cover
Contact Name
Firmansyah
Contact Email
f.firman@unizar.ac.id
Phone
+6281802628765
Journal Mail Official
sakira@unizar.ac.id
Editorial Address
Jalan Unizar No.20 Turide Sandubaya Mataram, 83233. Nusa Tenggara Barat.
Location
Kota mataram,
Nusa tenggara barat
INDONESIA
Secure And Knowledge-Intelligent Research in Cybersecurity And Multimedia (SAKIRA)
ISSN : -     EISSN : 3046773X     DOI : -
The Journal of Secure And Knowledge-Intelligent Research in Cybersecurity And Multimedia (SAKIRA) is a leading peer-reviewed publication dedicated to advancing the fields of cybersecurity and multimedia through innovative research and knowledge-intelligent approaches. SAKIRA serves as a platform for researchers, academics, and industry practitioners to exchange ideas, present findings, and address emerging challenges in the increasingly interconnected realms of cybersecurity and multimedia. SAKIRA welcomes submissions spanning a wide range of topics, including but not limited to: Cyber threat intelligence Network security and cryptography Multimedia data encryption and authentication Secure multimedia communication systems Machine learning and AI for cybersecurity Multimedia forensics and steganography Privacy-preserving techniques in multimedia Cyber-physical systems security Blockchain and distributed ledger technologies in cybersecurity Secure multimedia content delivery over networks The journal employs a rigorous peer-review process to ensure the quality and integrity of published research. SAKIRA is committed to promoting interdisciplinary research that bridges the gap between cybersecurity and multimedia, fostering collaboration among researchers from diverse backgrounds
Articles 5 Documents
Search results for , issue "Vol. 1 No. 2 (2023): Journal of SAKIRA (Secure And Knowledge-Intelligent Research in Cybersecurity A" : 5 Documents clear
Forensic Network Analysis of Metarouter Using NIST SP800-86Framework
Journal of Secure And Knowledge-Intelligent Research in Cybersecurity And Multimedia Vol. 1 No. 2 (2023): Journal of SAKIRA (Secure And Knowledge-Intelligent Research in Cybersecurity A
Publisher : Computer Science Study Program, Faculty of Engineering, Universitas Islam Al-Azhar

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Computer networks are developing very rapidly, both in commercial institutions, in the academic world, and even in people's homes that need internet access. Internet is an acronym for Interconnection Networking, or which means a network that is widely connected. The Internet is a computer network linkage through a standard called the global Transmission Control Protocol or Internet Protocol TCP / IP, which has a system of exchanging communication packets originating through data. This study implements a virtual router network as an object for reviewing network traffic running on router hardware by utilizing network analysis tools on the Windows operating system. The framework used in the research is the National Institute of Standards and Technology (NIST). The research will end with the discovery of unusual traffic evidence using the Wireshark forensic analysis tool and Microsoft Network Monitor. The disclosure aims to be able to find the intruder's IP address from the Wireshark application and Microsoft Network Monitor, by analyzing evidence of network packets that have been prepared. Network traffic has been recorded directly using the Wireshrak tool, followed by validating the evidence between the Wireshark analysis tool and the Microsoft Network Monitor. The results of the virtual router network forensic analysis using the nist SP800-86 framework are true attacks, proven by the ARP protocol, that communication is lost between 192.168.10.5 as a client and 192.168.10.254 as a server as a result of continuous broadcast which is also proven in the ICMP protocol. Based on this research, the NIST framework uses a system that has been built with a virtual router object that analysts can use to detect cyber attacks consistently.
Data Security Analysis Using Virtual Ridgeback in Network Forensics
Journal of Secure And Knowledge-Intelligent Research in Cybersecurity And Multimedia Vol. 1 No. 2 (2023): Journal of SAKIRA (Secure And Knowledge-Intelligent Research in Cybersecurity A
Publisher : Computer Science Study Program, Faculty of Engineering, Universitas Islam Al-Azhar

