LM Fid Aksara
Universitas Halu Oleo

Published : 3 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 3 Documents
Search

SISTEM MONITORING SERANGAN JARINGAN KOMPUTER BERBASIS WEB SERVICE MENGGUNAKAN HONEYPOT SEBAGAI INTRUSION PREVENTION SYSTEM Inda Sari; Muh. Yamin; LM Fid Aksara
semanTIK Vol 5, No 1 (2019): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1271.423 KB) | DOI: 10.55679/semantik.v5i1.5330

Abstract

Security is very important especially to maintain the integrity of data for internet service users. There are many ways to infiltrate computer networks, starting from just experimenting to trying to damage and steal important information on the server. One way to overcome this problem is by the existence of an attack prevention system or commonly referred to as the Intrusion Prevention System (IPS) so that an attack can not directly touch the data or files that others should not know.Honeypot is a system that is deliberately sacrificed in order to be attacked to obtain information from the activities of the attacker and to know the methods used in attacking a system. The results of attacks on the system can be displayed in a monitoring system and can also be displayed through a web service. The results obtained from this study that the creation of a web service -based computer network attack monitoring system uses a honeypot as an IPS successfully implemented. Attacks that enter through TCP ports are 33.96%, UDP 33.96%, and ICMP 32.07%.Keywords— Honeypot, Web Service, Intrusion Prevention System DOI : 10.5281/zenodo.2651714
IMPLEMENTASI KEAMANAN SERVER PADA JARINGAN WIRELESS MENGGUNAKAN METODE INTRUSION DETECTION AND PREVENTION SYSTEM (IDPS) (STUDI KASUS : TECHNO’S STUDIO) Muhammad Sadam Husain; LM Fid Aksara; Natalis Ransi
semanTIK Vol 4, No 2 (2018): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1150.922 KB) | DOI: 10.55679/semantik.v4i2.4310

Abstract

The use of computer networks uses the current wireless media that provides significant information that allows others to access the connection because they do not use cables.Techno's Studio is a company engaged in technology and is a company that uses wireless technology as one of the important components in the activities of everyday employees. Therefore, server security issues on wireless networks become very important, because without any security support can lead to system failure and can be a gap in the occurrence of hacking.The IDPS method (Intrusion Detection & Prevention System) is used as an attack detection and prevention system by blocking Internet Protocol (IP) attackers. The results obtained from this research is the use of Snort and IPTables as a server security system on the wireless network successfully overcome the type of attack on ICMP ports, FTP, SSH, TELNET, and HTTP using various tools of attackers such as angry IP scanner, FileZilla, Putty, Mozilla Firefox, and Zenmap.Keywords— Server, Wireless, Intrusion Detection & Prevention System (IDPS), Snort, IPTables DOI: 10.5281/zenodo.1407864
ANALISIS DAN PERBANDINGAN WIRELESS DISTRIBUTION SYSTEM (WDS) DAN NON WIRELESS DISTRIBUTION SYSTEM (NON WDS) BERBASIS OPENWRT MENGGUNAKAN ACCESS POINT PADA JURUSAN TEKNIK INFORMATIKA FAKULTAS TEKNIK UNIVERSITAS HALU OLEO Wahyuddin Aluddin; LM Fid Aksara; Jumadil Nangi
semanTIK Vol 4, No 2 (2018): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (632.842 KB) | DOI: 10.55679/semantik.v4i2.4699

Abstract

The wireless network is one of the best alternatives in building a network of computers that is practical, in some agencies and the commercial wireless network is used to support an existing wired network. But its implementation is still used cable network that became the backbone of the access point so that a client that is connected can access the internet. Wiring problems can be a considerable obstacle in places that are hard to reach.The wireless distribution system is a system for developing a wireless internet network without having to use a cable as a backbone for the access point but instead of utilize a wireless line of the access point. At the time of the wireless distribution system network, topology and network topology of the non-wireless distribution system is applied, will be on analysis using Wireshark, the QoS parameter application that consists of a Delay, Throughput, and Packet Loss.The testing performed against the clients who are numbered six (6) is each connected to the access point. Scenario testing is done i.e. the conditions streaming and download, made during the three (3) days. Of test results obtained, the wireless distribution system network topology has the value throughput, delay; packet loss is a little less useful than a non-network topology wireless distribution system. But the differences in the average value of the QoS parameters that are generated are not too significant.Keywords—Wireless Distribution System, Non-Wireless Distribution System, Quality of Service (QoS)