Analisis Pemanfaatan Internet Di Pemerintah Kota Denpasar
Abstract
The usage of the Internet can be described by the traffic characteristics, user behavior, and bandwidth. This research collected Internet traffic data at the government office of Denpasar city in October 2015, for study case of Dinas Perijinan. The result shows the average 90 % volume of TCP protocol and 10 % of others, such as UDP, GRE, and ICMP. There are average 95 % of application port’s volumes were used by IANA’s port, and 5 % by unsigned port, which means it may become a potential to be used as malware and file sharing application. The biggest domain’s volumes were accessed to Youtube and Facebook websites, and also to other malware domain. Based on the observation of user's behaviour, there are 3 of 12 sample users did not understand how to access good link from malware. From the analysis, a limitation access on youtube is one of recommendation actions besides closing malware port and user training.
Downloads
References
[2] Javlonbek, Abdujalilov. “Popularity Of Websites: HTTP Traffic Analysis”. Asian Journal of Computer and Information Systems, 2014, ISSN: 2321 – 5658:AJCIS.
[3] Kumorotomo, Wahyudi. “Kegagalan Penerapan E-Government Dan Kegiatan Tidak Produktif Dengan Internet”. Website: kumoro.staff.ugm.ac.id, 2012.
[4] Black, Scott. “Malware, Spyware, Adware, Viruses”. USA:Clark College, 2013.
[5] Gebert, Steffen. Pries,Rastin. Schlosser, Daniel, Heck, Klaus. “Internet Access Traffic Measurement and Analysis”. Austria: PAM, 2012.
[6] Paramecwari, Komang Tania. Basuki, Achmad. Amron, Kasyful. “Karakteristik Penggunaan Internet di Jaringan Area Kampus (Studi Kasus: PTIIK Universitas Brawijaya)”. Doro Jurnal Volume 3 No 12 2014: Brawijaya
[7] Radbata, Anca. “Internet User Behavior”. Bulletin Of The Transilvania University of Brasov Vol 4 No 2 2011.
[8] Santosa, Budi. “Manajemen Bandwidth Intranet dan Internet”. Website: http://kambing.ui.ac.id/ , 2011.
[9] Sinha, Abhishek. “Bandwidth Monitoring Tools”. UACEE International Journal of Advances in Computer Network and Security-IJCNS 2013 Vol 3. ISSN 2250-3757
Keywords
This work is licensed under a Creative Commons Attribution 4.0 International License