Claim Missing Document
Check
Articles

Found 2 Documents
Search

Strategi Disaster Recovery dengan Virtualisasi: Backup dan Restore Sistem Operasi di Vmware dengan Menggunakan Snapshot Rakhmadi Rahman; Anugrah Dwi Ansarna; Eka Tanduklangi
JURNAL PENELITIAN SISTEM INFORMASI (JPSI) Vol. 2 No. 2 (2024): MEI : JURNAL PENELITIAN SISTEM INFORMASI
Publisher : Institut Teknologi dan Bisnis (ITB) Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.54066/jpsi.v2i2.2197

Abstract

A Disaster Recovery Plan (DRP) is a structured approach that describes how an organization can carry out its operations after an unplanned incident that can result in system failure. Creating strong system resilience requires an IT team with strong experience and understanding as well, and this is the background of this research. This research aims to provide practical guidance in implementing disaster recovery strategies with virtualization, especially the snapshot feature on VMware Workstation to test disaster scenarios and evaluate their recovery effectiveness.
Serangan dan Deteksi Port Scanning Menggunakan Wireshark dan Snort Rakhmadi Rahman; Abdul Khalik Hartono; Eka Tanduklangi
Jejak digital: Jurnal Ilmiah Multidisiplin Vol. 1 No. 4 (2025): JULI (Edisi Spesial)
Publisher : INDO PUBLISHING

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.63822/2q8zwz85

Abstract

In the digital era, network security threats such as port scanning pose significant risks as they serve as reconnaissance for potential cyber attacks. This study evaluates the effectiveness of Wireshark (paket analysis tool) and Snort (Intrusion Detection System) in detecting and analyzing port scanning activities. Using Nmap (Zenmap) as an attack simulator, experiment were conducted on a local Wi-Fi network to capture TCP SYN scans and HTTP sniffing attemps. Wireshark successfully identified suspicious traffic patterns, icluding unacknowledged SYN packets and exposed HTTP login credentials, while Snort, configured with custom rules, generated real-time alert for scanning activities. The findings confirm the complementary roles validation. This study recommends regular Snort rule update, enabling promiscuous mode, and implementing HTTPS/VPN to mitigate sniffing risks. This integrates approach enhances early threat detection and strengthens network protection mechanisms.