Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : Proceeding of the Electrical Engineering Computer Science and Informatics

Semi-reactive Switch Based Proxy ARP in SDN Fauzi Dwi Setiawan Sumadi; Diah Risqiwati; Syaifuddin Syaifuddin
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 5: EECSI 2018
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (446.069 KB) | DOI: 10.11591/eecsi.v5.1591

Abstract

In order to achieve high scalability during the network discovery process in software-defined networking (SDN), an extensive method for generating switch-based proxy is essential. This paper investigated the semi reactive solution for guiding the controller to build an OFPT_FLOW_MOD message that allowed SDN switch to reply an Address Resolution Protocol (ARP) request directly by deploying the semi-reactive switch-based proxy ARP application in northbound application programming interface (API). We conduct the experiment by using Open Networking Operating System (ONOS) an open-source SDN controller simulated in Mininet environment. As can be seen from the evaluation result, the installed application can reduce the ARP reaction time up to 95% calculated from the sender host. The final result also indicates that our approach can decrease the controller's loads significantly.
Automate Snort Rule For Xss Detection With Honeypot Syaifuddin Syaifuddin; Diah Risqiwati; Hanugra Sidharta
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 5: EECSI 2018
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (420.911 KB) | DOI: 10.11591/eecsi.v5.1623

Abstract

In modern era, data become precious and important, if there is occurrence data leakage will cause high damage to business, data loss will impact on loosing profit. To avoiding that, organization need equip with updated security tools for protect data and network from malicious software and hacker attack. As computer network growing day by day, security become important role to preventing from attack from outside and inside network. Unfortunetely, new vulnerability finds almost every day, resulting increment number of intrusion and attack. Meanwhile each intrusion and attack have different pattern and behavior, continuous development on intrusion detection is mandatory. In 2011, most attack associate with XSS, 12.58% attack is XSS followed by Denial of Service (DOS) 8.06%.