Dadan Rahmat, I. Suherman, Zahara Muharraran, Aulia Khotimah Husna
{"title":"基于入侵检测系统(IDS)的苏卡布米市地方政府计算机网络基础设施非军事区(DMZ)设计","authors":"Dadan Rahmat, I. Suherman, Zahara Muharraran, Aulia Khotimah Husna","doi":"10.31949/infotech.v10i1.7929","DOIUrl":null,"url":null,"abstract":"De-Militarized Zone (DMZ) is a mechanism to protect the internal system from attacks by hackers or other parties who want to enter the system without access rights. The internal system is a confidential information system, the DMZ consists of all open ports that can be seen by outside parties so that hackers attack to crack the server that has the DMZ, so the hacker can only access hosts located in the DMZ. This is done so that internet users who can access the server cannot easily access and reach users on the local network. Within a network, hosts are most vulnerable to attacks that provide services to users outside. As computer networks develop in the Sukabumi City Regional Government, implementing a computer network security system model should be the main focus considering that there are many public services with high security risks and also the absence of a security system that can minimize data or application security risks on computer networks.","PeriodicalId":259913,"journal":{"name":"INFOTECH journal","volume":"37 4","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"PERANCANGAN DE-MILITARISED ZONE (DMZ) BERBASIS INTRUSION DETECTION SYSTEM (IDS) PADA INFRASTRUKTUR JARINGAN KOMPUTER PEMERINTAH DAERAH KOTA SUKABUMI\",\"authors\":\"Dadan Rahmat, I. Suherman, Zahara Muharraran, Aulia Khotimah Husna\",\"doi\":\"10.31949/infotech.v10i1.7929\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"De-Militarized Zone (DMZ) is a mechanism to protect the internal system from attacks by hackers or other parties who want to enter the system without access rights. The internal system is a confidential information system, the DMZ consists of all open ports that can be seen by outside parties so that hackers attack to crack the server that has the DMZ, so the hacker can only access hosts located in the DMZ. This is done so that internet users who can access the server cannot easily access and reach users on the local network. Within a network, hosts are most vulnerable to attacks that provide services to users outside. As computer networks develop in the Sukabumi City Regional Government, implementing a computer network security system model should be the main focus considering that there are many public services with high security risks and also the absence of a security system that can minimize data or application security risks on computer networks.\",\"PeriodicalId\":259913,\"journal\":{\"name\":\"INFOTECH journal\",\"volume\":\"37 4\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-01-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"INFOTECH journal\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.31949/infotech.v10i1.7929\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"INFOTECH journal","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31949/infotech.v10i1.7929","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
PERANCANGAN DE-MILITARISED ZONE (DMZ) BERBASIS INTRUSION DETECTION SYSTEM (IDS) PADA INFRASTRUKTUR JARINGAN KOMPUTER PEMERINTAH DAERAH KOTA SUKABUMI
De-Militarized Zone (DMZ) is a mechanism to protect the internal system from attacks by hackers or other parties who want to enter the system without access rights. The internal system is a confidential information system, the DMZ consists of all open ports that can be seen by outside parties so that hackers attack to crack the server that has the DMZ, so the hacker can only access hosts located in the DMZ. This is done so that internet users who can access the server cannot easily access and reach users on the local network. Within a network, hosts are most vulnerable to attacks that provide services to users outside. As computer networks develop in the Sukabumi City Regional Government, implementing a computer network security system model should be the main focus considering that there are many public services with high security risks and also the absence of a security system that can minimize data or application security risks on computer networks.