112,740 research outputs found
RANCANG BANGUN APLIKASI MONITORING NETWORK BERBASIS WEB MENGGUNAKAN HTML5 PADA DINAS PENDIDIKAN KABUPATEN BLITAR
ABSTRAKSistem informasi telah menjadi bagian yang sangat penting bagi semua institusi dankalangan modern untuk saat ini. Dengan ketersediaan sistem informasi yang tepat, banyak keuntungan yang dapat diperoleh, yang pada akhirnya akan meningkatkan produktivitas kerja. Untuk menjaga jaringan informasi tetap stabil dan tersedia, diperlukan suatu sistem manajemen yang baik dan mampu mengatasi masalah yang terjadi. Dalam penelitian ini dilakukan perancangan dan implementasi protokol SNMP untuk manajemen jaringan yangdiimplementasikan langsung di Administrator Jaringan Komputer Dinas Pendidikan Kabupaten Blitar.Dalam operasionalnya, protokol SNMP ini dibantu dengan aplikasi Putty yang dikembangkan oleh Mikrotik. Dari hasil pengujian dan analisa sistem diperoleh hasil bahwa sistem monitoring dan manajemen jaringan yang telah dirancang dapat berjalan dengan baik. Sistem yang dirancang dapat menampilkan berbagai informasi yang dibutuhkan dalam memanajemen jaringan seperti tampilan peta topologi jaringan dan berbagai fitur lainnya. Serta dengan menambahkan fitur notifikasi email, penanganan terhadap masalah yang terjadi dapat lebih efisien dibandingkan dengan menggunakan metode konvensional.Kata Kunci : Monitoring traffic jaringan komputer, Jaringan intranet, SNMP, Aplikasi monitoring traffic jaringan intranet .berbasis web.ABSTRACTNowadays, The information system has become a very important part of all institutions and the modern cummunity. With the availability of appropriate information systems, many benefits can be obtained, as a result it will increase labor productivity. To keep the information network remains stable and available, we need a good management system and is able to overcome the problems that occur. In this research, design and implementation of the SNMP protocol for network management are implemented directly in Computer Network Administrator of Education Department Blitar..In operation, the SNMP protocol is supported by the PuTTY application developed by Mikrotik. From the test results and analysis, it shows that the system of monitoring and network management system that has been designed   run well. Designed system can display a variety of information needed to manage the network as a network topology map view and a variety of other features. And by adding the email notification feature, the handling of the problems that occur can be more efficient using conventional methods.Keywords: Computer networks traffic monitoring, intranet networks, SNMP, intranet network traffic monitorings application. web-based
Why (and How) Networks Should Run Themselves
The proliferation of networked devices, systems, and applications that we
depend on every day makes managing networks more important than ever. The
increasing security, availability, and performance demands of these
applications suggest that these increasingly difficult network management
problems be solved in real time, across a complex web of interacting protocols
and systems. Alas, just as the importance of network management has increased,
the network has grown so complex that it is seemingly unmanageable. In this new
era, network management requires a fundamentally new approach. Instead of
optimizations based on closed-form analysis of individual protocols, network
operators need data-driven, machine-learning-based models of end-to-end and
application performance based on high-level policy goals and a holistic view of
the underlying components. Instead of anomaly detection algorithms that operate
on offline analysis of network traces, operators need classification and
detection algorithms that can make real-time, closed-loop decisions. Networks
should learn to drive themselves. This paper explores this concept, discussing
how we might attain this ambitious goal by more closely coupling measurement
with real-time control and by relying on learning for inference and prediction
about a networked application or system, as opposed to closed-form analysis of
individual protocols
SOLUSI NETWORK SECURITY DARI ANCAMAN SQL INJECTION DAN DENIAL OF SERVICE (DOS)
Spitzner, Lance (2003) Honeypots adalah suatu sistem keamanan jaringan komputer yang didesain untuk
diserang/disusupi oleh cracker, dan bukan untuk menyediakan suatu suatu layanan produksi. Seharusnya hanya
sedikit atau bahkan tidak ada sama sekali trafik jaringan yang berasal atau menuju honeypots. Oleh karena itu,
semua trafik honeypots patut dicurigai sebagai aktivitas yang tidak sah atau tidak terautorisasi. Jika cukup
informasi pada log file honeypots, maka aktivitas mereka dapat dimonitor dan diketahui pola serangannya tanpa
menimbulkan resiko kepada production system asli atau data
Pada penelitian ini, dibangun suatu sistem honeypots yang menyerupai production system yang
sesungguhnya. Layanan yang diemulasikan pada honeypots adalah web server. Mekanisme
pengawasan/monitoring pada sistem honeypot ini dilakukan dengan menggunakan log. Digunakannya log ini
adalah untuk memudahkan pemeriksaan kembali data (analisis forensik) yang diterima oleh sistem honeypots.
