FORENSIC NETWORK ANALYSIS AND IMPLEMENTATION OF SECURITY ATTACKS ON VIRTUAL PRIVATE SERVERS
نویسندگان
چکیده
ABSTRACT-PT Kodinglab Integrasi Indonesia's Virtual Private Server (VPS) product requires good quality standards, including security. The challenge that arises is still frequent disruptions to the protection of PT Kodinglab's VPS customers, where it difficult identify source attack. Network forensics in form dead and live using NIST method with stages collection, examination, Analysis, reporting are used find Data for comes from snort tools, data capture Wireshark. collection stage involves collecting attack logs wireshark life forensics. While examination dataset further analyzed mapped. Advanced check on server via syslog snort. From testing carried out obtain information attacker's IP address, destination date attack, time, type TCP Flooding UDP attacks, all attacks customer's can be identified. obtained regarding attacker time occurred, address victim's protocol used. Kata kunci : Forensic, Dead Live Server, DDos, Flooding, Flooding.
منابع مشابه
Security in Virtual private network
Information security, sometimes shortened to Info Sec, is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. It is a general term that can be used regardless of the form the data may take (e.g. electronic, physical). Virtual private networks (VPNs) offer low-cost, secure, dynamic access to pri...
متن کاملAn Analysis of Virtual Private Network Solutions
VPN services have been available for decades but not widely used until recently. A combination of new VPN technologies, network technologies and business communication requirements is the driving force behind the take-up of VPN services. This paper gives an overview of recent VPN solutions and analyses their scalability and flexibility. VPN solutions are categorized and related to potential cus...
متن کاملanalysis of power in the network society
اندیشمندان و صاحب نظران علوم اجتماعی بر این باورند که مرحله تازه ای در تاریخ جوامع بشری اغاز شده است. ویژگیهای این جامعه نو را می توان پدیده هایی از جمله اقتصاد اطلاعاتی جهانی ، هندسه متغیر شبکه ای، فرهنگ مجاز واقعی ، توسعه حیرت انگیز فناوری های دیجیتال، خدمات پیوسته و نیز فشردگی زمان و مکان برشمرد. از سوی دیگر قدرت به عنوان موضوع اصلی علم سیاست جایگاه مهمی در روابط انسانی دارد، قدرت و بازتولید...
15 صفحه اولthe geopolitics of afghanistan after september 11, 2001, and its impact on iranian national security
abstract u.s. attack to afghanistan after 9/11 provided opportunities for us who tried to become the dominant power after collapse of ussr and bipolar world. thinkers like fukuyama believed american liberal democrats thought would be universally accepted without resistances. liberal democracy is the best and final model of governance; in this regard, united state has moral responsibilities for...
15 صفحه اولDesign and Implementation of Virtual Private Services
Large scale distributed applications such as electronic commerce and online marketplaces (e.g., auction services) combine network access with multiple storage and computational elements. The distributed responsibility for resource control creates new security and privacy issues, caused by the complexity of the operating environment. In particular, policies at multiple layers and locations force...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Jusikom : Jurnal Sistem Informasi Ilmu Komputer
سال: 2023
ISSN: ['2580-2879']
DOI: https://doi.org/10.34012/jurnalsisteminformasidanilmukomputer.v6i2.2932