Analisis Keamanan Jaringan LAN Terhadap Kerentanan Jaringan Ancaman DDoS Menggunakan Metode Penetration
DOI:
https://doi.org/10.30865/jurikom.v10i1.5835Keywords:
Network Security, Snort, Penetration Test, LAN NetworkAbstract
At this time, there are many crimes in the internet world that cause the need for surveillance and detection of network security so that it can be anticipated quickly. The purpose of this study is to provide an analysis of the detection of network attacks located on the LAN network of the Institution's Campus . So that detection such as snort applications are needed  that can detect a network attack focused on TCP, UDP, and HTTP, in order to detect instructions from the process of  monitoring events that  occur in  a computer system or network and  analyzing the possibility of an incident can recognize data packets that pass by and generate alerts according to pre-made rules. In this study using  the penetration test  method which is a method that aims to test the system or network security directly located and activities to evaluate the security of a computer network system. This method can also be called pentest and is usually done by pentesters at the University Institution. In this study, the use of  snort can run well, because snort  can detect and send alerts to administrators through applications that will be used as simulations are Drak Fantasy, Loic  and Wirshak and every networkÂ
References
A. Prayoga Hutabarat and Haeruddin, “Analisa Dan Perancangan Keamanan Jaringan End User Dari Serangan Exploit Menggunakan Metode Penetration,†J. Inf. Syst. Technol., vol. 01, no. 02, pp. 31–36, 2020.
R. I. Lestari, V. Suryani, and A. A. Wardana, “Implementasi Pengamanan Pada Jaringan LoRaWAN Untuk Mengatasi Serangan Sniffing Dengan Menggunakan Metode Digital Signature,†eProceedings …, vol. 7, no. 2, pp. 7983–7994, 2020, [Online]. Available: https://openlibrarypublications.telkomuniversity.ac.id/index.php/engineering/article/view/13079
A. G. Gani, “Cybercrime (Kejahatan Berbasis Komputer),†J. Sist. Inf. Univ. Suryadarma, vol. 5, no. 1, pp. 16–29, 2020, doi: 10.35968/jsi.v5i1.18.
H. Haeruddin, “Analisa dan Implementasi Sistem Keamanan Router Mikrotik dari Serangan Winbox Exploitation, Brute-Force, DoS,†J. Media Inform. Budidarma, vol. 5, no. 3, p. 848, 2021, doi: 10.30865/mib.v5i3.2979.
D. Stanley and J. Wright, “Wireless Local Area Network Security,†Emerg. Technol. Wirel. LANs Theory, Des. Deploy., vol. 9780521895, no. 1, pp. 145–178, 2007, doi: 10.1017/CBO9780511611421.010.
D. Satria, A. Alanda, A. Erianda, and D. Prayama, “Network security assessment using internal network penetration testing methodology,†Int. J. Informatics Vis., vol. 2, no. 4–2, pp. 360–365, 2018, doi: 10.30630/joiv.2.4-2.190.
H. Alamsyah, R. -, and A. Al Akbar, “Analisa Keamanan Jaringan Menggunakan Network Intrusion Detection and Prevention System,†JOINTECS (Journal Inf. Technol. Comput. Sci., vol. 5, no. 1, p. 17, 2020, doi: 10.31328/jointecs.v5i1.1240.
R. Fadhil and J. . Sidabutar, “Analisis Rules Intrusion Detection Prevention System ( IDPS ) Suricata untuk Mendeteksi dan,†vol. 8, no. 2, pp. 348–355, 2022.
Husni, “Serangan ARP dan DHCP pada IPv4 dan IPv6,†J. Edukasi Dan Penelit. Inform., vol. 1(23507026), no. 3, pp. 1–24, 2014.
R. Rinaldi and M. Sadikin, “Analisa dan Pengujian Serangan Evil Twin pada Jaringan berbasis Wireless dengan Keamanan WPA2-PSK,†Ph. D. diss., no. September, 2019, [Online]. Available: https://www.researchgate.net/profile/Roy-Renaldi/publication/335929306_Analisa_dan_Pengujian_Serangan_Evil_Twin_pada_Jaringan_berbasis_Wireless_dengan_Keamanan_WPA2-PSK/links/5d84c06a92851ceb791dee47/Analisa-dan-Pengujian-Serangan-Evil-Twin-pada-Jaringan-
P. D. I. Torino, “Master Degree Thesis Exploiting virtual network for CPS security analysis,†2022.
Q. Alghifari, “Analisa Keamanan Jaringan Wlan Dengan Metode Penetration Testing Di Pt . Indonesia Power Pltu Jabar 2 Palabuhanratu Omu,†2021.
I. F. B. Andoro, H. Agung Budijanto, and M. Aidjili, “Analisa Keamanan Jaringan Dengan Mikrotik,†RISTEK J. Riset, Inov. dan Teknol. Kabupaten Batang, vol. 6, no. 2, pp. 35–39, 2022, doi: 10.55686/ristek.v6i2.111.
F. Fachri, A. Fadlil, and I. Riadi, “Analisis Keamanan Webserver menggunakan Penetration Test,†J. Inform., vol. 8, no. 2, pp. 183–190, 2021, doi: 10.31294/ji.v8i2.10854.
M. O’Leary, “Snort,†in Cyber Operations, no. 4, 2019, pp. 947–982. doi: 10.1007/978-1-4842-4294-0_19.
A. Novenzo Ihsana and A. Maslan, “Analisis Keamanan Jaringan Dari Serangan Paket Data Sniffing Di Pt Raden Syaid Kantor Pos Piayu Kota Batam,†J. Comasie, vol. 05, 2020, [Online]. Available: https://ejournal.upbatam.ac.id/index.php/comasiejournal/article/view/2260/1555
I. Muakhori, Sunardi, and A. Fadlil, “Security of Dynamic Domain Name System Servers Against DDOS Attacks Using Iptable and Fail2ba,†J. Mantik, vol. 4, no. 1, pp. 41–49, 2020.
N. L. A. Sonia Ginasari, kadek Suar Wibawa, and N. K. Ayu Wirdiani, “Pengujian Stress Testing API Sistem Pelayanan dengan Apache JMeter,†J. Ilm. Teknol. dan Komput., vol. 2, no. 2, p. 2, 2021.
C. WICAKSONO, “BAB II tentang topologi stars,†2019.
D. Sandova and C. Prihantoro, “Analisis Traffic pada Jaringan LAN Menggunakan MikroTik,†JSAI (Journal Sci. Appl. Informatics), vol. 4, no. 3, pp. 329–337, 2021, doi: 10.36085/jsai.v4i3.2011.



