Building a secure socket tunneling protocol method to access port services on the MikroTikrouterboard. Limiting ports that are easy to access remotely on the MikroTikrouterboard. Knowing the steps …
Distributed Denial-of-Service (DDoS) attacks pose a serious threat to computer network infrastructures. Apache Spark, as a popular distributed data processing platform, requires effective methods t…
Distributed Denial-of-Service (DDoS) attacks pose a serious threat to computer network infrastructures. Apache Spark, as a popular distributed data processing platform, requires effective methods t…
DDoS assaults pose a serious threat to enterprises, inflicting damage and disruption, thus improving the speed and accuracy of DDoS detection and mitigation is critical. The combination of Network …
Blockchain merupakan teknologi yang berkembang dengan pesat dengan teknologi keamanan data yang akan meningkatkan kepercayaan suatu pengguna melalui sistem yang terdistribusi. Blockchain terdapat f…
With the increasing use of vehicles and the large human population in urban areas, the level of traffic jams is high. Every motorist certainly does not want to be stuck in a traffic jam for too lon…
Sistem keamanan pada kunci pintu rumah yang ada saat ini kebanyakan merupakan sistem keamanan manual berupa kunci atau gembok konvensional. Penelitian bertujuan menciptakan sistem keamanan pada kun…
Penulis mendapati bahwa permasalahan riil yang terkait security jaringan komputer, khususnya yang terkait dengan aktifitas hacking, sudah mencapai batas ambang "gawat darurat". Sehingga diperlukan …
Di dalam perkembangan bisnis, web service sungguh sangat dibutuhkan dalam integrasi sistem karena tidak melihat platform, arsitektur maupun bahasa pemrograman yang digunakan oleh sumber berbeda. Ke…
In modern times, growing on the Internet in terms of technology and its use can bring many positive things to human life. Surely it cannot be denied that Internet technology has had a negative impa…
DDoS TCP Flood attack is a condition where the attacker exploits the three-way handshaking mechanism of the TCP connection establishment process, where the server will be flooded with requests for …
Wannacry ransomware is a specific type of malware that threatens access to victims unless their data has been redeemed or paid for. Usually, ransomware encrypts the content on the victim's hard dri…
The focus of this research is to protect the network from DHCP Rogue (fake DHCP server), by implementing DHCP Snooping and VLAN on one of the network devices, namely a switch. The network built in …
The security of information is an essential aspect that must be considered these days, especially for private or confidential information, security can be done in several ways, including cryptograp…
Sistem Supervisory Control And Acquisition (SCADA) adalah sistem kontrol industri otomatis yang digunakan untuk mengontrol serta memantau berbagai tahapan industri yang menyebar luas, dimana akuisi…
Visualization is a technique to present the number of Ransomware packet attacks that occur on datasets that have been provided by Unavarra. Attacks Visualization aiming to recognize attacks and mak…
Saat ini teknologi informasi semakin berkembang pesat. Penggunaan teknologi saat ini telah mencakup seluruh aspek kehidupan. Hampir setiap hari muncul berbagai inovasi terbaru dalam bidang teknol…