{"title":"IMPLEMENTASI INTRUSION DETECTION SYSTEM MENGGUNAKAN ALGORITMA BLOWFISH Studi Kasus DI DOTA CAFE","authors":"D. Hasibuan, J. Naibaho, Christian P. Simanjuntak","doi":"10.46880/mtk.v5i2.420","DOIUrl":null,"url":null,"abstract":"Cryptography is the study of system security, where the system needs to be secured from interference or threats from irresponsible parties. In everyday life, fraud is often found in important data, one of which is cashier system data. To prevent and overcome this, the concept of network security with the Blowfish Algorithm will be applied. One of the cryptographic algorithms is the Blowfish Algorithm. The Blowfish algorithm is quite simple but strong enough because it has a long keyspace, making it difficult to attack. Unexpected things often occur such as foreign parties who want to enter the system by repeatedly trying the possible username and password, or foreign parties changing the data in the cash register at Dota Café. This system will function to monitor system activity, in this case if the system feels a threat or system disturbance is found.","PeriodicalId":384219,"journal":{"name":"METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi","volume":"226 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.46880/mtk.v5i2.420","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Cryptography is the study of system security, where the system needs to be secured from interference or threats from irresponsible parties. In everyday life, fraud is often found in important data, one of which is cashier system data. To prevent and overcome this, the concept of network security with the Blowfish Algorithm will be applied. One of the cryptographic algorithms is the Blowfish Algorithm. The Blowfish algorithm is quite simple but strong enough because it has a long keyspace, making it difficult to attack. Unexpected things often occur such as foreign parties who want to enter the system by repeatedly trying the possible username and password, or foreign parties changing the data in the cash register at Dota Café. This system will function to monitor system activity, in this case if the system feels a threat or system disturbance is found.