APLIKASI MANAJEMEN DAN MONITORING UNTUK KEAMANAN PADA JARINGAN HOTSPOT

  • Sadam Husen STMIK Bumigora Mataram
  • Raisul Azhar STMIK Bumigora Mataram
Keywords: hotspot, bruteforce, port scanner, spoofng, security, networking

Abstract

STMIK Bumigora has fve internet hotspot access point which can be used by students. Fifth hotspot wireless access point includes faculty, labs, students, faculty and for management purposes. The use of wireless networks for internet access led to the illegal activities that can not be monitored by the network administrator. Activity is mainly on the use of the router that serves as a proxy router connected directly to the ISP (Internet Service Provider). Illegal activities are often done by the students is trying to log into any network devices using bruteforce method. Techniques used include using remote access such as ssh, telnet and ftp. In addition, the activity of port scanning is often performed by the students to observe the security gaps that are still weak in a hotspot, especially at the port still open on the network. To overcome this problem, researchers built an application that is capable of managing and monitoring security hotspots making it easier for network administrators to take action against such illegal activities. Research method used is SDLC, in which the system is intended to develop a system that has existed previously in PUSTIK STMIK Bumigora Mataram

Downloads

Download data is not yet available.

References

[1]. Lilis. (2013, july 22). Weblog Tips & Tutorial Internet Gratis by Neng Lilis. Retrieved from Pengertian Brute-Force Attack: http://www.potter.web.id/pengertian-brute-force-attack/
[2] Arrifen, A. K. (2011, Oktober 24). Port Scanning. Retrieved from Deteksi PortScanning:http://akuarika.blogspot.com/2011/10/deteksi-port-scanning. html
[3] Pressman, R. S. (2010). Sofware Enginering : A Practitioner’s Approach. University Level : Person Accociates, Inc
[4]. Booch, G., Maksimchuk, R. A., Engle, M. W., Young, B. J., Conallen, J., & Houston, K. A. (2007). Object-Oriented Analysis and Design with Applications Third Edition. United State of America: Pearson Education, Inc.
Published
2016-05-24
How to Cite
Husen, S., & Azhar, R. (2016). APLIKASI MANAJEMEN DAN MONITORING UNTUK KEAMANAN PADA JARINGAN HOTSPOT. MATRIK : Jurnal Manajemen, Teknik Informatika Dan Rekayasa Komputer, 15(2), 33-38. https://doi.org/https://doi.org/10.30812/matrik.v15i2.36
Section
Articles