Network Integration and Security Using IDS and Tunneling Methods
ARTIKEL
Oleh : Edy Nasri, Raden Kania, TsauriTahun : 2020
Abstrak
Abstract
Security on computer networks is very important to be monitored so that network traffic runs well because a good network architecture can support existing business processes to carry out their duties and responsibilities In a network system a good security is needed so that it can support the company's business processes. The research location is in PT ABC where there are often difficulties in accessing information due to network disruption, the implementation of network security is still weak and risky to attacks, there is no network monitoring system to monitor traffic based on these problems, it is necessary to design a network integration system with using EoIP and IPsec tunneling methods, implementing IDS (Intrusion Detection System) in network security with snort and establishing a network monitoring system with The Dude. Methods of data collection using literature studies, field analysis and conducting interviews with relevant parties. The development method system uses NDLC (Network Development Life Cycle). The results of the study it was concluded that the application of IDS and Tunneling network security integration systems can overcome the problems that occur so that business processes can run well.
Keywords: computer network, IDS, tunneling
Security on computer networks is very important to be monitored so that network traffic runs well because a good network architecture can support existing business processes to carry out their duties and responsibilities In a network system a good security is needed so that it can support the company's business processes. The research location is in PT ABC where there are often difficulties in accessing information due to network disruption, the implementation of network security is still weak and risky to attacks, there is no network monitoring system to monitor traffic based on these problems, it is necessary to design a network integration system with using EoIP and IPsec tunneling methods, implementing IDS (Intrusion Detection System) in network security with snort and establishing a network monitoring system with The Dude. Methods of data collection using literature studies, field analysis and conducting interviews with relevant parties. The development method system uses NDLC (Network Development Life Cycle). The results of the study it was concluded that the application of IDS and Tunneling network security integration systems can overcome the problems that occur so that business processes can run well.
Keywords: computer network, IDS, tunneling
Deskripsi
Penerbit
: UNIVERSITAS BANTEN JAYA
Bahasa
: ENGLISH
Cakupan
: Repository
Sumber
: UNIVERSITAS BANTEN JAYA