APLIKASI MANAJEMEN DAN MONITORING UNTUK KEAMANAN PADA JARINGAN HOTSPOT
DOI:
https://doi.org/10.30812/matrik.v15i2.36Keywords:
hotspot, bruteforce, port scanner, spoofng, security, networkingAbstract
STMIK Bumigora has fve internet hotspot access point which can be used by students. Fifth hotspot wireless access point includes faculty, labs, students, faculty and for management purposes. The use of wireless networks for internet access led to the illegal activities that can not be monitored by the network administrator. Activity is mainly on the use of the router that serves as a proxy router connected directly to the ISP (Internet Service Provider). Illegal activities are often done by the students is trying to log into any network devices using bruteforce method. Techniques used include using remote access such as ssh, telnet and ftp. In addition, the activity of port scanning is often performed by the students to observe the security gaps that are still weak in a hotspot, especially at the port still open on the network. To overcome this problem, researchers built an application that is capable of managing and monitoring security hotspots making it easier for network administrators to take action against such illegal activities. Research method used is SDLC, in which the system is intended to develop a system that has existed previously in PUSTIK STMIK Bumigora Mataram
Downloads
References
[2] Arrifen, A. K. (2011, Oktober 24). Port Scanning. Retrieved from Deteksi PortScanning:http://akuarika.blogspot.com/2011/10/deteksi-port-scanning. html
[3] Pressman, R. S. (2010). Sofware Enginering : A Practitioner’s Approach. University Level : Person Accociates, Inc
[4]. Booch, G., Maksimchuk, R. A., Engle, M. W., Young, B. J., Conallen, J., & Houston, K. A. (2007). Object-Oriented Analysis and Design with Applications Third Edition. United State of America: Pearson Education, Inc.
Downloads
Published
Issue
Section
How to Cite
Similar Articles
- Wire Bagye, Maulana Ashari, Mohammad Taufan Asri Zaen, Prototipe Alat Kirim Pesan Singkat Tindak Kejahatan sebagai Solusi Peningkatan Keamanan Berbasis Lokasi , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 19 No. 1 (2019)
- Lilik Widyawati, Imam Riadi, Yudi Prayudi, Comparative Analysis of Image Steganography using SLT, DCT and SLT-DCT Algorithm , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 20 No. 1 (2020)
- Magdalena Ariance Ineke Pakereng, Alz Danny Wowor, Yos Richard Beeh, Felix David, Erwien Christianto, Vincent Exelcio Susanto, Claudio Canavaro, Square Transposition Method with Adaptive Key Flexibility and Strong Diffusion Performance , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 24 No. 3 (2025)
- Mala Rosa Aprillya, Uswatun Chasanah, GIS Flood Prone Agricultural Land East Java Using Multi-Method Attribute Utility Theory , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 22 No. 1 (2022)
- Rizky Afrinanda, Lusiana Efrizoni, Wirta Agustin, Rahmiati Rahmiati, Hybrid Model for Sentiment Analysis of Bitcoin Prices using Deep Learning Algorithm , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 22 No. 2 (2023)
- Dedi Setiadi, Yogi Isro Mukti, Electronic Tourism Using Decision Support Systems to Optimize the Trips , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 23 No. 1 (2023)
- Erna Daniati, Sucipto Sucipto, Anita Sari Wardani, Akmal Hisyam Pradhana, Usability Test on the System Determination Decision Support ReleaseProduct Towards Contribution Level Decision Maker , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 24 No. 3 (2025)
- Annisa’ul Mubarokah, Rita Ambarwati, Dedy Dedy, Mashhura Toirхonovna Alimova, Unsafe Conditions Identification Using Social Networks in Power Plant Safety Reports , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 23 No. 2 (2024)
- Irma Binti Sya'idah, Sugiyarto Surono, Goh Khang Wen, DynamicWeighted Particle Swarm Optimization - Support Vector Machine Optimization in Recursive Feature Elimination Feature Selection , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 23 No. 3 (2024)
- Budi Sumanto, Salima Nurrahma, Comparison of Random Forest Support Vector Machine and Passive Aggressive Models on E-nose-Based Aromatic Rice Classification , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 24 No. 3 (2025)
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Anthony Anggrawan, Raisul Azhar, Bambang Krismono Triwijoyo, Mayadi Mayadi, Developing Application in Anticipating DDoS Attacks on Server Computer Machines , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 20 No. 2 (2021)
- Dadang Priyanto, Raisul Azhar, SISTEM APLIKASI UNTUK KEAMANAN DATA DENGAN ALGORITMA 'DES' (Data Encryption Standard) , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 16 No. 1 (2016)
- Raisul Azhar, ANALISA PERBANDINGAN PENERAPAN PBR DAN NON PBR PADA PROTOCOL OSPF UNTUK KONEKSI INTERNET , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 15 No. 1 (2015)
- Raisul Azhar, Kurniawan Kurniawan, APLIKASI KEAMANAN SMS MENGGUNAKAN ALGORITMA RIJNDAEL , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 16 No. 1 (2016)