• Login
    View Item 
    •   Home
    • Penelitian (Research)
    • Teknologi dan Rekayasa
    • View Item
    •   Home
    • Penelitian (Research)
    • Teknologi dan Rekayasa
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    The Implementation Of Virtual Private Network Based On Instruction Detection With Linux Firewalls Implementasi Virtual Private Network Berbasis Instruction Detection dengan Firewall

    Thumbnail
    View/Open
    2007_reguler_MUSLICH.pdf (24.91Kb)
    Date
    2007
    Author
    Muslich, Moch.
    Metadata
    Show full item record
    Abstract
    The security of computer network as part from a information system of importance to watch over validity and data integrity with guarantee service availability for the user. System must be protected from all attack kind and infiltration efforts by side not justifiably. many manners is developed to protect network of infrastructure and communication at internet, with wear firewalls, encrypts, and virtual private network. Instruction detection is method relative new. Instruction detection (ids) method, collectable and used offence type information that known and found if try to assault network or host certain. The network of self defense system maker application Linux this consist of configuration snort and base. in this implementation, data’s will pass server will be accepted then be prepared with package decoder. data will pass by preprocessor that functioned there not it data package that has signature and or anomaly (oddity) that make can botch. data’s step into detection engine, data’s will applied several rules. data’s package can sustained, at deliver, at logarithm, and or given alert (warning). if data there signature botch so data package can at deliver. The research to design and make self defense system a network from attack, apply software open source snort in network and apply application ids integration in computer network The using of software open source snort that made can be used to detect various attack in server based on Linux fedora core 5, like port scanning and others. Program base that used can simplify in read attack existence in server with web interfaces visualization
    URI
    http://hdl.handle.net/11617/2711
    Collections
    • Teknologi dan Rekayasa

    DSpace software copyright © 2002-2016  DuraSpace
    Contact Us | Send Feedback
    Theme by 
    Atmire NV
     

     

    Browse

    Publikasi IlmiahCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

    My Account

    Login

    DSpace software copyright © 2002-2016  DuraSpace
    Contact Us | Send Feedback
    Theme by 
    Atmire NV