Literatur Review Analisis metode De-Militarized Zone (DMZ) dan Switch Port Security Sebagai Metode Keamanan Jaringan

  • Ni Komang Ayu Sri Anggreni Udayana
  • Lie Jasa

Abstract

Over time, the development of technology is very rapid.  It is certainly inseparable from the role of networks that can connect devices to be able to exchange information. Therefore, there is a need to secure computer networks to prevent cyber crime. The most commonly used attacks are Port Scanning and DoS (Denial Of Service). There are various ways to secure a computer network, one of which is by Switching port security. In addition to using Switch port security, the technique for securing network crimes is to use the De-Militarized Zone (DMZ). This study aims to compare network security performance with the Port security and DMZ methods where the tests obtained based on the review literature concluded that the use of the DMZ method carries out security by filtering requests by clients through firewall routers while Port security can provide security to the network by providing access to the server to registered ports only.

Downloads

Download data is not yet available.

References

[1] I. Wira, L. S. I. Putri, S., A, and A. S. Rachman, “Uji Kinerja Dmz ( De-Militarized Zone ) Dengan Simulator Gns3 ( Graphical Network Simulator ),” J. Tek. Inf., vol. 3, no. 1, pp. 1–10, 2018, doi: http://eprints.unram.ac.id/id/eprint/11326.
[2] A.Saputro, N. Saputro, and H. Wijayanto, “Metode Demilitarized Zone Dan Port Knocking Untuk Demilitarized Zone and Port Knocking Methods for Computer,” Metode, vol. 3, no. 2, pp. 22–27, 2020, [Online]. Available: http://ejournal.uinsuka.ac.id/saintek/cybersecurity/article/download/2150/1801.
[3] Dasmen, R. N., Nugraha, M. D., & Adelia, A. (2022). Penerapan Pembatasan User Wi-Fi Pada Kantor Yayasan Patra Mandiri 01 Palembang. Jurnal Komputer Dan Informatika, 10(1), 18–23. https://doi.org/10.35508/jicon.v10i1.6286
[4] Munawar, Z., Kom, M., & Putri, N. I. (2020). Keamanan Jaringan Komputer Pada Era Big [1] Z. Munawar, M. Kom, and N. I. Putri, “Keamanan Jaringan Komputer Pada Era Big Data,” J. Sist. Informasi-J-SIKA, vol. 02, pp. 1–7, 2020.Data. Jurnal Sistem Informasi-J-SIKA, 02, 1–7.
[5] K. Al Fikri, “Keamanan Jaringan Menggunakan Switch Port security,” InfoTekJar J. Nas. Inform. Dan Teknol. Jar., vol. 5, no. 2, pp. 71–76, 2021, https://doi.org/10.30743/infotekjar.v5i2.3501.
[6] Z. Munawar and N. I. Putri, “Keamanan Jaringan Komputer Pada Era Big Data,” J. Sist. Informasi-J-SIKA, vol. 2, no. 1, pp. 1–7., 2020.
[7] Bhuse, V., Kalafut, A., & Dohn, L. (2019). Detection of a Rogue Switch in a Local Area Network. In International Conference on Internet Monitoring and Protection, Nice, France.
[8] Adams, N. P. H., Chisnall, R. J., Pickering, C., & Schauer, S. (2020). How port security has to evolve to address the cyber-physical security threat: lessons from the SAURON project. International Journal of Transport Development and Integration, 4(1), 29-41.
[9] S. Sudaryanto, “Implementation Port security for Security Systems Network at the Computing Laboratory of Adisutjipto College of Technology,” Conf. Senat. STT Adisutjipto Yogyakarta, vol. 4, no. 1, pp. 1–10, 2018, doi: https://doi.org/10.28989/senatik.v4i0.239.
[10] I. Anugrah and R. H. Rahmanto, “Sistem Keamanan Jaringan Local Area Network Menggunakan Teknik De-Militarized Zone,” PIKSEL Penelit. Ilmu Komput. Sist. Embed. Log., vol. 5, no. 2, pp. 91–106, 2018, doi: https://doi.org/10.33558/piksel.v5i2.271.
[11] Putra, I. B. A. E. M., Adnyana, M. S. I. D., & Jasa, L. (2021). Analisis Quality of Service Pada Jaringan Komputer. Majalah Ilmiah Teknologi Elektro, 20(1), 95. https://doi.org/10.24843/mite.2021.v20i01.p11
[12] Suteja, E., Kumalasari, E. N., & Raharjo, S. (2021). PERANCANGAN SISTEM KEAMANAN JARINGAN UNTUK MENGURANGI KEJAHATAN CYBER MENGGUNAKAN TEKNIK DEMILITARIZED ZONE (DMZ) DAN FIREWALL RULES (Studi Kasus: Laboratorium Basis Data IST AKPRIND). 09(01), 71–80.
[13] Desmira, D., & Wiryadinata, R. (2022). Rancang Bangun Keamanan Port Secure Shell (SSH) Menggunakan Metode Port Knocking. Jurnal Ilmu Komputer Dan Sistem Informasi (JIKOMSI), 5(1), 28–33. https://doi.org/10.55338/jikomsi.v5i1.242
