Cara Hack Wifi Tetangga

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 13

International Journal of P2P Network Trends and Technology- Volume3Issue2- 2013

A Study on Network Security Aspects


and Attacking Methods
P.ARUNA DEVI , S.RANI LASKHMI, K.SATHIYAVAISHNAVI,
Asst professor, Asst professor, Asst professor ,
Dept of Computer Technology , Dept of Computer Technology , Dept of Computer Technology ,
Dr.SNS Rajalakshmi College of Dr.SNS Rajalakshmi College of Dr.SNS Rajalakshmi College of
Arts and Science Arts and Science Arts and Science
Coimbatore-49. Coimbatore-49. Coimbatore-49.

ABSTRACT 3. Types of internet attacks and security methods


4. Security for networks with
Network security has become more important to
internet access
personal computer users, organizations, and the military.
With the advent of the internet, security became a major 5. Current development in network security hardware
concern and the history of security allows a better and software
understanding of the emergence of security technology. The Based on this research, the future of network security is
architecture of the internet, when modified can reduce the forecasted
possible attacks that can be sent across the network.
Knowing the attack methods, allows for the appropriate 1.1 Network Security
security to emerge. Many businesses secure themselves from System and network technology is a key
the internet by means of firewalls and encryption technology for a wide variety of applications. Security
mechanisms. The businesses create an “intranet” to remain
is crucial to networks and applications. There exists a
connected to the internet but secured from possible threats.
The entire field of network security is vast and in an “communication gap” between the developers of
evolutionary stage. In order to understand the research security technology and developers of networks.
being performed today, background knowledge of the Network design is a well developed process that is
internet, its vulnerabilities, attack methods through the based on the Open Systems Interface (OSI) model. The
internet, and security technology is important and therefore OSI model has several advantages when designing
they are reviewed. networks. It offers modularity, flexibility, ease of use,
and standardization of protocols. When considering
KEYWORDS
network security, it must be emphasized that the whole
Internet, Intranet, Attacks, Security, Open Systems
Interface, Department of Defense, Denial Of Service,
network is secure. When developing a secure network,
Secure Socket Layer, Virtual Private Networks, personal the following need to be considered [1]:
identification number 1. Access – authorized users are provided
the means to communicate to and from
1. INTRODUCTION a particular network
2. Confidentiality – Information in
The world is becoming more interconnected the network remains private
with the advent of the Internet and new networking 3. Authentication – Ensure the users of
technology. There is a large amount of personal, the network are who they say they are
commercial, military, and government information on 4. Integrity – Ensure the message has
networking infrastructures worldwide. not been modified in transit
There are currently two fundamentally different 5. Non repudiation – Ensure the user does
networks, data networks and synchronous network not refute that he used the network.
comprised of switches. The internet is considered a data
network. Since the current data network consists of An effective network security plan is developed with
computer based routers, information can be obtained by the understanding of security issues, potential attackers,
special programs, such as “Trojan horses,” planted in needed level of security, and factors that make a
the routers. The vast topic of network security is network vulnerable to attack [1].These tools are
analyzed by researching the following: encryption, authentication mechanisms, intrusion
1. History of security in networks detection, security management and firewalls.
2. Internet architecture and vulnerable “Intranets” are both connected to the internet
security aspects of the Internet and reasonably protected from it.

ISSN: 2249-2615 http://www.internationaljournalssrg.org Page 97


International Journal of P2P Network Trends and Technology- Volume3Issue2- 2013

Network intrusions consist of packets that are protocols are not implemented. This leaves the internet
introduced to cause problems for the following reasons: open to attacks.
• To consume resources uselessly
• To interfere with any system 2.1. Brief History of Internet
resource’s intended function
• To gain system knowledge that can The birth of the internet takes place in 1969 when
be exploited in later attacks Advanced Research Projects Agency Network (ARPA
Net) is commissioned by the Department of Defense
1.2. Differentiating Data Security and Network Security (DOD) for research in networking. The ARPANET is a
success from the very beginning. The ARPANET
Data security is the aspect of security that allows a becomes a high speed digital post office as people use it
client’s data to be transformed into unintelligible data to collaborate on research projects and discuss topics of
for transmission. Strong cryptography in the past can be various interests. The Inter Networking Working Group
easily broken today. Cryptographic methods have to becomes the first of several standards setting entities to
continue to advance due to the advancement of the govern the growing network [10]. Vinton Cerf is elected
hackers as well. When transferring cipher text over a the first chairman of the INWG, and later becomes
network, it is helpful to have a secure network. A secure known as a "Father of the Internet." [10] .In the 1980s,
network will also prevent someone from inserting Bob Kahn and Vinton Cerf are key members of a team
unauthorized messages into the network. Therefore, that create TCP/IP, the common language of all Internet
hard ciphers are needed as well as attack hard networks computers.
[2].
2.2 Security Timeline

