Claim Missing Document
Check
Articles

Found 3 Documents
Search

Analisis QoS (Quality Of Service) Pada Jaringan Rt/Rw Net Untuk Peningkatan Efisiensi Dan Produktivitas Layanan Jordan, Muhammad; Warisin Hammami, Khairul; Firmansyah, Firmansyah
Secure And Knowledge-Intelligent Research in Cybersecurity And Multimedia (SAKIRA) Vol. 2 No. 1 (2024): Multimedia Integration and computer networks in the Development of Modern Infor
Publisher : Universitas Islam Al-Azhar Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.1234/n65ms857

Abstract

In an increasingly advanced digital era, computer networks play an important role in supporting various activities, including in the community-initiated RT/RW Net environment. This research aims to analyze Quality of Service (QoS) on the RT/RW Net network to improve service efficiency and productivity. The research method used is the experimental method, which involves data collection through the Mikhmon application to monitor network performance. QoS measurements were made based on four main parameters: throughput, delay, jitter, and packet loss.The results show that the RT/RW Net network has excellent throughput with a value of 1471 Kb/s, average delay of 3.623 ms, jitter of 3.63 ms, and packet loss of 0%, all of which fall into the "Very Good" category according to Tiphon standards. Security testing was also conducted by simulating a brute force attack, which revealed several weaknesses in the security system that require improvement.The conclusion of this study is that the RT/RW Net network has a very good quality of service, but needs improvement in the security aspect. Suggestions include increasing bandwidth capacity, implementing stricter security policies, and improving connection stability.
Analisis QoS (Quality Of Service) Pada Jaringan Rt/Rw Net Untuk Peningkatan Efisiensi Dan Produktivitas Layanan Jordan, Muhammad; Warisin Hammami, Khairul; Firmansyah, Firmansyah
Secure And Knowledge-Intelligent Research in Cybersecurity And Multimedia (SAKIRA) Vol. 2 No. 1 (2024): Multimedia Integration and computer networks in the Development of Modern Infor
Publisher : Universitas Islam Al-Azhar Mataram

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36679/s4kira.v2i1.32

Abstract

In an increasingly advanced digital era, computer networks play an important role in supporting various activities, including in the community-initiated RT/RW Net environment. This research aims to analyze Quality of Service (QoS) on the RT/RW Net network to improve service efficiency and productivity. The research method used is the experimental method, which involves data collection through the Mikhmon application to monitor network performance. QoS measurements were made based on four main parameters: throughput, delay, jitter, and packet loss.The results show that the RT/RW Net network has excellent throughput with a value of 1471 Kb/s, average delay of 3.623 ms, jitter of 3.63 ms, and packet loss of 0%, all of which fall into the "Very Good" category according to Tiphon standards. Security testing was also conducted by simulating a brute force attack, which revealed several weaknesses in the security system that require improvement.The conclusion of this study is that the RT/RW Net network has a very good quality of service, but needs improvement in the security aspect. Suggestions include increasing bandwidth capacity, implementing stricter security policies, and improving connection stability.
Analyze Threats in a Virtual Lab Network Using Live Forensic Methods on MetaRouter Firmansyah, Firmansyah; Wibisana, Bayu; Jordan, Muhammad
International Journal of Engineering and Computer Science Applications (IJECSA) Vol. 4 No. 1 (2025): March 2025
Publisher : Universitas Bumigora Mataram-Lombok

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/ijecsa.v4i1.4784

Abstract

This research identified critical network anomalies in the MetaRouter virtual environment, focusing on IP activity related to routers, networks, and client devices. Suspicious interactions were observed between IP 192.168.1.100 (router) and IP 172.16.205.53 (client), including reused TCP port numbers and incomplete SYN sessions, indicating potential spoofing attempts. Invalid route information involving 192.168.1.100 highlights malicious modifications to the routing table, indicating an attempt to manipulate the routing information. Packet inconsistencies, such as “TCP Previous segment not captured” and “Spurious Retransmission,” revealed interference between the client and router, possibly caused by an external attacker exploiting network protocol vulnerabilities. The aim of this research is to analyze threats in virtual lab networks using live forensic methods on MetaRouter to detect anomalies, with a focus on Border Gateway Protocol (BGP) and TCP deviations in MetaRouter. This research method is a controlled prototype experimental setup in a virtual laboratory consisting of two routers and two client devices. This method simulates real-world network operations to identify malicious activities. Wireshark is used for real-time packet-level monitoring and analysis because it has powerful visualization and filtering capabilities, surpassing tools like tcpdump. This research integrates live forensic techniques to collect and analyze routing logs, packet data, and protocol behavior. The results of this research are the identification of suspicious behaviors, such as reused TCP port numbers, incomplete SYN sessions, and unauthorized route announcements, indicating potential spoofing and BGP hijacking attempts. Packet data irregularities, including “Out-Of-Order” messages and abrupt session terminations, are also detected, revealing disruptions in traffic flow caused by malicious activities. The results of this research are highlighting the effectiveness of the forensic framework in identifying and documenting network anomalies in virtual environments have significant implications for improving security in cloud-based and hybrid networks. This research provides a scalable and replicable methodology that can improve real-time anomaly detection and response, paving the way for future advances in network security.