Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : Jurnal Mantik

Security Of Dynamic Domain Name System Servers Against DDOS Attacks Using IPTABLE And FAIL2BA: Security Of Dynamic Domain Name System Servers Against DDOS Attacks Using IPTABLE And FAIL2BA Ibnu Muakhori; Sunardi Sunardi; Abdul Fadlil
Jurnal Mantik Vol. 4 No. 1 (2020): May: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (933.248 KB)

Abstract

Availability, integrity and confidentiality are the main objectives of information security and server security. These three elements are links that are interconnected in the concept of information protection.Distributed Denial of Service (DDoS) is an attack to make online services, networks and applications not available by flooding data traffic so that services is unvailable or availability aspects disrupted. This attack resulted in huge losses for institutions and companies engaged in online services and web-based applications being one of the main targets of attackers to carry out DDoS attacks. Countermeasures that take a long time and large recovery costs are a loss for the institution or company that owns the service due to loss of integrity. NDLC (Network Development Life Cycle) is a method that has stages namely analysis, design, simulation, prototyping, implementation, monitoring and management. The NDLC method used aim for the results obtained focused and detailed. Snort IDS applied on the DDNS server functions to record when there is a DDoS attack. Implemention fail2ban as realtime preventation tool on the server by configuring based on the rules applied to fail2ban. The results showed Snort IDS managed to detect DDoS attacks based on the rules applied to Snort IDS. Realtime prevention using Fail2ban successfully functions as a DDoS attack by blocking the attacker's IP Address.
Web Server Security Analysis Using The OWASP Mantra Method: Web Server Security Analysis Using The OWASP Mantra Method Bambang Subana; Abdul Fadlil; Sunardi Sunardi
Jurnal Mantik Vol. 4 No. 1 (2020): May: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (434.86 KB)

Abstract

Higher Education has been using web-based academic information system, for all academic administration process in this academic system such as study plan, academic transcipt, lecturers and Curriculum and student data. So that required maintenance in database and system management whith well-maintained and scheduled. It is necessary to apply the system to determine the level of vulnerability in order to avoid attacks from irresponsible parties. OWASP (Open Web Application Security Project) is one of the methods for testing the web-based applications released by owasp.org. Using OWASP may indicate that authentication management, authorization and session management.The STMIK Jakarta website often has problems on the web and the loss of some important data that interferes with lectures. At the end of 2016, around September when preparing for the first semester of the Study Plan, the website experienced programmed data loss, consequently the academic system was disrupted. The STMIK Jakarta has used a web-based academic information system, for all academic administrative processes such as study plans, academic transcripts, lecturers, curriculum and student data.This system requires data base and system management. It is important to implement a security system to determine the level of vulnerability to avoid attacks from irresponsible parties. OWASP (Open Web Application Security Project) is one method for testing web-based applications released by owasp.org. The results of the research have been carried out with the results reaching around 90% management authentication, authorization, and session management not being implemented properly.