The timeline can be started as far back as the


1930s. Polish cryptographers created an enigma
machine in 1918 that converted plain messages to
encrypted text. In 1930, Alan Turing, a brilliant
mathematician broke the code for the Enigma. In the
1960s, the term “hacker” is coined by a couple of
Massachusetts Institute of Technology (MIT) students.
The Department of Defense began the ARPA Net,
which gains popularity as a conduit for the electronic
exchange of data and information [3]. This paves the
way for the creation of the carrier network known today
as the Internet. During the 1970s, the Telnet protocol
was developed.
Figure 1: Based on the OSI model, data security and In the 1990s, Internet became public and the security
network security have a different security function [2]. concerns increased tremendously. Approximately 950
million people use the internet today worldwide [3].
The relationship of network security and data security
to the OSI model is shown in Figure1.It can be seen that 3. INTERNET ARCHITECTURE AND
the cryptography occurs at the application layer; VULNERABLE SECURITY ASPECTS
therefore the application writers are aware of its
existence. Layers above the physical layers are also Fear of security breaches on the Internet is causing
used to accomplish the network security required [2]. organizations to use protected private networks or
Authentication is performed on a layer above the intranets [4]. The Internet Engineering Task Force
physical layer. (IETF) has introduced security mechanisms at various
layers of the Internet Protocol Suite [4]. The security
2. HISTORY OF NETWORK SECURITY architecture of the internet protocol, known as IP
Security, is a standardization of internet security. IP
Recent interest in security was fueled by the crime security, IPsec, covers the new generation of IP (IPv6)
committed by Kevin Mitnick. Kevin Mitnick committed as well as the current version (IPv4). Although new
the largest computer related crime in U.S. history [3]. techniques, such as IPsec, have been developed to
Public networks are being relied upon to deliver financial overcome internet’s best known deficiencies, they seem
and personal information. Internet protocols in the past to be insufficient [5]. Figure 2 shows a visual
were not developed to secure themselves. Within the representation of how IPsec is implemented to provide
TCP/IP communication stack, security secure communications.

ISSN: 2249-2615 http://www.internationaljournalssrg.org Page 98


International Journal of P2P Network Trends and Technology- Volume3Issue2- 2013

3.1. IPv4 and IPv6 Architectures


IPv4 was design in 1980 to replace the NCP
protocol on the ARPANET. The IPv4 displayed many
limitations after two decades [6]. The IPv6 protocol
was designed with IPv4’s shortcomings in mind.
IPv6 is not a superset of the IPv4 protocol; instead
it is a new design. The internet protocol’s design is
so vast and cannot be covered fully.

3.1.1 IPv4Architecture
The protocol contains a couple aspects which
caused problems with its use. These problems do not
all relate to security. The causes of problems with
the protocol are:
1. Address Space
2. Routing
3. Configuration
4. Security
5. Quality of Service

The IPv4 architecture has an address that is 32 bits


wide [6]. This limits the maximum number of
computers that can be connected to the internet. The
small address space of the IPv4 facilitates malicious
code distribution [5].The maximum theoretical size
of the global routing tables was 2.1 million entries
[6].
The TCP/IP based networking of IPv4 requires that
the user supplies some data in order to configure a
network. The user can request appropriate network
configuration from a central server [6].IPsec is a
specific mechanism used to secure the protocol.
IPsec secures the packet payloads by means of
cryptography. IPsec provides the services of
confidentiality, integrity, and authentication [6].

