Analisa Delay Yang Terjadi Pada Penerapan Demilitarized Zone (DMZ) Terhadap Server Universitas Andalas

Syariful Ikhwan, Ikhwana Elfitri

Abstract


Network security is vital to a computer network. Weaknesses in computer networks if not maintained and protected will cause harm in the form of data loss, damage of system server, not optimal in serving the user or even the loss of valuable institutional assets. To maintaining the security of computer networks and servers, various methods were developed, including firewall DMZ (Demiliterized Zone). DMZ is a firewall method of grouping the servers so that the data traffic passing could be better regulated. The results of a study of the application of the method at the University of Andalas DMZ significantly reduce attacks on existing server systems. Application of the method of the DMZ at Andalas University shows the packet delay to the entry and exit of 0.1544 ms. This delay percentage increased by 126% from the previous delay.

Keywords: Network Security,Encryption, Server, Delay, DMZ

 

Abstrak

Keamanan jaringan sangat vital bagi sebuah jaringan komputer. Kelemahan-kelemahan yang terdapat pada jaringan komputer jika tidak dilindungi dan dijaga dengan baik akan menyebabkan kerugian berupa kehilangan data, kerusakan sistem server, tidak maksimal dalam melayani user atau bahkan kehilangan aset-aset berharga institusi. Dalam menjaga keamanan jaringan komputer dan server maka dikembangkanlah berbagai metoda perlindungan diantaranya firewall DMZ (Demiliterized Zone). DMZ adalah sebuah metoda firewall yang melakukan pengelompokan terhadap server-server sehingga lalu lintas data yang lewat bisa diatur dengan lebih baik. Hasil penelitian terhadap penerapan metoda DMZ di Universitas Andalas mengurangi secara signifikan serangan terhadap sistem server yang ada. Penerapan metoda DMZ di Universitas Andalas menunjukkan terjadinya delay terhadap paket yang keluar masuk sebesar 0,1544 ms. Persentase delay ini naik  sebesar 126% dari delay sebelumnya.

Kata Kunci: Keamanan Jaringan, Enkripsi, Server, Delay, DMZ


Full Text:

PDF

References


Will Schmid, Victor Cang, Robert J Shimonski, dkk, “Building DMZs for Enterprise Networks”, United States of America, 2003

Brij Bhooshan, Ramesh Chand Joshi, and Manoj Misra, “ANN Based Scheme to Predict Number of Zombies in a DDos Attack”, International Journal of Computer Science and Network Security, Vol.14, No.2, pp61-70,Maret 2012

I-Wei Chen, Po-Ching Lin, dkk, “Extracting Ambiguous Sessions from Real Traffic with Intrusion Prevention Systems”, International Journal of Computer Science and Network Security, Vol.14, No.5, pp243-250, Sept 2012

Miaomiao Tian, Wei Yang, and Liusheng Huang, “Security of a Biometric Identity-based Encryption Scheme”, International Journal of Computer Science and Network Security, Vol.14, No.6, pp362-365, Nov 2012

Kashif Munir and Sellapan Palaniappan, “Security Threats/Attcks Present in Cloud Environment”, International Journal of Computer Science and Network Security, Vol.12 No.12, December 2012

Hesham Abusaimeh and Mohammad Shkoukani,”Survey of Web Application and Internet Security Threats”, International Journal of Computer Science and Network Security, Vol.12 No.12, December 2012

Mehdi Jahanirad, Yahya Al-Nabhani, Rafidah Md.Noor,”Comprehensive Network Security Approach: Security Breaches at Retail company- A Case Study”, International Journal of Computer Science and Network Security, Vol.12 No.8, August 2012

N. Ahmed, Z.I.A. Khalib, R.B. Ahmad, Suhizaz Sudin, Salina Asi, Yacine Laalaoui,”Low-End Embedded Linux Platform for Network Security Application – Smurf Based Attack Detection”, International Journal of Computer Science and Network Security, Vol.8 No.11, November 2008

Nguyen Hieu Minh, Do Thi Bac and Ho Ngoc Duy,”New SDDO-Based Block Cipher for Wireless Sensor Network Security”, International Journal of Computer Science and Network Security, Vol.10 No.3, March 2010

Ramy K. Khalil, Fayez W. Zaki , Mohamed M. Ashour, and Mohamed A. Mohamed,”A Study of Network Security Systems”, International Journal of Computer Science and Network Security, Vol.10 No.6, June 2010

Michael Rash,”Linux Firewall : attack detection and response with iptables, psad, and fwsnort”,San Fransisco,2007

Ammar Yassir and Smitha Nayak,”Cybercrime: A threat to Network Security”, International Journal of Computer Science and Network Security, Vol.12 No.2, June 2012

Syedur Rahman, A.M Ahsan Feroz, Md. Kamruzzaman and Md Azimuddin Khan,”Online Identity Theft and Its Prevention Using Threshold Cryptography”, International Journal of Computer Science and Network Security, Vol.10 No.9, June 2010

http://www.snort.org/ diakses tanggal 7 Januari 2012. Jam 9.04 wib

http://www.tenable.com/products/nessus diakses tanggal 7 Januari 2012. Jam 9.05 wib

Addy Suyatno,“Aplikasi Model Sistem Keamanan Jaringan Berbasis De-Militarised Zone”, Volume 4 No. 1 Februari 2009

http://www.unand.ac.id/index.php/id/profil/sejarah diakses tanggal 23 Januari 2014.

Sardana, A, Joshi, RC,”Autonomous Dynamic Honeypot Routing Mechanism for Mitigating DDoS Attacks in DMZ”,16th IEEE International Conference on ,New Delhi,2008

https://www.iwebgate.com/service_dmz.html diakses tanggal 23 Januari 2014. Jam 12.12 Wib.

http://www.mikrotik.co.id diakses pada 23 Januari 2014 jam 21.52 Wib

Glen Nakamoto, Jeff Schwefler and Kenneth Palmer. " Desktop Demilitarized Zone", Military Communications Conference, 2012 - Milcom 2012, On page(s): 1487 - 1492

Sardana, A, Joshi, RC,”Autonomous Dynamic Honeypot Routing Mechanism for Mitigating DDoS Attacks in DMZ”,16th IEEE International Conference on ,New Delhi,2008




DOI: https://doi.org/10.25077/jnte.v3n2.75.2014

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.

 

  

.
Statistic and Traffic