Network Security Analysis and Bandwidth Management
Abstract
Keywords
Full Text:
PDFReferences
A. Supriyadi and D. Gartina, “Memilih Topologi Jaringan dan Hardware dalam Desain Sebuah Jaringan Komputer,” Inform. Pertan., vol. 16, no. 2, pp. 1037–1053, 2007.
I. Riadi, “Optimalisasi Keamanan Jaringan Menggunakan Pemfilteran Aplikasi Berbasis Mikrotik Pendahuluan Landasan Teori,” JUSI, Univ. Ahmad Dahlan Yogyakarta, vol. 1, no. 1, pp. 71–80, 2011.
A. Ubaidillah, R. Alfita, R. Diyah, and P. Sari, “Enhancement of E-GSM Channel Capacity with Function Diversion of 3G to 2G Frequency,” vol. 02, no. 02, pp. 2–6, 2018.
A. F. Doni, O. A. H. Maria, and S. Hanif, “Implementation of RC4 Cryptography Algorithm for Data File Security,” J. Phys. Conf. Ser., vol. 1569, no. 2, 2020, doi: 10.1088/1742-6596/1569/2/022080.
A. Yudhana and K. Anwar, “A Mobile Phone Application for Someone Fitness Monitoring with Fast Fourier Transform Algorithm,” J. Ilm. Kursor, vol. 10, no. 3, pp. 129–134, 2020, doi: 10.21107/kursor.v10i3.195.
I. N. Yulita, R. Rosadi, S. Purwani, and R. M. Awangga, “a Combination Deep Belief Networks and Shallow Classifier for Sleep Stage Classification,” Kursor, vol. 8, no. 4, p. 197, 2017, doi: 10.28961/kursor.v8i4.97.
F. Fitriastuti and D. P. Utomo, “Implementasi Bandwdith Management Dan Firewall System Menggunakan Mikrotik OS 2 . 27 Menurut APJII , meski terjadi pertumbuhan pengguna internet 2013 dalam jumlah signifkan , namun untuk dapat memenuhi tuntutan International Telecom Union ( ITU ) yang,” J. Tek., vol. 4, no. 1, pp. 1–9, 2014.
Z. A. Pribadi, “Analisis dan Implementasi Firewall dengan Metode Stateful Multilayer Inspection Pada Mikrotik Router OS,” no. 1, pp. 1–9, 2013.
R. Rushendra, R. Hidayat, M. Faiz Billah, and R. Sufyani, “Performance Analysis of Umts Networks As Reference of Signal Interference Handling,” Int. J. Sci. Eng. Inf. Technol., vol. 1, no. 1, pp. 51–54, 2018.
S. Resita, A. Jauhari, and M. K. Sophan, “SMS Gateway Based Vacancy of Work Vocation Information System on Pamekasan Region,” vol. 01, no. 02, pp. 2–5, 2017.
S. Agustini, “Desain Mobile Ad-Hoc Network (Manet) Untuk Sistem Komunikasi Taktis,” vol. 7, no. 1, pp. 1–7, 2018.
M. Hanif and M. Kamisutara, “Sistem Monitoring Trafik Pada Mikrotik Berbasis App Mobile Dengan Notifikasi Telegram,” Netw. Eng. Res. Oper., vol. 6, no. 1, p. 1, 2021, doi: 10.21107/nero.v6i1.169.
S. Khadafi, Y. D. Pratiwi, and E. Alfianto, “Keamanan Ftp Server Berbasiskan Ids Dan Ips Menggunakan Sistem Operasi Linux Ubuntu,” Netw. Eng. Res. Oper., vol. 6, no. 1, p. 11, 2021, doi: 10.21107/nero.v6i1.190.
S. Khadafi, S. Nurmuslimah, and F. K. Anggakusuma, “Implementasi Firewall Dan Port Knocking Sebagai Keamanan Data Transfer Pada Ftp Server Berbasiskan Linux Ubuntu Server,” Nero, vol. 4, no. 3, pp. 181–188, 2019.
S. Agustini and A. Mudzakir, “Rancang Bangun Jaringan Komputer dengan Bandwidth Manajemen Menggunakan Teknik Brust Limit dan Firewall sebagai Pengaman Jaringan,” J. Ilm. NERO, vol. 4, no. 3, pp. 189–195, 2019.
B. Rahmat and B. Nugroho, “Deep Learning-Based Object Recognition Robot Control Via Web And Mobile Using An Internet Of Things (IoT) Connection,” J. Ilm. Kursor, vol. 10, no. 4, pp. 159–166, 2020, doi: 10.21107/kursor.v10i4.242.
A. Ubaidillah and S. I. Kholida, “Planning of 5G Network Path Loss in Geometry Based Stochastic Concept By Using Linear Regression Methods,” J. Ilm. Kursor, vol. 10, no. 4, pp. 167–174, 2020, doi: 10.21107/kursor.v10i4.245.
E. Sediyono and V. A. Windarni, “the Evaluation of Land Area Measurement Using Gps Technology,” Kursor, vol. 9, no. 1, pp. 1–8, 2017, doi: 10.28961/kursor.v9i1.120.
T. Karlita, “Hillmail: a Secure Email System for Android-Based Mobile Phone Using Hill Cipher Algorithm,” Kursor, vol. 8, no. 3, p. 141, 2017, doi: 10.28961/kursor.v8i3.89.
A. Toding, “Optimal Relay Design of Zero Forcing Equalization for MIMO Multi Wireless Relaying Networks,” Kursor, vol. 9, no. 1, pp. 33–38, 2018, doi: 10.28961/kursor.v9i1.143.
T. Jílek and L. Žalud, “Security of remote management of embedded systems running MikroTik RouterOS operating system using proprietary protocols,” IFAC Proc. Vol., vol. 11, no. PART 1, pp. 169–173, 2012, doi: 10.3182/20120523-3-cz-3015.00034.
DOI
https://doi.org/10.21107/ijseit.v5i02.6481Metrics
Refbacks
- There are currently no refbacks.
Copyright (c) 2021 International journal of science, engineering, and information technology
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.