Implementasi Malicious Traffic Untuk Mendeteksi Serangan Siber di SMK Muhammadiyah 1 Yogyakarta
Abstract
The Covid-19 pandemic has had a positive impact including the increasing implementation of information technology in various fields including the education sector. One of them is the increasing use of mobile devices such as cell phones or tote computers that utilize wireless networks. Connecting devices via wireless networks has a serious impact on the potential threat of cyber attacks. The potential threat of cyberattacks on devices during the Covid-19 pandemic is increasing, this is indicated by 975 million anomalous traffic recorded by Badan Siber dan Sandi Negara (BSSN) in 2022. To identify these potential threats, a sensor is needed on the internal network. In this research, it is proposed to implement a cyber attack sensor to detect these potential threats. Based on network traffic monitoring, this research shows that there is a potential for data leakage originating from cell phones. Therefore, the potential for data leakage from cell phones or other devices needs to be evaluated to secure computer systems and networks.
References
Asosiasi Penyelenggara Jasa Internet Indonesia. (2020). Laporan Survei Internet APJII 2019 – 2020. Dalam Asosiasi Penyelenggara Jasa Internet Indonesia (Vol. 2020, hlm. 1–146). Asosiasi Penyelenggara Jasa Internet Indonesia. https://apjii.or.id/survei
Baby, A., Scholar, P. G., & Krishnan, H. (2017). A Literature Survey on Data Leak Detection And Prevention Methods. International Journal of Advanced Research in Computer Science.
Badan Siber dan Sandi Negara. (2023). Lanskap Keamanan Siber Indonesia 2022. Badan Siber dan Sandi Negara.
Budiarti, S., & Rohmah, S. N. (2021). Pemanfaatan Aplikasi Quizizz Sebagai Media Pembelajaran di SMK Muhammadiyah 1 Yogyakarta di Tengah Pendemi. Seminar Nasional Hasil Pelaksanaan Program Pengenalan Lapangan Persekolahan.
Dongdong, Z. (2016). IMEI (International Mobile Equipment Identity) code processing method, IMEI code processing system and terminal.
Fazwan, A. F. B. A., Azhar, A., & Hanif, N. S. B. (2023). Data Leakage on Social Networking Sites [Preprint]. https://doi.org/10.36227/techrxiv.23507040
Hayatunnufus, Riasetiawan, M., & Ashari, A. (2020). Performance Analysis of FIFO and Round Robin Scheduling Process Algorithm in IoT Operating System for Collecting Landslide Data. 2020 International Conference on Data Science, Artificial Intelligence, and Business Analytics (DATABIA), 63–68. https://doi.org/10.1109/DATABIA50434.2020.9190608
Maulana, R. A. (2020). Penerapan Sistem Pendeteksi dan Pencegah Serangan Malware dengan Sensor Maltrail pada Jaringan Server di Diskominfo Tangerang Selatan. Institut Pertanian Bogor.
Perwira, H. N. (2015). Pengembangan Sistem Informasi Perpustakaan Berbasis Web Di SMK Muhammadiyah 1 Yogyakarta. Universitas Negeri Yogyakarta.
Plagemann, T., Goebel, V., Hollick, M., & Koldehofe, B. (2022). Towards Privacy Engineering for Real-Time Analytics in the Human-Centered Internet of Things. https://doi.org/10.48550/ARXIV.2210.16352
Pratiwi, A. P. (2020). Hubungan Intensitas Penggunaan Media Sosial Dengan Kualitas Tidur Pada Siswa Kelas X di SMK Muhammadiyah 1 Yogyakarta. 1(4).
Priyambodo, T. K., Lisan, A. W., & Riasetiawan, M. (2019). Inexpensive Green Mini Supercomputer Based on Single Board Computer Cluster. 10(1).
Ramdhania, A. N., Kurniawan, M. T., & Hediyanto, U. Y. K. S. (2019). Network infrastructure design in connectivity using Inter-VLAN concept in bandung district government. Proceedings of the 3rd International Conference on Telecommunications and Communication Engineering, 111–115. https://doi.org/10.1145/3369555.3369562
Raodia. (2019). Pengaruh Perkembangan Teknologi Terhadap Terjadinya Kejahatan Mayantara (Cybercrime). Jurisprudentie : Jurusan Ilmu Hukum Fakultas Syariah dan Hukum, 6(2), 39. https://doi.org/10.24252/jurisprudentie.v6i2.11399
Riasetiawan, M., Wisnuaji, A., Hariyadi, D., & Febrianto, T. (2021). Pengembangan Aplikasi Information Gathering menggunakan Metode Hybrid Scan berbasis Graphical User Interface. CyberSecurity dan Forensik Digital, 4(1), 44–48. https://doi.org/10.14421/csecurity.2021.4.1.2449
Wang, L.-M., Miskell, T., Morgan, J., & Verplanke, E. (2021). Design of A Multi-Path Reconfigurable Traffic Monitoring System. 2021 IEEE International Conference on Networking, Architecture and Storage (NAS), 1–8. https://doi.org/10.1109/NAS51552.2021.9605385
Copyright (c) 2023 Dedy Hariyadi, Kartikadyota Kusumaningtyas, Burhan Alfironi Muktamar
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.