekolah SMAN 8 Bandar Lampung menjelaskan bahwa saat ini pemberian materi terutama pada bidang jaringan sudah berjalan baik. Namun pihak sekolah masih menginginkan adanya peningkatan pada proses pembelajaran di bidang jaringan.
APA, Harvard, Vancouver, ISO, and other styles
34

S, Dr Swapna. "Advanced Threat Detection with Active Directory and SIEM." International Journal for Research in Applied Science and Engineering Technology 13, no. 4 (2025): 2799–805. https://doi.org/10.22214/ijraset.2025.68478.

Full text
Abstract:
As cyber threats become more sophisticated, traditional security mechanisms relying solely on Active Directory (AD) for authentication and authorization lack real-time threat detection and response capabilities. This project enhances security by integrating AD with Splunk, a Security Information and Event Management (SIEM) solution, within a virtualized environment where Microsoft Server 2022 hosts AD services and a Domain Controller, while Splunk provides centralized security monitoring. PowerShell scripting automates user management and event log monitoring, improving administrative efficiency. To evaluate system effectiveness, a simulated password-cracking attack from a Linux machine (IP: 192.168.10.250) targets the AD server, with Splunk monitoring security logs for real-time anomaly detection, automated threat alerts, and advanced analytics to identify unauthorized access attempts, privilege escalation, and insider threats. The network setup includes grydsecurity, featuring an Active Directory Server (192.168.10.7), a Splunk Server (192.168.10.10), and a DHCP-connected client PC, with RDP restricted on client machines to prevent remote attacks but accessible on the server for administrative purposes. By integrating AD with Splunk SIEM, this system strengthens IT infrastructure security, enhances incident response, ensures compliance with regulatory frameworks such as HIPAA and GDPR, and leverages machine learning-based detection for proactive cyber defense. This project demonstrates a scalable, intelligence-driven security model that combines automation, system administration, and cybersecurity best practices to safeguard enterprise environments.
APA, Harvard, Vancouver, ISO, and other styles
35

Widyastuti, Indriyani, and Yayan Hendrian. "Pemanfaatan VLAN Untuk Meningkatkan Kinerja Jaringan Komputer BKPP Kabupaten Bogor." Computer Science (CO-SCIENCE) 2, no. 1 (2022): 10–18. http://dx.doi.org/10.31294/coscience.v2i1.894.

Full text
Abstract:
Computer networks have an important role in a government agency, especially BKPP. In their daily life, these institutions carry out activities of exchanging documents and data, printing files on the same printer and using hardware or software that is connected to the network together. Government agencies play a very important role in serving the community, therefore a good, secure, stable and fast network is needed in processing small and large data. The Bogor Regency Personnel, Education and Training Agency uses one computer that acts as a multifunctional server for the database server, DHCP server, and web server at the same time. From the results of the analysis, it was found that the topology used is an extended star with IP class C. Using a firewall that is applied to the router, as well as the default Windows antivirus that is already installed on every PC and laptop. Meanwhile, access point security uses WPA2-PSK. The problem faced is that it is easy for people from other divisions who are not interested in seeing and accessing files in other divisions that are confidential. Thus, a VLAN is needed to manage access rights between computer network users in order to maintain data and file authenticatio
APA, Harvard, Vancouver, ISO, and other styles
36

Manjinder, Singh* Charanjit Singh. "MULTI TENANCY SECURITY IN CLOUD COMPUTING." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 3 (2017): 452–58. https://doi.org/10.5281/zenodo.438116.

Full text
Abstract:
The word Cloud is used as a metaphor for the internet, based on standardised use of a cloud like shape to denote a network. Cloud Computing is advanced technology for resource sharing through network with less cost as compare to other technologies. Cloud infrastructure supports various models IAAS, SAAS, PAAS. The term virtualization in cloud computing is very useful today. With the help of virtualization, more than one operating system is supported with all resources on single H/W. We can also say that we acquired single server but we used it for multiple functions(Web Server, database server, Application Server, DNS Server, DHCP Server). One more asset of cloud computing is Multi Tenancy. Sharing of one database to many tenants or we can say users is known as multi tenancy. Cloud computing customize the requirements of user and u r able to pay as per use. Network applications share through multi tenancy for various users but security of data is basic issue. This paper discusses about the security with more encryption routines and upgrades performance with network route optimization.Due to increase in performance and security, more number of people attract towards CLOUD COMPUTING. Virtualization is a term of cloud computing. Virtualization is a very new technology in computer technologies. With the help of virtualization share the resources software and hardware. Best example of virtualization is THIN CLIENT technology, which runs more than one client with one server. Desktop virtualization shares the desktop with other thin client. Security and Performance issues link with desktop virtualization also. HP + Microsoft launch one server (H/W provided by HP and S/W provided by Microsoft Multipoint Server edition).
APA, Harvard, Vancouver, ISO, and other styles
37