[14] Saputro, A., Saputro, N., Wijayanto, H., & Informatika, P. S. (2020). Metode Demilitarized Zone Dan Port Knocking Untuk Demilitarized Zone and Port Knocking Methods for Computer. Metode, 3(2), 22–27.https://scholar.archive.org/work/vuzz46kj7zb3rpanfhuilpg3aq/access/wayback/http://ejournal.uinsuka.ac.id/saintek/cybersecurity/article/download/2150/1801
[15] Pramana, Surya; JASA, Lie. Penerapan Metode Forward Chaining Untuk Rekomendasi Instalasi Local Area Network (LAN). Majalah Ilmiah Teknologi Elektro, [S.l.], v. 18, n. 2, p. 165--172, june 2019. ISSN 2503-2372.
[16] HERDIAN, Rama Beta; JASA, Lie; LINAWATI, Linawati. Manajemen Bandwidth Berdasarkan Prediksi Perilaku Pengguna Pada Jaringan TCP/IP Dengan Jaringan Syaraf Tiruan. Majalah Ilmiah Teknologi Elektro, [S.l.], v. 19, n. 1, p. 73-82, oct. 2020. ISSN 2503-2372.
[17] Arifin, M. A. S., & Zulius, A. (2019). Perancangan Sistem Keamanan Jaringan Pada Universitas Bina Insan Lubuklinggau Menggunakan Teknik Demilitarized Zone (Dmz). Jusikom : Jurnal Sistem Komputer Musirawas, 4(1), 19–24. https://doi.org/10.32767/jusikom.v4i1.443
[18] Sutiman, Gunawan, A. (2021). Firewall Port Security Switch Untuk Keamanan Jaringan Komputer Menggunakan Cisco Router 1600S Pada Pt. Tirta Kencana Tata Warna Sukabumi. CONTEN (Computer and Network Technology), 1(1), 13–22.
[19] Wardi, W., Basri Hasanuddin, Z., Andani, A., Jo Salli, J., & Muhammad Syafaat, A. (2020). Improving Network Performance of IP PBX Based Telecommunication System. Lontar Komputer : Jurnal Ilmiah Teknologi Informasi, 11(2), 101. https://doi.org/10.24843/lkjiti.2020.v11.i02.p04
[20] I. Sari, M. Yamin, L. M. F. Aksara, J. T. Informatika, F. Teknik, and U. H. Oleo, “Sistem Monitoring Serangan Jaringan Komputer Berbasis WEB Service Menggunakan Honeypot Sebagai Intrusion Prevention System,” vol. 5, no. 1, pp. 35–44, 2019.
[21] R. Apriani, A. H. Jatmika, dan I. W. A. Arimbawa, “Implementasi Metode Intrusion Detection System ( IDS ) dan Port Knocking Pada Serangan Sistem Keamanan Dalam Jaringan Komputer,” vol. 1, no. 1, 2019.
[22] Setiawan, Aidil, and Tamsir Ariyadi. "Manajemen VLAN Dan Switch Port Security Sebagai Keamanan Jaringan PT. PLN (Persero) Unit Layanan Pelanggan Ampera." Prosiding Seminar Hasil Penelitian Vokasi (Semhavok). Vol. 3. No. 1. 2021.
[23] PRATAMA, MUHAMMAD FIERO PANGESTU, Ahmad Heryanto, and Tri Wanda Septian. Implementasi Port Security Untuk Membatasi Akses Port Pada Switch Cisco. Diss. Sriwijaya University, 2021.
[24] BERNADUS, I Nyoman; GUNANTARA, Nyoman; SAPUTRA, Komang Oka. Analisis Kinerja Jaringan Internet dengan Metode Class Based Queueing di Universitas Dhyana Pura. Majalah Ilmiah Teknologi Elektro, [S.l.], v. 18, n. 1, p. 133-140, may 2019. ISSN 2503-2372.
[25] Zara, Sukma Syaida, Andi Marwan Elhanafi, and Divi Handoko. "Pemodelan Jaringan Wan Dengan Teknologi Frame Relay Dengan Memanfaatkan Switch Port Security Sebagai Sistem Keamanan Jaringan." SEMINAR NASIONAL TEKNOLOGI INFORMASI & KOMUNIKASI. Vol. 1. No. 1. 2020.
[26] Sudaryanto, S. (2018). Implementation Port Security for Security Systems Network at the Computing Laboratory of Adisutjipto College of Technology. Conference SENATIK STT Adisutjipto Yogyakarta, 4. https://doi.org/10.28989/senatik.v4i0.239
[27] Al Fikri, Khashaaisha, and Djuniadi Djuniadi. "Keamanan Jaringan Menggunakan Switch Port Security." InfoTekJar: Jurnal Nasional Informatika dan Teknologi Jaringan 5.2 (2021): 302-307.
[28] Dandi, Muhammad. Analisis Keamanan Jaringan Wireless Pada Smp Negeri 1 Walenrang Menggunakan Switch Security. Diss. Universitas Cokroaminoto Palopo, 2020.
[29] Imani, Muhamad Yusuf, Nur Rachman Supadmana Muda, and Prisca Chorina. "Implementasi Backbone Network Security System Menggunakan Firewall Pada Komunikasi Hybrid." Jurnal Telkommil 2.Mei (2021): 49-54.
[30] Fahrizal, F., & Candra, B. A. (2022). Implementasi Access Control List Dalam Perancangan Virtual Local Area Network Pada PT CAKRAMEDIA INDOCYBER. JEIS: Jurnal Elektro dan Informatika Swadharma, 2(2), 36-43.
Published
2022-12-13
How to Cite
ANGGRENI, Ni Komang Ayu Sri; JASA, Lie. Literatur Review Analisis metode De-Militarized Zone (DMZ) dan Switch Port Security Sebagai Metode Keamanan Jaringan. Majalah Ilmiah Teknologi Elektro, [S.l.], v. 21, n. 2, p. 195-200, dec. 2022. ISSN 2503-2372. Available at: <https://ojs.unud.ac.id/index.php/jte/article/view/88974>. Date accessed: 26 apr. 2024. doi: https://doi.org/10.24843/MITE.2022.v21i02.P06.