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Recorded two hospitals in Jakarta were hit by cyberattacks which caused patient data in hospital computer networks to be inaccessible. Symantec is an American company that manufactures data security software, according to Symantec's report entitled Internet Security Threat Report Volume 24 which was released in February 2019 then, in 2018, as much as 2.23%, cyberattacks in the global arena occur in Indonesia, increasing from the previous year, namely 1.67%. Meanwhile, the figure also places Indonesia in fifth place as the country that has the most cyber threats in 2018. It can operate on physical networks or on virtual networks. The only requirement is that the Ridgeback installation has access to the layer 2 network layer. Ridgeback Network Defence makes resistance to intruders using interactive defences and causes intruders to spend unnecessary resources. Interactive Defence is an advanced disguise and fraud capability designed to ensnare intruders in several ways, namely by managing billions of feeds in the network that can trigger intruder responses, affect intruder behavior so that they are easier to detect, and block access to protected network services without revealing that service has been blocked. This research is expected to create a control center by adopting a Software Defined Network (SDN) so that it can capture intruders and get data about the attack, which can be used as evidence in the process of investigating network forensics quickly and precisely.
Implementation of Live Forensic Virtual Router for Network Traffic Comparison
Journal of Secure And Knowledge-Intelligent Research in Cybersecurity And Multimedia Vol. 1 No. 2 (2023): Journal of SAKIRA (Secure And Knowledge-Intelligent Research in Cybersecurity A
Publisher : Computer Science Study Program, Faculty of Engineering, Universitas Islam Al-Azhar

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

An entrepreneur or a service provider in the internet network world, will certainly find clients with different characters. Clients who are not technology blind, especially routers, sometimes want full access to the router, or some clients who ask to add a router to be able to directly access the router in full. Virtual Router allows clients to process their own network, as if the client has a router. Network forensics has the ability to reconstruct events using a system that stores all data traffic activities on the network, so that investigations can be carried out by looking back at events that have occurred and analyzing events that occurred in the past. Wireshark can review data packages in real time. This means that the wireshark application will monitor all incoming and outgoing data packets through a predefined interface and the next will display the results of the data package
Implementation of Virtual Routers for Network Simulation Purposes in Simulated Internet
Journal of Secure And Knowledge-Intelligent Research in Cybersecurity And Multimedia Vol. 1 No. 2 (2023): Journal of SAKIRA (Secure And Knowledge-Intelligent Research in Cybersecurity A
Publisher : Computer Science Study Program, Faculty of Engineering, Universitas Islam Al-Azhar

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This research aims to implement a virtual router as a network simulation solution in an artificial internet environment. Artificial internets have become important in developing and testing applications and network protocols without the need for expensive physical infrastructure. In this study, researchers used virtual router software to create a network environment that can be customized according to user needs. Researchers evaluated the performance of virtual routers in simulating various network scenarios, including reliability, scalability, and security testing. The methods used include installing and configuring virtual routers, as well as using network simulation tools to build complex topologies. Researchers also carried out performance measurements to evaluate the latency, throughput and stability of the virtual router. The research results show that the virtual router is able to simulate the network environment well, providing complete flexibility and control to the user. Although there are some limitations, such as high resource consumption in some configurations, the advantages in terms of efficiency and ease of use make virtual routers an attractive option for network simulation on artificial internet. This research is expected to contribute to the development of more effective and efficient network simulation environments, as well as assist researchers and developers in testing and developing network technology without having to rely on expensive physical infrastructure
Building Virtual Local Area Network (VLAN) for Self-Attendance Using Manageable Switch at Institut Sains & Teknologi Akprind Yogyakarta
Journal of Secure And Knowledge-Intelligent Research in Cybersecurity And Multimedia Vol. 1 No. 2 (2023): Journal of SAKIRA (Secure And Knowledge-Intelligent Research in Cybersecurity A
Publisher : Computer Science Study Program, Faculty of Engineering, Universitas Islam Al-Azhar

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Building a manageable network to support the implementation of Virtual Local Area Network (VLAN) in independent attendance for students and lecturers, which can avoid individuals entrusting attendance, is part of today's technological developments, so that it is hoped to produce an individual who is independent, intelligent and supported. with a high level of technological mastery. The AKPRIND Yogyakarta Institute of Science & Technology has implemented this technology on the main server, but the VLAN implementation is specifically designed for Presence Mandiri in the west and east buildings on campus 1. Each building is designed to have 2 broadcast domains and use 2 switches to be able to produce communications. data between buildings that have the same broadcast domain. The switch on the Presence Mandiri VLAN network at the AKPRIND Yogyakarta Institute of Science & Technology has 2 VLAN IDs with the configuration used being VLAN Trunking (VTP). The IP addressing provided is DHCP from each switch, which can divide the network on each available port. This VLAN configuration is all done using a network simulation tool, namely Cisco Packet Tracert 6.1.0 in ICMP testing, with the protocol used is Internet Protocol version 4 or IPv4

Page 1 of 1 | Total Record : 5