Implementing DMZ in Improving Network Security of Web Testing in STMIK AKBA

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    The aims of this research are to design and to implement network security system in internal web testing using DeMilitarized Zone Method and Microtic Router on Siakad server of STMIK AKBA. Data analysis techniques that possible to use is descriptive method. The significances of the study are 1) to avoid the attack of cracker who intend to access the system without permissions and 2) to improve network securityon web testing services on  Siakad server of STMIK AKBA. The data are obtained by having literature review and observation. Literature review assists the researchers to collect the theory on DeMilitarised Zone Method and the previous studies which were used as comparison to the recent study. Obervation was carried out directly to the field to observe the running system. Based on the results and discussion, it is shown that the aplication of  DeMilitarized Zone Method on microtic  can secure the web testing on Siakad server of STMIK AKBA and can maintain the whole series of online services that are available in the server.

     

     


  • Keywords


    Test, measurements, assessments, evaluation, test application.

  • References


      [1] S. Dandamudi and T. Eltaeib, “Firewalls Implementation in Computer Networks and Their Role in Network Security,” J. Multidiscip. Eng. Sci. Technol., vol. 2, no. 3, pp. 408–411, 2015.

      [2] B. Souley and H. Abubakar, “A CAPTCHA – BASED INTRUSION DETECTION MODEL,” Int. J. Softw. Eng. Appl., vol. 9, no. 1, pp. 29–40, 2018.

      [3] M. A. Al-ghazal and M. J. Aljubran, “Upstream Operations : Cybersecurity and Generation Y,” Saudi Aramco J. Technol., 2017.

      [4] S. Prabhakar, “NETWORK SECURITY IN DIGITALIZATION : ATTACKS AND DEFENCE,” Int. J. Res. Comput. Appl. Robot., vol. 5, no. 5, pp. 46–52, 2017.

      [5] A. A. A. Hadi, “Performance Analysis of Big Data Intrusion Detection System over Random Forest Algorithm,” Int. J. Appl. Eng. Res., vol. 13, no. 2, pp. 1520–1527, 2018.

      [6] A. Bala, “Security Attacks and Challenges of Wireless Sensor Network,” Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol., vol. 3, no. 1, pp. 765–770, 2018.

      [7] B. Rababah, S. Zhou, and M. Bader, “Evaluation the Performance of DMZ,” Assoc. Mod. Educ. Comput. Sci., no. January, pp. 0–13, 2018.

      [8] S. M. Hashemi, J. He, and A. E. Basabi, “Multi-objective Optimization for Computer Security and Privacy,” Int. J. Netw. Secur., vol. 19, no. 3, pp. 394–405, 2017.

      [9] M. KHAN, “Computer security in the human life,” Int. J. Comput. Sci. Eng., vol. 6, no. November, 2017.

      [10] V. Selvi, R. Sankar, and R. Umarani, “The Design and Implementation of On-Line Examination Using Firewall security,” IOSR J. Comput. Eng., vol. 16, no. 6, pp. 20–24, 2014.

      [11] M. Zammani and R. Razali, “An Empirical Study of Information Security Management Success Factors,” Int. J. Adv. Sci. Eng. Inf. Technol., vol. 6, no. 6, pp. 904–913, 2016.

      [12] H. Liu, “Design and Implementation of Computer Network Vulnerability Assessment System,” in 5th International Conference on Computer, Automation and Power Electronics, 2017, pp. 145–149.

      [13] M. Behi, M. Ghasemigol, and H. Vahdat-nejad, “A New Approach to Quantify Network Security by Ranking of Security Metrics and Considering Their Relationships,” Int. J. Netw. Secur., vol. 20, no. 1, pp. 141–148, 2018.

      [14] S. Shrimali, “DeMilitarized Zone : Network Architecture for Information Security,” Int. J. Comput. Appl., vol. 174, no. 5, pp. 16–19, 2017.

      [15] Mansyur and Muliana, “Detecting Differential Item Functioning and Differential Test Functioning on Math School Final-exam,” Int. J. Adv. Sci. Eng. Inf. Technol., vol. 6, no. 4, pp. 437–440, 2016.

      [16] A. Iskandar, “The Effect of Open Book Test Model in Improving Students ’ Learning Motivation,” in 2nd International Conference on Education, Science, and Technology, 2017, vol. 149, pp. 204–206.

      [17] A. S. Ahmar et al., “Lecturers’ Understanding on Indexing Databases of SINTA, DOAJ, Google Scholar, SCOPUS, and Web of Science: A Study of Indonesians,” J. Phys. Conf. Ser., vol. 954, 2018.

      [18] L. Akbay and M. Kaplan, “Transition to multidimensional and cognitive diagnosis adaptive testing: an overview of cat,” Online J. New Horizons Educ., vol. 7, no. 1, pp. 206–214, 2017.

      [19] M. Rezaie and M. Golshan, “Computer Adaptive Test (CAT): Advantages and Limitations,” Int. J. Educ. Investig., vol. 2, no. 5, pp. 128–137, 2015.

      [20] A. Puri and N. Sharma, “A Novel Technique For Intrusion Detection System For Network Security Using Hybrid SVM-CART,” Int. J. Eng. Dev. Res., vol. 5, no. 2, pp. 155–161, 2017.


 

View

Download

Article ID: 12627
 
DOI: 10.14419/ijet.v7i2.3.12627




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.