Implementasi Kemanan Jaringan LAN Berbasis ACLS dan VLAN
DOI:
https://doi.org/10.32736/sisfokom.v7i2.568Keywords:
Pemantauan Jaringan Komputer, Statistik Port, Local Area Network, Mandau Registry Tools and Information SystemAbstract
Manajemen jaringan di era jaringan komputer modern adalah hal yang sangat penting karena setiap perangkat dapat berkoneksi dengan perangkat lain yang berada di seluruh dunia melalui kecanggihan teknologi internet. Tentu saja dengan kemajuan ini membutuhkan suatu sistem pemantauan jaringan komputer yang membantu administrator jaringan dalam mengelola Local Area Network (LAN). Permasalahan yang sering timbul adalah kesulitan untuk mengetahui status open port disaat terjadi permasalahan ataupun serangan di dalam jaringan karena jumlah port jaringan mencapai 65.536, sehingga membutuhkan waktu yang lebih lama untuk melakukan perbaikan jaringan. Selain itu kebutuhan akan suatu sistem terintegrasi dalam pemantauan proses serta statistik port dalam Local Area Network (LAN) menjadi landasan dalam penelitian ini sehingga dapat meminimalisasi penggunaan sistem yang terlalu banyak dalam pemantauan jaringan komputer. Hasil dari penelitian ini adalah suatu sistem baru hasil modifikasi dari Mandau Registry Tools and Information System dengan menambahkan layanan seperti informasi protokol, statistik port, dan informasi tentang Domain Name System (DNS). Menggunakan tahapan perencanaan, analisis, desain, implementasi, dan pengujian sebagai metode pengembangan sistem, diharapkan penelitian ini dapat membantu pemantauan Local Area Network (LAN) yang lebih baik dengan kompleksitas informasi proses jaringan dan statistik port yang dihasilkan.References
R. Weaver, “Identifying Anomalous Port-Spesific Network Behavior”, Pennsylvania: Carnegie Mellon University, 2010.
S. M. Musa, J. Shepard, and C. M. Akujuobi, “Nonconventional Network Security Measures for Intrusion Detection”, International Journal of Advances in Scientific Research and Engineering (IJASRE), vol. 3, no. 9, 48, 2017.
M. J. A. Arshad, A. Iqbal, A. Farooq, M. U. G. Khan, M. Afzal, A. Wajid, and A. Nasir, “A Study of Internet Threats, Avoidance, and Biometric Security Techniques-Comparison of Biometric Techniques”, Lahore: Journal of Faculty of Engineering & Technology (JFET), vol. 21, no. 2, 135, 2014.
N. El-Nazeer and K. Daimi, “Evaluation of Network Port Scanning Tools”, Journal of Department of Mathematics, Computer Science, and Software Engineering University of Detroit Mercy.
T. A. Ahanger, “Port Scan - A Sequrity Concern”, International Journal of Engineering and Innovative Technology (IJEIT), vol. 3, no. 10, 241, 2014.
R. Kaur and G. Singh, “Analysing Port Scanning Tools and Security Techniques”, International Journal of Electrical Electronics & Computer Sciense Engineering (IJEECSE), vol 1, issue 5, 58, 2014.
J. Biswas and Ashutosh, “An Insight in to Network Traffic Analysis using Packet Sniffer”, International Journal of Computer Applications (IJCA), vol. 94, no. 11, 2014.
A. Rahman, K. R. Kawshik, A. A. Sourav, and A. Gaji, “Advanced Network Scanning”, American Journal of Engineering Research (AJER), vol. 5, issue. 6, 2016.
T. A. Ahanger, “Port Scan-A Security Concern”, International Journal of Engineering and Innovative Technology (IJEIT), vol. 3, issue. 10, 2014.
W. Wang, X. Zhang, W. Shi, S. Lian, and D. Feng, “Network Traffic Monitoring, Analysis and Anomaly Detection”, IEEE Network, Guest Editorial, May/June 2011.
P. Aar and A. K. Sharma, “Analysis of Penetration Testing Tools”, International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE), vol. 7, issue 9, 36, 2017.
E. D. Kolaczyk, “Statistical Analysis of Network Data”, New York : Springer Series in Statistics, 2009.
E. Zam,, “Buku Sakti Hacker”. Jakarta : MediaKita, 2011.
PlanetSourceCode, “Update: Mandau (Registry Tools and Information System Include Netstat)”, [Online], Available : http://www.planet-source-code.com/vb/scripts/ShowCode.asp?txtCodeId=5249&lngWId=10, [accessed on August 30, 2017].
M. D. Gall, J. P. Gall, and W. R. Borg, “Educational Research”, Boston: Pearson Education, Inc., 2003.
R. Khan, S. U. Khan, R. Zaheer, and M. I. Babar, “An Efficient Network Monitoring and Management System”, International Journal of Information and Electronic Engineering (IJIEE), 3, p. 122, 2013.
C. Nimodia and S. Asole, “A Survey on Network Monitoring and Administration Using Email and Android Phone”, International Journal of Emerging Technology and Advanced Engineering (IJETAE), vol. 3, no. 4, p. 2250-2459, 2013.
F. W. Christanto and M. S. Suprayogi, “Enhancement Network Monitoring System Functionallity by Implementing an Android-based Notification System to Monitor Virtual Servers on Cloud Computing Network”, International Journal of Applied Information Technology (IJAIT), vol. 02, no. 01, 7, 2018.
Downloads
Published
Issue
Section
License
The copyright of the article that accepted for publication shall be assigned to Jurnal Sisfokom (Sistem Informasi dan Komputer) and LPPM ISB Atma Luhur as the publisher of the journal. Copyright includes the right to reproduce and deliver the article in all form and media, including reprints, photographs, microfilms, and any other similar reproductions, as well as translations.
Jurnal Sisfokom (Sistem Informasi dan Komputer), LPPM ISB Atma Luhur, and the Editors make every effort to ensure that no wrong or misleading data, opinions or statements be published in the journal. In any way, the contents of the articles and advertisements published in Jurnal Sisfokom (Sistem Informasi dan Komputer) are the sole and exclusive responsibility of their respective authors.
Jurnal Sisfokom (Sistem Informasi dan Komputer) has full publishing rights to the published articles. Authors are allowed to distribute articles that have been published by sharing the link or DOI of the article. Authors are allowed to use their articles for legal purposes deemed necessary without the written permission of the journal with the initial publication notification from the Jurnal Sisfokom (Sistem Informasi dan Komputer).
The Copyright Transfer Form can be downloaded [Copyright Transfer Form Jurnal Sisfokom (Sistem Informasi dan Komputer).
This agreement is to be signed by at least one of the authors who have obtained the assent of the co-author(s). After submission of this agreement signed by the corresponding author, changes of authorship or in the order of the authors listed will not be accepted. The copyright form should be signed originally, and send it to the Editorial in the form of scanned document to sisfokom@atmaluhur.ac.id.