Design and Build a Network Security System Using Port Knocking, DMZ and IDS Techniques at SMA Negeri 1 Warungkiara
نویسندگان
چکیده
The network security system of SMA Negeri 1 Warungkiara needs improvement to be more effective in safeguarding data integrity and confidentiality. Currently, it only relies on a filter rule security, which is not robust enough fend off hacker attacks. Therefore, advanced techniques such as Port Knocking, DMZ, IDS are required. Knocking serves additional authentication by accessing ports specific sequence prevent unauthorized access. DMZ used isolate the internal from direct detect suspicious activities alert administrator. was tested against various attacks port scanning, DDoS, Ping Death, proven reduce server resource usage 34% 6%. test results show that this provides strong protection preserves confidentiality within school network.
منابع مشابه
Network Security Using Hybrid Port Knocking
The main objective of this work is to develop and evaluate the performance of a new PK technique, which can avert all types of port attacks and meets all network security requirements. The new technique utilizes three wellknown concepts, these are: port-knocking (PK), steganography, and mutual authentication, therefore, it is referred to as the hybrid port-knocking (HPK) technique. It can be us...
متن کاملscour modeling piles of kambuzia industrial city bridge using hec-ras and artificial neural network
today, scouring is one of the important topics in the river and coastal engineering so that the most destruction in the bridges is occurred due to this phenomenon. whereas the bridges are assumed as the most important connecting structures in the communications roads in the country and their importance is doubled while floodwater, thus exact design and maintenance thereof is very crucial. f...
simulation and design of electronic processing circuit for restaurants e-procurement system
the poor orientation of the restaurants toward the information technology has yet many unsolved issues in regards to the customers. one of these problems which lead the appeal list of later, and have a negative impact on the prestige of the restaurant is the case when the later does not respond on time to the customers’ needs, and which causes their dissatisfaction. this issue is really sensiti...
15 صفحه اولNetwork Security Using Cryptographic Techniques
Network Security is the most vital component in information security because it is responsible for securing all information passed through networked computers. Network Security refers to all hardware and software functions, characteristics, features, operational procedures, accountability, measures, access control, and administrative and management policy required to provide an acceptable level...
متن کاملComparative analysis of design/build and design/bid/build project delivery systems in Lebanon
Design/bid/build and design/build are two principal project delivery systems used worldwide. The performance of each project may differ with the type of procurement system used. This study has two aims: firstly, to assess and compare the performance of design/bid/build and design/build projects in Lebanon; secondly, to compare the results with the performance of equivalent systems in the Far Ea...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: JITE (Journal of Informatics and Telecommunication Engineering)
سال: 2023
ISSN: ['2549-6247', '2549-6255']
DOI: https://doi.org/10.31289/jite.v7i1.9674