3.1.2 IPv6 Architecture

ISSN: 2249-2615 http://www.internationaljournalssrg.org


Figure 2: IPsec contains a gateway and a tunnel in order to secure communications.[17]
When IPv6 was being developed, emphasis was
placed on aspects of the IPv4 protocol that needed
to be improved. The development efforts were
placed in the following areas:

1. Routing and addressing


2. Multi protocol architecture
3. Security architecture
4. Traffic control
The IPv6 protocol’s address space was
extended by supporting 128 bit addresses. With 128
bit addresses, the protocol can support up to 3.4
*(10)^38 machines.
IPsec is embedded within the IPv6 protocol. IPsec
functionality is the same for IPv4 and IPv6. The
only difference is that IPv6 can utilize the security
mechanism along the entire route [6].

4. ATTACKS THROUGH THE CURRENT


INTERNET PROTOCOL IPV4
There are four main computer security attributes.
These security attributes are confidentiality,
integrity, privacy, and availability. Confidentiality
and integrity still hold to the same definition.
Availability means the computer assets can be
accessed by authorized people [8]. Privacy is the
right to protect personal secrets [8]. Various attack
methods relate to these four security attributes.
Table1 shows the attack methods and solutions.

Table 1: Attack Methods and Security Technology


[8]

Page 99
International Journal of P2P Network Trends and Technology- Volume3Issue2- 2013

Trojans appear to be benign programs to the user,


but will actually have some malicious purpose.
Trojans usually carry some payload such as a virus
[8].

4.1.5 Phishing
Phishing is an attempt to obtain confidential
information from an individual, group, or organization
[9]. Phisher strick users into disclosing personal data,
such as credit card numbers, online bank credentials,
and other sensitive information.

4.1.6 IP Spoofing Attacks


Spoofing means to have the address of the
4.1 Common Internet Attack Methods Computer mirror the address of a trusted computer
in order to gain access to other computers. The
Common internet attacks methods are broken down
identity of the intruder is hidden by different means
into categories. Some attacks gain system
making detection and prevention difficult. With the
knowledge or personal information, such as
current IP protocol technology, IP spoofed packets
eavesdropping and phishing. Attacks can also
cannot be eliminated [8].
interfere with the system’s intended function, such
as viruses, worms and Trojans. The other form of 4.1.7 Denial of Service
attack is when the system’s resources are consumes
Denial of Service is an attack when the system
uselessly, these can be caused by Denial of Service
receiving too many requests cannot return
(DoS) attack. Other forms of network intrusions
communication with the requestors [9]. The system
also exist, such as land attacks, smurf attacks, and
then consumes resources waiting for the handshake
teardrop attacks. These attacks are not as well
to complete. Eventually, the system cannot respond
known as DoS attacks.
to any more requests rendering it without service.
4.1.1 Eavesdropping
4.2 Technology for Internet Security
Interception of communications by an unauthorized
Internet threats will continue to be a major issue in
party is called eavesdropping. Passive
the global world as long as information is
eavesdropping is when the person only secretly
listens to the networked messages. On the other accessible and transferred across the Internet.
hand, active eavesdropping is when the intruder Different defense and detection mechanisms were
listens and inserts something into the developed to deal with these attacks.
communication stream. This can lead to the
4.2.1 Cryptographic systems
messages being distorted. Sensitive information can
be stolen this way [8]. Cryptography is a useful and widely used tool in
security engineering today. It involved the use of
4.1.2 Viruses codes and ciphers to transform information into
Viruses are self replication programs that use files unintelligible data.
to infect and propagate [8]. Once a file is opened,
4.2.2 Firewall
the virus will activate within the system.
A firewall is a typical border control mechanism or
4.1.3 Worms perimeter defense. The purpose of a firewall is to
A worm is similar to a virus because they both are block traffic from the outside, but it could also be
self replicating, but the worm does not require a file used to block traffic from the inside. A firewall is
to allow it to propagate [8]. There are two main the front line defense mechanism against
types of worms, mass mailing worms and network intruders.It is a system designed to prevent
aware worms. Mass mailing worms use email as a unauthorized access to or from a private network.
means to infect other computers. Network aware Firewalls can be implemented in both hardware and
worms are a major problem for the Internet. A software, or a combination of both [8].
network aware worm selects a target and once the
4.2.3 Intrusion Detection Systems
worm accesses the target host, it can infect it by
means of a Trojan or otherwise. An Intrusion Detection System (IDS) is an additional
protection measure that helps ward off computer
intrusions. IDS systems can be software and hardware
4.1.4 Trojans devices used to detect an attack. Some