Narwal, Priti, Deepak Kumar, Shailendra Narayan Singh, and Peeyush Tewari. "Stochastic Intrusion Detection Game-Based Arrangement Using Controlled Markov Chain for Prevention of DoS and DDoS Attacks in Cloud." Journal of Information Technology Research 14, no. 4 (2021): 45–57. http://dx.doi.org/10.4018/jitr.2021100104.

Full text
Abstract:
DoS (denial of service) assault is the most prevalent assault these days. It imposes a major risk to cybersecurity. At the point when this assault is propelled by numerous conveyed machines on a solitary server machine, it is called as a DDoS (distributed denial of service) assault. Additionally, DoS bypass on DHCP (dynamic host configuration protocol) server assault is a rising and famous assault in a system. The authors have proposed a stochastic intrusion detection game-based arrangement utilizing controlled Markov chain that figures the transition probabilities starting with one state then onto the next in a state transition diagram. At first, the authors have conjectured these assaults, and after that, they proposed a methodology that uses the idea of master and slave IPS (intrusion prevention system). This approach works well when mapped to these estimated assaults and accordingly helps in the recognition and counteractive action of these assaults in a cloud domain.
APA, Harvard, Vancouver, ISO, and other styles
38

Clark, Barry, Bartosz Wachowiak, Ewan W. Crawford, Zenon Jakubowski, and Janusz Kabata. "LIS–lnterlink—connecting laboratory information systems to remote primary health–care centres via the Internet." Journal of Automatic Chemistry 20, no. 3 (1998): 77–81. http://dx.doi.org/10.1155/s1463924698000091.

Full text
Abstract:
A pilot study was performed to evaluate the feasibility of using the Internet to securely deliver patient laboratory results, and the system has subsequently gone into routine use in Poland. The system went from design to pilot and then to live implementation within a four-month period, resulting in the LIS-Interlink software product. Test results are retrieved at regular intervals from the BioLinkTMLIS (Laboratory Information System), encrypted and transferred to a secure area on the Web server. The primary health-care centres dial into the Internet using a local-cell service provided by Polish Telecom (TP), obtain a TCP/IP address using the TP DHCP server, and perform HTTP ‘get’ and ‘post’ operations to obtain the files by secure handshaking. The data are then automatically inserted into a local SQL database (with optional printing of incoming reports)for cumulative reporting and searching functions. The local database is fully multi-user and can be accessed from different clinics within the centres by a variety of networking protocols.
APA, Harvard, Vancouver, ISO, and other styles
39

Nusri, Andi Zulkifli, and Rezky Erwin Syah. "Analisis Trafik Jaringan Menggunakan Wireshark Untuk Meningkatkan Kinerja Jaringan Pada Smk 3 Soppeng." Jurnal Ilmiah Sistem Informasi dan Teknik Informatika (JISTI) 8, no. 1 (2025): 114–22. https://doi.org/10.57093/jisti.v8i1.281.

