3 research outputs found

    Ddos Attack Detection Simulation and Handling Mechanism

    Get PDF
    In this study we discuss how to handle DDoS attack that coming from the attacker by using detection method and handling mechanism. Detection perform by comparing number of packets and number of flow. Whereas handling mechanism perform by limiting or drop the packets that detected as a DDoS attack. The study begins with simulation on real network, which aims to get the real traffic data. Then, dump traffic data obtained from the simulation used for detection method on our prototype system called DASHM (DDoS Attack Simulation and Handling Mechanism). From the result of experiment that has been conducted, the proposed method successfully detect DDoS attack and handle the incoming packet sent by attacker

    A MAPPING OF COMMON INFORMATION MODEL: A CASE STUDY OF HIGHER EDUCATION INSTITUTION

    No full text
    Most of higher education institution in Indonesia has heterogeneous application software for managing their institution. Maintaining all application software run smoothly and able to collaborate one to other is very difficult. Each application has own schema and usually not prepare for collaboration. This paper will map a case study of a higher education institution. This paper describes a mapping of common information model which captured from all application software that has been implemented and review model conceptually. Common information model should reduce number of interfaces and provide a basis of integrating applications in a way that reduces the coupling among of them. Minimal functional impact should be achieved by allowing them to be upgraded or replaced

    A MAPPING OF COMMON INFORMATION MODEL: A CASE STUDY OF HIGHER EDUCATION INSTITUTION

    No full text
    Most of higher education institution in Indonesia has heterogeneous application software for managing their institution. Maintaining all application software run smoothly and able to collaborate one to other is very difficult. Each application has own schema and usually not prepare for collaboration. This paper will map a case study of a higher education institution. This paper describes a mapping of common information model which captured from all application software that has been implemented and review model conceptually. Common information model should reduce number of interfaces and provide a basis of integrating applications in a way that reduces the coupling among of them. Minimal functional impact should be achieved by allowing them to be upgraded or replaced
    corecore