Network Security Analysis and Bandwidth Management

Bagus Aji Saputro

Abstract

Computer network users have to spend a lot of money to use the Internet. The Internet has given a very big change in the dissemination of information, so that many people are using data through the Internet. This problem can be solved by MikroTik as a regulator of Internet data traffic and limiting bandwidth that can interfere with computer network activities in accordance with the regulations that have been applied. As a result of not being limited in bandwidth, it causes an overload on a network which has an impact on disrupting internet traffic on that network. Each agency should implement bandwidth restrictions according to the needs of users using the internet. Result from this research is not being limited in bandwidth, it causes an overload on a network which has an impact on disrupting internet traffic on that network. Each agency should implement bandwidth restrictions according to the needs of users using the internet.

Keywords

Data, Database, SQL Injection, Vulnerability

Full Text:

PDF

References

A. Supriyadi and D. Gartina, “Memilih Topologi Jaringan dan Hardware dalam Desain Sebuah Jaringan Komputer,” Inform. Pertan., vol. 16, no. 2, pp. 1037–1053, 2007.

I. Riadi, “Optimalisasi Keamanan Jaringan Menggunakan Pemfilteran Aplikasi Berbasis Mikrotik Pendahuluan Landasan Teori,” JUSI, Univ. Ahmad Dahlan Yogyakarta, vol. 1, no. 1, pp. 71–80, 2011.

A. Ubaidillah, R. Alfita, R. Diyah, and P. Sari, “Enhancement of E-GSM Channel Capacity with Function Diversion of 3G to 2G Frequency,” vol. 02, no. 02, pp. 2–6, 2018.

A. F. Doni, O. A. H. Maria, and S. Hanif, “Implementation of RC4 Cryptography Algorithm for Data File Security,” J. Phys. Conf. Ser., vol. 1569, no. 2, 2020, doi: 10.1088/1742-6596/1569/2/022080.

A. Yudhana and K. Anwar, “A Mobile Phone Application for Someone Fitness Monitoring with Fast Fourier Transform Algorithm,” J. Ilm. Kursor, vol. 10, no. 3, pp. 129–134, 2020, doi: 10.21107/kursor.v10i3.195.

I. N. Yulita, R. Rosadi, S. Purwani, and R. M. Awangga, “a Combination Deep Belief Networks and Shallow Classifier for Sleep Stage Classification,” Kursor, vol. 8, no. 4, p. 197, 2017, doi: 10.28961/kursor.v8i4.97.

F. Fitriastuti and D. P. Utomo, “Implementasi Bandwdith Management Dan Firewall System Menggunakan Mikrotik OS 2 . 27 Menurut APJII , meski terjadi pertumbuhan pengguna internet 2013 dalam jumlah signifkan , namun untuk dapat memenuhi tuntutan International Telecom Union ( ITU ) yang,” J. Tek., vol. 4, no. 1, pp. 1–9, 2014.

Z. A. Pribadi, “Analisis dan Implementasi Firewall dengan Metode Stateful Multilayer Inspection Pada Mikrotik Router OS,” no. 1, pp. 1–9, 2013.

R. Rushendra, R. Hidayat, M. Faiz Billah, and R. Sufyani, “Performance Analysis of Umts Networks As Reference of Signal Interference Handling,” Int. J. Sci. Eng. Inf. Technol., vol. 1, no. 1, pp. 51–54, 2018.

S. Resita, A. Jauhari, and M. K. Sophan, “SMS Gateway Based Vacancy of Work Vocation Information System on Pamekasan Region,” vol. 01, no. 02, pp. 2–5, 2017.

S. Agustini, “Desain Mobile Ad-Hoc Network (Manet) Untuk Sistem Komunikasi Taktis,” vol. 7, no. 1, pp. 1–7, 2018.

M. Hanif and M. Kamisutara, “Sistem Monitoring Trafik Pada Mikrotik Berbasis App Mobile Dengan Notifikasi Telegram,” Netw. Eng. Res. Oper., vol. 6, no. 1, p. 1, 2021, doi: 10.21107/nero.v6i1.169.

S. Khadafi, Y. D. Pratiwi, and E. Alfianto, “Keamanan Ftp Server Berbasiskan Ids Dan Ips Menggunakan Sistem Operasi Linux Ubuntu,” Netw. Eng. Res. Oper., vol. 6, no. 1, p. 11, 2021, doi: 10.21107/nero.v6i1.190.

S. Khadafi, S. Nurmuslimah, and F. K. Anggakusuma, “Implementasi Firewall Dan Port Knocking Sebagai Keamanan Data Transfer Pada Ftp Server Berbasiskan Linux Ubuntu Server,” Nero, vol. 4, no. 3, pp. 181–188, 2019.

S. Agustini and A. Mudzakir, “Rancang Bangun Jaringan Komputer dengan Bandwidth Manajemen Menggunakan Teknik Brust Limit dan Firewall sebagai Pengaman Jaringan,” J. Ilm. NERO, vol. 4, no. 3, pp. 189–195, 2019.

B. Rahmat and B. Nugroho, “Deep Learning-Based Object Recognition Robot Control Via Web And Mobile Using An Internet Of Things (IoT) Connection,” J. Ilm. Kursor, vol. 10, no. 4, pp. 159–166, 2020, doi: 10.21107/kursor.v10i4.242.

A. Ubaidillah and S. I. Kholida, “Planning of 5G Network Path Loss in Geometry Based Stochastic Concept By Using Linear Regression Methods,” J. Ilm. Kursor, vol. 10, no. 4, pp. 167–174, 2020, doi: 10.21107/kursor.v10i4.245.

E. Sediyono and V. A. Windarni, “the Evaluation of Land Area Measurement Using Gps Technology,” Kursor, vol. 9, no. 1, pp. 1–8, 2017, doi: 10.28961/kursor.v9i1.120.

T. Karlita, “Hillmail: a Secure Email System for Android-Based Mobile Phone Using Hill Cipher Algorithm,” Kursor, vol. 8, no. 3, p. 141, 2017, doi: 10.28961/kursor.v8i3.89.

A. Toding, “Optimal Relay Design of Zero Forcing Equalization for MIMO Multi Wireless Relaying Networks,” Kursor, vol. 9, no. 1, pp. 33–38, 2018, doi: 10.28961/kursor.v9i1.143.

T. Jílek and L. Žalud, “Security of remote management of embedded systems running MikroTik RouterOS operating system using proprietary protocols,” IFAC Proc. Vol., vol. 11, no. PART 1, pp. 169–173, 2012, doi: 10.3182/20120523-3-cz-3015.00034.

DOI

https://doi.org/10.21107/ijseit.v5i02.6481

Metrics

Refbacks

  • There are currently no refbacks.


Copyright (c) 2021 International journal of science, engineering, and information technology

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.