Muh. Yamin
Universitas Halu Oleo

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

ANALISIS PERBANDINGAN PERFORMA QOS, PPTP, L2TP, SSTP DAN IPSEC PADA JARINGAN VPN MENGGUNAKAN MIKROTIK Wa Ode Zamalia; LM. Fid Aksara; Muh. Yamin
semanTIK Vol 4, No 2 (2018): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (512.307 KB) | DOI: 10.55679/semantik.v4i2.4338

Abstract

Tunnel PPTP, L2TP, SSTP, and IPsec are VPN types that have been widely supported by network protocols to apply to many computer network devices. These four methods are applied alternately on Mikrotik. In each applied method, will be analyzed using Wireshark application, with Quality of Service (QoS) parameters consisting of Packet Loss, Delay, and Throughput. Tests performed on four clients which connected to the access point. Testing is done with two kinds of networks, the first one in which all client access web for download purpose and the second one in which all client access web for streaming video. The security testing result between PPTP tunnels, L2TP, SSTP, and IPSec shows that security level built by IPsec tunnels better than the L2TP, SSTP, and PPTP tunnels. Moreover, based on the results of testing on performance, security and test findings obtained that IPsec VPN tunnel better than tunnel VPN PPTP L2TP and SSTP.Keywords— Layer 2 Tunneling Protocol, Point to Point Tunneling Protocol, Quality of Service (QoS), Secure Socket Tunneling Protocol, Virtual Private Network DOI: 10.5281/zenodo.1444898
SISTEM MONITORING SERANGAN JARINGAN KOMPUTER BERBASIS WEB SERVICE MENGGUNAKAN HONEYPOT SEBAGAI INTRUSION PREVENTION SYSTEM Inda Sari; Muh. Yamin; LM Fid Aksara
semanTIK Vol 5, No 1 (2019): semanTIK
Publisher : Informatics Engineering Department of Halu Oleo University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1271.423 KB) | DOI: 10.55679/semantik.v5i1.5330

Abstract

Security is very important especially to maintain the integrity of data for internet service users. There are many ways to infiltrate computer networks, starting from just experimenting to trying to damage and steal important information on the server. One way to overcome this problem is by the existence of an attack prevention system or commonly referred to as the Intrusion Prevention System (IPS) so that an attack can not directly touch the data or files that others should not know.Honeypot is a system that is deliberately sacrificed in order to be attacked to obtain information from the activities of the attacker and to know the methods used in attacking a system. The results of attacks on the system can be displayed in a monitoring system and can also be displayed through a web service. The results obtained from this study that the creation of a web service -based computer network attack monitoring system uses a honeypot as an IPS successfully implemented. Attacks that enter through TCP ports are 33.96%, UDP 33.96%, and ICMP 32.07%.Keywords— Honeypot, Web Service, Intrusion Prevention System DOI : 10.5281/zenodo.2651714