Full text
Abstract:
Analisis jaringan menggunakan Aplikasi “Wireshark” yang dilakukan oleh pihak network analyzer dengan tujuan menganalisa jaringan dengan melakukan pengawasan yang dilakukan oleh User sehingga Administrator dapat mudah memonitoring aktivitas-aktivitas yang dilakukan oleh user. Analisis jaringan komputer menggunakan aplikasi “Wireshark” diterapkan pada SMK 3 Soppeng agar Administrator jaringan dapat mengawasi aktivitas yang dilakukan oleh staf atau pegawai dan guru, apakah jaringan internet digunakan secara maksimal untuk media Pendidikan atau hanya untuk hiburan semata. Layanan internet melalui modem akan disalurkan kekomputer server, dimana komputer server akan menjadi DHCP (Dynamic Host Configuration Protocol) server jaringan yang akan bertindak sebagai pembagi IP jaringan ke switch dan dari switch itu sendiri akan memonitoring jaringan ke client dan setiap client yang ingin terhubung ke jaringan maka harus melakukan prosedur login terlebih dahulu, Adapun pengujian sistem jaringan wireless LAN yang digunakan yaitu Whitebox (Glassbox), Pengujian ini dimaksud untuk mengukur kualitas jaringan kecepatan internet apakah sudah sesuai dengan layanan yang diberikan oleh ISP (Internet Service Provider).Pengujian sistem merupakan proses analisa sistem jaringan untuk menentukan kuat dan lemahnya keamanan jaringan dan berjalan sesuai lingkungan yang diinginkan. Pengujian sistem ini sering diasosiasikan dengan pencarian troubleshooting masalah dijaringan, adanya trobleshooting pada jaringan mengakibatkan kualitas jaringan lemah
APA, Harvard, Vancouver, ISO, and other styles
40

Ersoy Cangir, Özge, Mustafa Yıldırım, and Nurgül Bostan. "Faculty network system implementation using cisco packet tracer." Journal of Computer & Electrical and Electronics Engineering Sciences 1, no. 1 (2023): 20–24. http://dx.doi.org/10.51271/jceees-0005.

Full text
Abstract:
In this study, the faculty network system was designed using the Cisco Packet Tracer program without using any physical components. The aim was to simulate the network structure of the faculty and show the engineering faculty on the campus map, and to enable communication between the computers inside the faculty by configuring similar devices to real routers, switches, and servers. The management of the IP configuration of the devices in the network, and the configuration of the router, switch, and server used in the network (DNS, DHCP, FTP, HTTP, and MAIL) were carried out in the Cisco Packet Tracer environment, creating a simulated network system that can be applied in a real system.
APA, Harvard, Vancouver, ISO, and other styles
41

Seftian, M. Gilang, Muhammad Wildan, and Dicky Pratama. "Perancangan Jaringan LAN dengan Server Cloud Storage: Studi Kasus Menggunakan Cisco Packet Tracer." Jurnal Sistem Informasi, Manajemen dan Teknologi Informasi 3, no. 1 (2025): 54–63. https://doi.org/10.33020/jsimtek.v3i1.804.

Full text
Abstract:
Perkembangan teknologi informasi dan komunikasi mendorong kebutuhan jaringan komputer yang efisien dan fleksibel. Penelitian ini dilakukan bertujuan untuk mendesain dan mensimulasikan jaringan Local Area Network (LAN) yang dilengkapi dengan integrasi Server Cloud Storage menggunakan aplikasi Cisco Packet Tracer. Pendekatan yang diterapkan dalam penelitian ini adalah model waterfall, yang terdiri dari tahap analisis, tahap desain, tahap implementasi, dan tahap pengujian. Hasil dari penelitian ini menunjukkan bahwa jaringan LAN yang telah dirancang mampu mengintegrasikan perangkat dengan stabil dan efisien, mendukung transfer data antar perangkat tanpa kendala. Konfigurasi topologi hybrid dengan routing statis dan DHCP memastikan distribusi alamat IP yang optimal untuk semua perangkat, baik kabel maupun nirkabel. Integrasi teknologi Cloud Storage memungkinkan pengelolaan data secara terpusat dengan akses yang fleksibel. Simulasi membuktikan keberhasilan desain dengan hasil pengujian konektivitas yang konsisten.
APA, Harvard, Vancouver, ISO, and other styles
42

Fauzan, Rifqi, Syariful Ikhwan, and Jafaruddin Gusti Amri Ginting. "ANALYSIS PERFORMANCE IN SOFTWARE DEFINED NETWORK (SDN) USING ARUBA VAN CONTROLLER." Jurnal Informatika: Jurnal Pengembangan IT 5, no. 3 (2020): 64–69. http://dx.doi.org/10.30591/jpit.v5i3.1937.

