Claim Missing Document
Check
Articles

Found 3 Documents
Search
Journal : Prosiding Snastikom

PEMANFAATAN FITUR CACTI BERBASIS TELEGRAM MESSENGER UNTUK NOTIFIKASI GANGGUAN JARINGAN DI PT. TELKOM AKSES MEDAN Prida Apriani; Tengku Mohd Diansyah syah; Risko Liza
SEMINAR NASIONAL TEKNOLOGI INFORMASI & KOMUNIKASI Vol. 1 No. 1 (2020): PROSIDING SNASTIKOM 2020
Publisher : Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (520.201 KB)

Abstract

Network monitoring helps to monitor and understand network problems that are happening so it can be handled as quickly as possible. CACTI is a network monitoring tools that monitors the network status when the network is up and down based on ping method and give a warning if a problem occurs in the network with an email form. However, the email function on CACTI has never been used by the engineer of PT Telkom Akses Medan due to the media coordination and communication that is being used on daily basic is Telegram Messenger. We need to install and analyze CACTI, designing the integration process of Telegram Messenger and handling fo notify network problems based on the operational area, to implement it with PHP and MySQL programs language by testing it with an exist device network. This final project create a CACTI function that able to notify a network problem through a notification from Telegram Messenger about the problem that occurs on the network with a dominance to deliver automatically and choosing each of the dynamic operational area.
Simulasi Pengamanan Virtual Server Menggunakan Dionaea Honeypot Dan Tunneling Sebagai Proses Pengamanan Komunikasi Data Nauval Alfarizi; Tengku Mohd Diansyah; Risko Liza
SNASTIKOM Vol. 1 No. 01 (2022): SEMINAR NASIONAL TEKNOLOGI INFORMASI & KOMUNIKASI (SNASTIKOM) 2022
Publisher : Unit Pengelola Jurnal Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (469.632 KB)

Abstract

Cybercrime is carried out to obtain information, where the information obtained is used as a source of data in carrying out an attack. Attacks generally lead to various scopes ranging from physical servers to virtual servers. This research was conducted by the author to be able to carry out the implementation process based on qualitative development of existing technology, namely the design of a virtual server system using Dionaea honeypot and PPTP tunneling in carrying out a form of security for data communication that can cover vulnerabilities to a device on a virtual server. The results of the research that the author conducted showed that there was a difference in each attack test. When an attack attempt is carried out into each port that is not configured on the main service on the virtual server, the results of the attack are that it can detect intruders and vice versa
Analisis Pemanfaatan Teknik Serangan DDOS pada Mikrotik Cloud dan Melakukan upaya penangannya Syahendra Surya; Tengku Mohd Diansyah; Risko liza
SNASTIKOM Vol. 2 No. 1 (2023): SEMINAR NASIONAL TEKNOLOGI INFORMASI & KOMUNIKASI (SNASTIKOM) 2023
Publisher : Unit Pengelola Jurnal Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (220.192 KB)

Abstract

Internet services have many benefits and are widely used, but also have disadvantages that can be utilized by hackers to carry out attacks such as DDoS. One solution to manage and control internet networks is to use MikroTik CHR (Cloud Hosted Router), a virtual router solution provided by MikroTik. CHR is designed to run on various virtualization platforms such as VMware, VirtualBox, Hyper-V, and Clouds such as Amazon Web Services, Google Cloud Platform, and Microsoft Azure.This research aims to analyze DDoS attack techniques used and implemented on the MikroTik CHR platform and the security effort strategies that can be used to protect MikroTik CHR from DDoS attacks that can cause service disruptions and financial losses and their handling. This research only focuses on DDoS attacks on MikroTik CHR and security strategies that can protect it from attacks. The results show that some effective security strategies include configuring firewalls, enabling protection features, and performing regular monitoring and software updates. In conclusion, the MikroTik CHR can be protected from DDoS attacks with proper security strategies, and it is necessary to pay attention to strict security monitoring, software updates, and an integrated and comprehensive security strategy to protect the MikroTik CHR from DDoS attacks.