Implementation of Dynamic IP Blocking Techniques on the Tanungbalai City Library Website

Azrai Sirait, Muhammad Siddik

Abstract


Website Tanjungbalai Library, is one of the most visited by people to find the necessary information, not only that, the website is also a place where people exchange ideas and share knowledge. The Tanjungbalai library website server currently does not have security, of course this will have an impact on the security of the existing data on the website, therefore to prevent unwanted things such as theft or hacking of the Tanjungbalai library website here researchers will take advantage of the features contained in cloud-based cpanel software. So that the security of the library's website server will be maximized, at this time there are still many weaknesses and shortcomings found on the library website, later IP visitors who try to damage will be blocked only by utilizing features on cloud-based cpanel. Information that is less tested and accurate will certainly be very disturbing in the decision-making process and in making reports.


Keywords


Web Library; IP Blockers; Cloud Server

Full Text:

PDF

References


Arifin, Hasnul. 2011. Kitab Suci Jaringan Komputer dan Koneksi Internet. Yogyakarta. Mediakom.

Winarno, Edi, Ali Zaki dan SmitDev Community. 2010. Web Programming dengan Visual Basic 2010. Jakarta. PT. Elex Media Komputindo.

Madcoms. 2010. Sistem Jaringan Komputer untuk Pemula. Yogyakarta. Andi.

Iwan, Binanto, (2007), “Membangun Jaringan Komputer Praktis Sehari-hariâ€, Graha Ilmu, Candi Gebang Permai, Yogyakarta. Jason Weir, Snort 2.9.6.x on Debian 7.6, https://s3.amazonaws.com/snort- orgsite/production/document_files/files/000/000/04 9/

Cox, Kerry, 2004. Managing Security With Snort and IDS Tools. O’Reilly Media Inc. United States of America

Daranto, Michael. (2007). Fail2ban di Slackware v12.x | Slackerbox. Diambil 26 Februari 2017.

G. L. Anakotta and S. Adhy, “Perancangan dan Implementasi E Commerce Dengan Segmentasi Harga Menggunakan Metode Pengembangan Spiral (Studi Kasus: CV. Citra Mandiri …,†J. Masy. Inform., vol. 9, [Online]. Available: https://ejournal.undip.ac.id/index.php/jmasif/article/view/31520.

Alder, Raven. Snort 2.1 Intrusion Detection, Second Edition. Rockland, MA 02370: Syngress Publishing, Inc. 2004

Ardiyanto, Yudhi, 2010. System Instrusion Detection System. Sourcefire Inc. United States of America.

Ashari, Ahmad, dkk. 2010. Linux Sistem Administrasi. Bandung: Informatika.

Munawar. 2005. Pemodelan Visual dengan UML. Yogyakarta. Graha Ilmu.

Iwan, Binanto, (2007), “Membangun Jaringan Komputer Praktis Sehari-hariâ€, Graha Ilmu, Candi Gebang Permai, Yogyakarta. Jason Weir, Snort 2.9.6.x on Debian 7.6, https://s3.amazonaws.com/snort-orgsite/production/document_files/files/000/000/04 9/

Sommerville, Ian. (Alih bahasa: Yuhilza Hanum) 2003. Software Engineering (Rekayasa Perangkat Lunak). Jakarta. Erlangga. Edisi 6. Jilid 2.




DOI: https://doi.org/10.30865/ijics.v5i3.3452

Refbacks

  • There are currently no refbacks.


Copyright (c) 2021 Azrai Sirait, Muhammad Siddik

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.


The IJICS (International Journal of Informatics and Computer Science)
Published by Universitas Budi Darma.
Jl. Sisingamangaraja No.338 Simpang Limun, Medan, North Sumatera
Email: ijics.stmikbudidarma@gmail.com

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.