Full text
Abstract:
SDN technology is a new architecture in the network that separates the control plan from the data plan. Aruba VAN Controller provides centralized control in a network architecture that runs on the OpenFlow protocol. This study conducted an SDN network simulation using the Aruba VAN Controller by applying the Narmox Spear application to simplify network configuration. IP addressing with DHCP server, for testing scenarios using UDP protocol packet delivery with packets sent at 1000 Bytes, the number of packets sent is 100 packets/s, then given background traffic variations of 50 Mbps, 100 Mbps, 150 Mbps and 200 Mbps to networks that have two different link bandwidth values as a comparison for analyzing the results of testing the QoS parameters, which are 100 Mbps and 200 Mbps. The test results are obtained when background traffic exceeds the link bandwidth capacity, the resulting throughput will be smaller on the destination side by 485.64 Kb/s, delay increases by 240.21 ms, then for jitter by 2.48 ms, resulting in overload resulting in packet loss of 37.41%. However, when background traffic increases and does not exceed the specified link bandwidth capacity, the overall QoS parameter value is generated in the good category, namely throughput of 774.42 Kb/s, delay of 0.41 ms, jitter of 0.37 ms and packet loss of 0.00%. Keyword - SDN, Aruba VAN Controller, OpenFlow, DHCP, UDP, QoS
APA, Harvard, Vancouver, ISO, and other styles
43

Fariz, Fariz, Henry Saptono, and April Rustianto. "Analisis Tingkat Efisiensi pada Konfigurasi Mikrotik Hotspot menggunakan Metode Zero Touch Provisioning." Jurnal Informatika Terpadu 7, no. 2 (2021): 47–52. http://dx.doi.org/10.54914/jit.v7i2.333.

Full text
Abstract:
ZTP (Zero Touch Provisioning) adalah sebuah inovasi dalam dunia IT, yang merubah cara melakukan konfigurasi perangkat yang sebelumnya manual menjadi otomatis. Inovasi ini tercipta dikarenakan semakin banyaknya kebutuhan akan perangkat jaringan. Tantangan tersendiri bagi perusahaan jaringan untuk mengelolanya baik dari sisi waktu dan biaya. Pada metode tradisional, Administrasi perangkat jaringan harus masuk ke setiap perangkat jaringan satu persatu untuk melakukan konfigurasi. Hal tersebut tentunya tidak efisien. Disinilah kelebihan dari otomasi, konfigurasi perangkat jaringan menjadi lebih efisiensi, ditambah pekerjaan yang sifatnya repetitive seperti backup konfigurasi, monitoring, bisa dilakukan dengan otomatis. Pada penelitian ini penulis akan menguji sebara efisien penggunaan dari ZTP dengan cara membandingkan waktu konfigurasi dengan cara manual dan otomasi dengan ztp. Konfigurasi yang akan di lakukan pada penelitian ini adalah konfigurasi IP Address, membuat DHCP server, dan membuat hotspot pada MikroTik. Untuk memudahkan melakukan manajemen jaringan penulis membuat dashboard untuk mengetahui perangkat mana yang sudah dikonfigurasi. Sistem otomasi sendiri dibuat dengan menggunakan pemrograman Python yang memanfaatkan library utama Paramiko sebagai penghubung antara perangkat jaringan dengan server otomasi melalui protokol SSHv2.
APA, Harvard, Vancouver, ISO, and other styles
44

Samuel, Rajula Angelin, and D. Shalini Punithavathani. "Designing a New Scalable Autoconfiguration Protocol with Optimal Header Selection for Large Scale MANETs." Journal of Circuits, Systems and Computers 29, no. 05 (2019): 2050068. http://dx.doi.org/10.1142/s0218126620500681.