ISSN: 2249-2615 http://www.internationaljournalssrg.org Page 100


International Journal of P2P Network Trends and Technology- Volume3Issue2- 2013

IDS systems just monitor and alert of an attack, 2. Sophisticated virus checking at
whereas others try to block the attack. the firewall
3. Enforced rules for employee opening
4.2.4 Anti -Malware Software and scanners of e- mail attachments
Viruses, worms and Trojan horses are all examples 4. Encryption for all connections and
of malicious software, or Malware for short. data transfers
Special so called anti Malware tools are used to 5. Authentication by synchronized, timed
detect them and cure an infected system. passwords or security certificates

4.2.5 Secure Socket Layer (SSL) VPN is a private network that uses a public network
The Secure Socket Layer (SSL) is a suite of (usually the Internet)to connect remote sites or users
protocols that is a standard way to achieve a good together. Figure 3 is a graphical representation of an
level of security between a web browser and a organization and VPN network.
website. SSL is designed to create a secure channel,
or tunnel, between a web browser and the web
server, so that any information exchanged is
protected within the secured tunnel. SSL provides
authentication of clients to server through the use
of certificates.

4.3. Security Issues of IP Protocol IPv6


From a security point of view, IPv6 is a
considerable advancement over the IPv4 internet
protocol. Despite the IPv6’s great security
mechanisms, it still continues to be vulnerable to
threats. The possible security problems emerge due
to the following [5]: Figure 3: A typical VPN might have a main LAN at
1. Header manipulation issues the corporate headquarters of a company, other
2. Flooding issues LANs at remote offices or facilities and individual
3. Mobility issues users connecting from out in the field.[14]

Header manipulation issues arise due to the IPsec’s 6. CURRENT DEVELOPMENTS IN NETWORK
embedded functionality [7]. Extension headers put SECURITY
off some common sources of attacks because of The network security field is continuing down the
header manipulation.Spoofing continues to be a same route. The same methodologies are being
security threat on IPv6 protocol. A type of attack used with the addition of biometric identification.
called port scanning occurs when a whole section Biometrics provides a better method of
of a network is scanned to find potential targets authentication than passwords. This might greatly
with open services [5]. reduce the unauthorized access of secure systems.
New technology such as the smart card is surfacing
5. SECURITY IN DIFFERENT NETWORKS in research on network security.
The businesses today use combinations of firewalls, 6.1. Hardware Developments
encryption, and authentication mechanisms to create Hardware developments are not developing rapidly.
“intranets” that are connected to the internet but Biometric systems and smart cards are the only new
protected from it at the same time. Intranet is a private hardware technologies that are widely impacting
computer network that uses internet protocols. security. The most obvious use of biometrics for
Intranets differ from "Extranets" in that the former are network security is for secure workstation logons
generally restricted to employees of the organization for a workstation connected to a network. Each
while extranets can generally be accessed by workstation requires some software support for
customers, suppliers, or other approved parties. When biometric identification of the user as well as,
such access is provided it is usually through a gateway depending on the biometric being used, some
with a firewall, along with user authentication, hardware device. The main use of Biometric
encryption of messages, and often makes use of network security will be to replace the current
virtual private networks (VPNs).To keep the networks password system. Passwords have to be changed
open, with these safeguards: every few months and people forget their password
1. Firewalls that detect and report or lock themselves out of the system by incorrectly
intrusion attempts entering their password repeatedly. Biometrics can

ISSN: 2249-2615 http://www.internationaljournalssrg.org Page 101


International Journal of P2P Network Trends and Technology- Volume3Issue2- 2013

replace this security identification method. Smart


cards are usually a credit card sized digital
electronic media. Smart cards can be used for
everything from logging in to the network to 9. REFERENCES
providing secure Web communications and secure
e mail transactions. Smart cards require anyone [1]Dowd, P.W.; McHenry,J.T., "Network security:
who is using them to enter a personal identification it's time to take it Seriously," Computer, vol.31,
number (PIN) before they’ll be granted any level of no.9, pp.24‐ 28, Sep 1998
access into the system. The PIN is similar to the
PIN used by ATM machines. The PIN is verified [2] Kartalopoulos, S. V., "Differentiating Data
from inside the smart card. The smart card is cost Security and Network Security," Communications,
effective but not as secure as the biometric 2008. ICC '08. IEEE International Conference on,
identification devices. pp.1469‐1473, 19‐23 May 2008