Implementasi dalam penelitian ini, sistem honeypot dirancang berdasar kepada high interaction honeypot,
yaitu sistem honeypot yang yang mengemulasikan service dengan alamat IP tersendiri. Rancangan honeypot
dalam penelitian ini dipergunakan untuk memberikan service security terhadap layanan http (web server).
Spitzner, Lance (2003) honeypots is a computer network security system designed for attack / compromised
by a cracker, and not to provide an a production service. Should have little or even nothing at all network traffic
originating in or towards honeypots. Therefore, all traffic honeypots suspect unauthorized activity or not
terautorisasi. If enough information in the log files honeypots, then their activity can be monitored and known
patterns of attacks without causing any risk to production systems or the original data In this study, constructed
a system of honeypots that resembles the actual production system. The service is emulated on a web server
honeypots. The mechanism of supervision / monitoring the honeypot system is done by using the log. These logs
are used to facilitate re-examination of data (forensic analysis) received by the honeypots.
Implementation of this research, honeypot system is designed based on high-interaction honeypot, which is
a honeypot system that emulates the service with its own IP address. The design of the research honeypot is used
to provide security services to the http service (web server)
Regional Data Archiving and Management for Northeast Illinois
This project studies the feasibility and implementation options for establishing a regional data archiving system to help monitor
and manage traffic operations and planning for the northeastern Illinois region. It aims to provide a clear guidance to the
regional transportation agencies, from both technical and business perspectives, about building such a comprehensive
transportation information system. Several implementation alternatives are identified and analyzed. This research is carried
out in three phases.
In the first phase, existing documents related to ITS deployments in the broader Chicago area are summarized, and a
thorough review is conducted of similar systems across the country. Various stakeholders are interviewed to collect
information on all data elements that they store, including the format, system, and granularity. Their perception of a data
archive system, such as potential benefits and costs, is also surveyed. In the second phase, a conceptual design of the
database is developed. This conceptual design includes system architecture, functional modules, user interfaces, and
examples of usage. In the last phase, the possible business models for the archive system to sustain itself are reviewed. We
estimate initial capital and recurring operational/maintenance costs for the system based on realistic information on the
hardware, software, labor, and resource requirements. We also identify possible revenue opportunities.
A few implementation options for the archive system are summarized in this report; namely:
1. System hosted by a partnering agency
2. System contracted to a university
3. System contracted to a national laboratory
4. System outsourced to a service provider
The costs, advantages and disadvantages for each of these recommended options are also provided.ICT-R27-22published or submitted for publicationis peer reviewe
Deliverable DJRA1.2. Solutions and protocols proposal for the network control, management and monitoring in a virtualized network context
This deliverable presents several research proposals for the FEDERICA network, in different subjects, such as monitoring, routing, signalling, resource discovery, and isolation. For each topic one or more possible solutions are elaborated, explaining the background, functioning and the implications of the proposed solutions.This deliverable goes further on the research aspects within FEDERICA. First of all the architecture of the control plane for the FEDERICA infrastructure will be defined. Several possibilities could be implemented, using the basic FEDERICA infrastructure as a starting point. The focus on this document is the intra-domain aspects of the control plane and their properties. Also some inter-domain aspects are addressed. The main objective of this deliverable is to lay great stress on creating and implementing the prototype/tool for the FEDERICA slice-oriented control system using the appropriate framework. This deliverable goes deeply into the definition of the containers between entities and their syntax, preparing this tool for the future implementation of any kind of algorithm related to the control plane, for both to apply UPB policies or to configure it by hand. We opt for an open solution despite the real time limitations that we could have (for instance, opening web services connexions or applying fast recovering mechanisms). The application being developed is the central element in the control plane, and additional features must be added to this application. This control plane, from the functionality point of view, is composed by several procedures that provide a reliable application and that include some mechanisms or algorithms to be able to discover and assign resources to the user. To achieve this, several topics must be researched in order to propose new protocols for the virtual infrastructure. The topics and necessary features covered in this document include resource discovery, resource allocation, signalling, routing, isolation and monitoring. All these topics must be researched in order to find a good solution for the FEDERICA network. Some of these algorithms have started to be analyzed and will be expanded in the next deliverable. Current standardization and existing solutions have been investigated in order to find a good solution for FEDERICA. Resource discovery is an important issue within the FEDERICA network, as manual resource discovery is no option, due to scalability requirement. Furthermore, no standardization exists, so knowledge must be obtained from related work. Ideally, the proposed solutions for these topics should not only be adequate specifically for this infrastructure, but could also be applied to other virtualized networks.Postprint (published version
- …