Full text
Abstract:
Autoconfiguration in mobile ad hoc network (MANET) is a challenging task to be accomplished in hostile environment. Moreover, a mobile node in MANET is usually configured with a unique IP address for providing better communication and to connect it with an IP network. Essentially, the nodes in wired networks are autoconfigured using a commonly known Dynamic Host Configuration Protocol (DHCP) server. However, MANET exhibits the intrinsic characteristics (i.e., distributed, dynamic and multi-hop) in nature; hence, it is hard to adopt DHCP server for autoconfiguration of nodes in MANET without applying significant modifications in auto-configuration scheme. This paper proposes an efficient IPV6 Duplicate address Elimination Autoconfiguration protocol for MANETs (IDEAM) which comprises the member and the cluster head (CH) nodes organized in a hierarchical fashion. Further, the proposed protocol considers the global connectivity exhibiting reduced communication overhead among the nodes. Initially, our proposed auto-configuration protocol encourages the Duplicate Address Detection (DAD) operation by selecting a controller node from the prefixed group members using a joining node in the network. In other words, the DAD operation is performed perfectly by a selected controller node on behalf of the new joining node. Thus, our proposed protocol becomes more effective and behaves better in the minimization of overhead by considerably eliminating the DAD messages broadcast in the network. Also, we imposed a new Flower pollination based gray wolf optimization (FPGWO) algorithm for selecting an optimal header among the group members by considering various node parameters (i.e., node location, resources and node density) to avoid unnecessary broadcasting of additional weight messages about each node in the network. The simulation results proved the efficiency of our proposed protocol in terms of scalability and in the minimization of overhead. Also, an effectual method provided by our proposed approach enhances the activity of marginal nodes over the group for healing the network that degrades its performance followed by the splitting and merging operation.
APA, Harvard, Vancouver, ISO, and other styles
45

Larosa, Fati Gratianus Nafiri, and Ofelius Laia. "ANALISIS QUALITY OF SERVICE (QoS) LIVE STREAMING WIRELESS IP CAMERA XONZ BERBASIS SMARTPHONE ANDROID." METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi 5, no. 2 (2019): 17–24. http://dx.doi.org/10.46880/mtk.v5i2.422.

Full text
Abstract:
Quality of Service (QoS) on Live Streaming has the main parameters, namely bandwidth, jitter, loss and delay, which are measured on the implementation of Wireless IP Camera based on Android Smartphone. The test tools used iperf and ping software, to capture data packets. The network design in this study uses Xonz Wireless IP Camera, wifi router, Server/Laptop and Android Smartphone to monitor or access the services provided. Surveillance/reconnaissance or surveillance by accessing live streaming can be done from anywhere as long as there is still an intranet network. wifi router provides DHCP service, Server/Laptop provides a Virtual Machine using MS Windows Server 2003 Operating System. Web Server is not installed on Real Machine but on Virtual Machine. The smartphone used has the Android Operating System version 4.4.2. IP Camera Xonz model XZ-12Z-HR/W has one major drawback that it can only be accessed via Internet Explorer Browser which can only run on MS Windows Operating System. Some applications that are already available on Google Play and installed on Android Smartphones cannot detect the Wireless IP Camera. The outcome or impact of this research is the creation of a simple Live Streaming application that can be accessed by all browsers on all platforms including Android Smartphones. Measurements were made using iperf and ping. The results showed that the Xonz IP Camera can still be used for mobile room monitoring as far as a maximum of about 20 m from the wifi router and still meets the standard QoS values ​​set by TIPHON and ITU-T G.114.
APA, Harvard, Vancouver, ISO, and other styles
46

Hariyadi, I. Putu, I. Made Yadi Dharma, Raisul Azhar, and Suriyati Suriyati. "Implementasi Software-Defined Network Terintegrasi Firewall pada Proxmox untuk Pengontrolan Konfigurasi Jaringan dan Pengamanan Layanan Container." JTIM : Jurnal Teknologi Informasi dan Multimedia 7, no. 1 (2025): 107–22. https://doi.org/10.35746/jtim.v7i1.644.

