Analisa Delay Yang Terjadi Pada Penerapan Demilitarized Zone (DMZ) Terhadap Server Universitas Andalas

Main Article Content

Syariful Ikhwan
Ikhwana Elfitri

Keywords

Abstract

Network security is vital to a computer network. Weaknesses in computer networks if not maintained and protected will cause harm in the form of data loss, damage of system server, not optimal in serving the user or even the loss of valuable institutional assets. To maintaining the security of computer networks and servers, various methods were developed, including firewall DMZ (Demiliterized Zone). DMZ is a firewall method of grouping the servers so that the data traffic passing could be better regulated. The results of a study of the application of the method at the University of Andalas DMZ significantly reduce attacks on existing server systems. Application of the method of the DMZ at Andalas University shows the packet delay to the entry and exit of 0.1544 ms. This delay percentage increased by 126% from the previous delay.

Keywords: Network Security,Encryption, Server, Delay, DMZ

 

Abstrak

Keamanan jaringan sangat vital bagi sebuah jaringan komputer. Kelemahan-kelemahan yang terdapat pada jaringan komputer jika tidak dilindungi dan dijaga dengan baik akan menyebabkan kerugian berupa kehilangan data, kerusakan sistem server, tidak maksimal dalam melayani user atau bahkan kehilangan aset-aset berharga institusi. Dalam menjaga keamanan jaringan komputer dan server maka dikembangkanlah berbagai metoda perlindungan diantaranya firewall DMZ (Demiliterized Zone). DMZ adalah sebuah metoda firewall yang melakukan pengelompokan terhadap server-server sehingga lalu lintas data yang lewat bisa diatur dengan lebih baik. Hasil penelitian terhadap penerapan metoda DMZ di Universitas Andalas mengurangi secara signifikan serangan terhadap sistem server yang ada. Penerapan metoda DMZ di Universitas Andalas menunjukkan terjadinya delay terhadap paket yang keluar masuk sebesar 0,1544 ms. Persentase delay ini naik  sebesar 126% dari delay sebelumnya.

Kata Kunci: Keamanan Jaringan, Enkripsi, Server, Delay, DMZ

References

[1] Will Schmid, Victor Cang, Robert J Shimonski, dkk, “Building DMZs for Enterprise Networks”, United States of America, 2003
[2] Brij Bhooshan, Ramesh Chand Joshi, and Manoj Misra, “ANN Based Scheme to Predict Number of Zombies in a DDos Attack”, International Journal of Computer Science and Network Security, Vol.14, No.2, pp61-70,Maret 2012
[3] I-Wei Chen, Po-Ching Lin, dkk, “Extracting Ambiguous Sessions from Real Traffic with Intrusion Prevention Systems”, International Journal of Computer Science and Network Security, Vol.14, No.5, pp243-250, Sept 2012
[4] Miaomiao Tian, Wei Yang, and Liusheng Huang, “Security of a Biometric Identity-based Encryption Scheme”, International Journal of Computer Science and Network Security, Vol.14, No.6, pp362-365, Nov 2012
[5] Kashif Munir and Sellapan Palaniappan, “Security Threats/Attcks Present in Cloud Environment”, International Journal of Computer Science and Network Security, Vol.12 No.12, December 2012
[6] Hesham Abusaimeh and Mohammad Shkoukani,”Survey of Web Application and Internet Security Threats”, International Journal of Computer Science and Network Security, Vol.12 No.12, December 2012
[7] Mehdi Jahanirad, Yahya Al-Nabhani, Rafidah Md.Noor,”Comprehensive Network Security Approach: Security Breaches at Retail company- A Case Study”, International Journal of Computer Science and Network Security, Vol.12 No.8, August 2012
[8] N. Ahmed, Z.I.A. Khalib, R.B. Ahmad, Suhizaz Sudin, Salina Asi, Yacine Laalaoui,”Low-End Embedded Linux Platform for Network Security Application – Smurf Based Attack Detection”, International Journal of Computer Science and Network Security, Vol.8 No.11, November 2008
[9] Nguyen Hieu Minh, Do Thi Bac and Ho Ngoc Duy,”New SDDO-Based Block Cipher for Wireless Sensor Network Security”, International Journal of Computer Science and Network Security, Vol.10 No.3, March 2010
[10] Ramy K. Khalil, Fayez W. Zaki , Mohamed M. Ashour, and Mohamed A. Mohamed,”A Study of Network Security Systems”, International Journal of Computer Science and Network Security, Vol.10 No.6, June 2010
[11] Michael Rash,”Linux Firewall : attack detection and response with iptables, psad, and fwsnort”,San Fransisco,2007
[12] Ammar Yassir and Smitha Nayak,”Cybercrime: A threat to Network Security”, International Journal of Computer Science and Network Security, Vol.12 No.2, June 2012
[13] Syedur Rahman, A.M Ahsan Feroz, Md. Kamruzzaman and Md Azimuddin Khan,”Online Identity Theft and Its Prevention Using Threshold Cryptography”, International Journal of Computer Science and Network Security, Vol.10 No.9, June 2010
[14] http://www.snort.org/ diakses tanggal 7 Januari 2012. Jam 9.04 wib
[15] http://www.tenable.com/products/nessus diakses tanggal 7 Januari 2012. Jam 9.05 wib
[16] Addy Suyatno,“Aplikasi Model Sistem Keamanan Jaringan Berbasis De-Militarised Zone”, Volume 4 No. 1 Februari 2009
[17] http://www.unand.ac.id/index.php/id/profil/sejarah diakses tanggal 23 Januari 2014.
[18] Sardana, A, Joshi, RC,”Autonomous Dynamic Honeypot Routing Mechanism for Mitigating DDoS Attacks in DMZ”,16th IEEE International Conference on ,New Delhi,2008
[19] https://www.iwebgate.com/service_dmz.html diakses tanggal 23 Januari 2014. Jam 12.12 Wib.
[20] http://www.mikrotik.co.id diakses pada 23 Januari 2014 jam 21.52 Wib
[21] Glen Nakamoto, Jeff Schwefler and Kenneth Palmer. " Desktop Demilitarized Zone", Military Communications Conference, 2012 - Milcom 2012, On page(s): 1487 - 1492
[22] Sardana, A, Joshi, RC,”Autonomous Dynamic Honeypot Routing Mechanism for Mitigating DDoS Attacks in DMZ”,16th IEEE International Conference on ,New Delhi,2008