Full text
Abstract:
Virtualization technology has helped companies consolidate various server roles into a single physical server, reducing hardware costs. Hypervisor is a software in virtualization that is used to manage server hardware, allowing multiple Virtual Machines (VM)/Containers (CT) to run on a single physical machine. Companies face various challenges to remain competitive in the digital era, such as the need for rapid deployment of virtual guests and virtual networks on hypervisors in development, testing, and production environments, as well as securing network services. The purpose of this study is to implement SDN on hypervisors to centrally control virtual network configurations with a simple design, reducing setup and maintenance costs and time. In addition, it also implements a firewall and Virtual Private Network (VPN) based on OpenVPN and a reverse proxy to secure the hypervisor and VM/CT so that services remain available. This study presents a new approach that integrates Software-Defined Network (SDN)-based network management with comprehensive security solutions on hypervisors. This approach combines efficiency in network management and security that have rarely been focused on simultaneously in previous studies. The research method uses the Network Development Life Cycle (NDLC). The hypervisor used is Proxmox Virtual Environment (PVE) which is installed on the Virtual Private Server (VPS) provider IDCloudHost. Based on the results of the trials that have been carried out, it can be concluded that the simple zone type SDN on PVE can be used to control network configurations centrally and more simply such as routing, Dynamic Host Configuration Protocol (DHCP), Source Network Address Translation (SNAT), hostname registration and Internet Protocol (IP) from CT to forward lookup zone on the Domain Name System (DNS) server. Activating the firewall and creating rules at the cluster and CT levels from PVE and OpenVPN can protect the infrastructure when accessed both internally and externally. While the implementation of nginx reverse proxy can secure access to HTTP/HTTPS services on CT in PVE.
APA, Harvard, Vancouver, ISO, and other styles
47

Ivana Lucia Kharisma and Mayang Selpiyana. "Pembelajaran Konfigurasi Mikrotik Berbasis Model OSI Layer di PT Proxi Jaringan Nusantara." Aksi Nyata : Jurnal Pengabdian Sosial dan Kemanusiaan 2, no. 1 (2024): 25–30. https://doi.org/10.62383/aksinyata.v2i1.977.

Full text
Abstract:
Effective network management is the main need in the world of information technology, especially for companies engaged in network infrastructure. One of the devices that is often used to support network connectivity is MikroTik. This journal aims to design MikroTik configuration learning based on the OSI Layer Model at PT Proxi Jaringan Nusantara, focusing on setting MikroTik so that it can be connected to the internet. The learning method is designed using theoretical and simulation approaches, including the introduction of the OSI Layer Model as the basis of network communication and the technical steps of MikroTik configuration, such as IP Address settings, NAT (Network Address Translation), DHCP Server, and basic Firewall. The simulation results show that the configuration carried out in accordance with the OSI Layer Model can improve network stability and efficiency. This learning is designed to provide practical and in-depth solutions for authors in understanding MicroTik-based network management.
APA, Harvard, Vancouver, ISO, and other styles
48

Faizah, Siti, Eni Pudjiarti, and Andi Saryoko. "Perancangan Jaringan Dengan Menggunakan Static Routing Dan VPN PPTP Pada SMK Bina Putra." BINA INSANI ICT JOURNAL 9, no. 1 (2022): 53. http://dx.doi.org/10.51211/biict.v9i1.1728.

Full text
Abstract:
Abstrak: Membangun sebuah jaringan komputer merupakan hal yang cukup penting di masa sekarang, agar mempermudah segala aktifitas sharing data secara efisien dan cepat. Komunikasi dengan mitra kerja pada SMK Bina Putra masih dilakukan dengan bertemu secara offline, hal ini kurang efektif mengingat jaman sekarang sudah memiliki berbagai macam teknologi yang bisa dimanfaatkan. Terlebih lagi pertemuan langsung itu membutuhkan waktu dan biaya lebih, oleh karena itu penyampaian informasi yang lebih efisien sangat diharapkan pada saat ini. Arsitektur jaringan yang digunakan SMK Bina Putra saat ini adalah sistem operasi jaringan model LAN (Local Area Network). Sistem operasi jaringan LAN membuat user dapat terhubung satu sama lain jika sudah terkonfigurasi alamat IP nya, serta terhubung dengan router dan switch. Metode penelitian yg penulis lakukan dengan metode obsevasi, wawancara dan studi pustak sedangkan Metode analisa kebutuhan yang digunakan adalah Network Development Life Cycle (NDLC). Hasil dari penelitian ini dengan menggunakan winbox admin dapat mengkonfigurasi VPN server dan client. NAT digunakan agar PC bisa mengakses internet jika sudah terhubung dengan router utama. Setelah jaringan usulan ini di implementasikan maka kedua pihak dapat sharing data dan informasi tanpa perlu melakukan pertemuan offline.
 
 Kata kunci: DHCP, VPN, winbox
 
 Abstract: Building a computer network is quite important today, in order to facilitate all activities to share data efficiently and quickly. Communication with work partners at SMK Bina Putra is still done by meeting offline, this is less effective considering that nowadays we already have various kinds of technology that can be utilized. Moreover, these meetings require more time and cost, therefore more efficient information delivery is expected at this time. The network architecture used by Bina Putra Vocational School today is a LAN (Local Area Network) network operating system. The LAN network operating system allows users to connect to each other if the IP address is configured, as well as connect to routers and switches. The research method that the author uses is observation, interviews and library studies, while the needs analysis method used is the Network Development Life Cycle (NDLC). The results of this study using winbox admin can configure the VPN server and client. NAT so that the PC can access the internet if it is connected to the main router. After this proposal network is implemented, the two of them can share data and information without the need for offline meetings. 
 
 Keywords: DHCP, VPN, winbox
APA, Harvard, Vancouver, ISO, and other styles
49

Siregar, Jonathan Daniel, and Ahmad Chusyairi. "Implementasi Authentication Captive Portal Pada Wireless Local Area Network di PT. St. Morita Industries." Jikom: Jurnal Informatika dan Komputer 14, no. 1 (2024): 14–24. http://dx.doi.org/10.55794/jikom.v14i1.119.

Full text
Abstract:
PT. St. Morita Industries has a Wireless Local Area Network (WLAN) which is used as a medium for exchanging data and information by utilizing wireless transmission media, WLAN currently uses WPA2-PSK as a security system to authenticate users to access the internet. However, the use of WPA2-PSK as WLAN security still has a weakness due to the use of the same 1 password for many users in order to connect to the WLAN hotspot will be an opportunity for cyber crime. This happens because it will be very easy for irresponsible users to enter the WLAN. Therefore, in this study, captive portal authentication will be applied as an effort to increase WLAN security replaces WPA2-PSK. This research process uses the Network Development Life Cycle (NDLC) method. All the configurations needed to build the captive portal authentication take advantage of the Winbox program. This research has resulted in a special user authentication limitation for users who have registered on the WLAN is permitted to access this company's internet. In addition, the Winbox program can also be used for monitoring all users connected to the WLAN, both active and inactive users. By setting up captive portal authentication on a WLAN network using a proxy routerboard device which comprises an IP address, DHCP server, hostpot setup, NAT firewall, and DNS server one can create a WPA2-PSK security system. This configuration is completed with the aid of the Winbox v3.37 software.
APA, Harvard, Vancouver, ISO, and other styles
50

Leksono, Ilham Nur, and Tommi Alfian Armawan Sandi. "OPTIMALISASI JARINGAN WAN BERBASIS MIKROTIK (STUDI KASUS : ROBOTIC LABORATORY BOGOR)." Jusikom : Jurnal Sistem Komputer Musirawas 4, no. 02 (2019): 100–110. http://dx.doi.org/10.32767/jusikom.v4i2.628.

Full text
Abstract:
Jaringan komputer adalah dua atau lebih komputer otonom yang saling terhubung baik fisik maupun wireless dan menggunakan aturan-aturan atau protokol melalui media transmisi sehingga dapat saling bertukar informasi serta sumber daya. Pada sebuah teknologi jaringan komputer diperlukan perangkat yang bertugas mengatur atau memanajemen jaringan yang ada. Perangkat tersebut adalah Router. Saat ini pada Kantor Robotic Laboratory Bogor, jaringan komputer yang ada masih belum terstruktur dan belum ada administrasi jaringan, dimana jaringan yang ada hanya berasal langsung dari ISP yang ada dan disebar langsung kepada klien. Sehingga belum optimalnya penggunaan serta fitur yang ada dalam jaringan komputer tersebut. Penelitian ini bertujuan mengoptimalkan jaringan WAN berbasis MikroTik, dimana sebuah perangkat router yang didalamnya sudah tertanam sistem operasi jaringan. Dari hasil penelitian dan analisa bahwa sistem jaringan komputer yang ada pada Robotic Laboratory Bogor menggunakan topologi star dengan internet yang bersumber dari ISP. Optimalisasi jaringan komputer menggunakan MikroTik router dengan mengaktifkan DHCP Server, manajemen bandwidth, hotspot, firewall, wireless dan web proxy hasil nya jaringan komputer yang ada pada Robotic Laboratory Bogor menjadi lebih optimal dan maksimal dalam penggunaan serta pengawasannya.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!