[3]“Security Overview,”
6.2. Software Developments www.redhat.com/docs/manuals/enterprise/RHEL‐4
The software aspect of network security is very ‐ Manual/security‐guide/ch‐sgs‐ov.html.
vast. It includes firewalls, antivirus, intrusion
detection, and much more. The research [4] Molva, R., Institut Eurecom,“Internet Security
development of all security software is not feasible Architecture,” in Computer Networks & ISDN
to study at this point. The goal is to obtain a view Systems Journal, vol. 31, pp. 787‐804, April
of where the security software is heading based on 199913
emphasis being placed now. When new viruses
emerge, the antivirus is updated to be able to guard [5] Sotillo, S., East Carolina University, “IPv6
against those threats. security issues,” August 2006,
www.infosecwriters.com/text_resources/pdf/IPv6_
7. FUTURE TRENDS IN SECURITY SSot illo.pdf.
What is going to drive the Internet security [6] AndressJ., “IPv6:the next internet protocol,”
is the set of applications more than anything else. April 2005,
The future will possibly be that the security is
www.usenix.com/publications/login/2005‐
similar to an immune system. The immune system
04/pdfs/andress0504.pdf.
fights off attacks and builds itself to fight tougher
enemies. Many security developments that are [7]Warfield M., “Security Implications of IPv6,”
taking place are within the same set of security
Internet Security Systems White
technology that is being used today with some
Paper,documents.iss.net/whitepapers/IPv6.pdf
minor adjustments.
[8] Adeyinka,O., "Internet Attack Methods and
8. CONCLUSION
Internet Security Technology,"
Modeling&Simulation, 2008. AICMS 08. Second
Network security is an important field that is
Asia International Conference on, vol., no., pp.77‐
increasingly gaining attention as the internet expands.
The security threats and internet protocol were 82, 13‐15 May 2008
analyzed to determine the necessary security
[9] Marin,G.A., "Network security basics,"
technology. The security technology is mostly
software based, but many common hardware devices
Security& Privacy, IEEE , vol.3, no.6, pp. 68‐
are used. The current development in network security 72,Nov.‐Dec. 2005
is not very impressive. It was a surprise to see most of
[10] “Internet History Timeline,”
the development taking place in the same technologies
being currently used. The embedded security of the www3.baylor.edu/~Sharon_P_Johnson/etg/inthistor
new internet protocol IPv6 may provide many benefits y.htm
to internet users. Combined use of IPv6 and security
[11] Landwehr, C.E.;Goldschlag,D.M., "Security
tools such as firewalls, intrusion detection, and
issues in networks with Internet access,"
authentication mechanisms will prove effective in
guarding intellectual property for the near future. The Proceedings of the IEEE, vol.85, no.12, pp.2034‐
network security field may have to evolve more 2051,Dec 1997
rapidly to deal with the threats further in the future.
[12] "Intranet." Wikipedia, The Free Encyclopedia.
23 Jun 2008, 10:43UTC. Wikimedia Foundation,
ISSN: 2249-2615 http://www.internationaljournalssrg.org Page 102
International Journal of P2P Network Trends and Technology- Volume3Issue2- 2013

Inc. 2 Jul 2008 [16]Curtin, M. “Introduction to Network Security,”


<http://en.wikipedia.org/w/index.php?title=Intranet http://www.interhack.net/pubs/network‐security.
&ol did=221174244>.
[13] "Virtual private network."Wikipedia, The Free [17] “Improving Security,”
Encyclopedia. 30 Jun 2008, 19:32UTC. Wikimedia Http://www.cert.org/tech_tips, 2006.
Foundation, Inc. 2 Jul 2008
<http://en.wikipedia.org/w/index.php?title=Virtual [18] Serpanos,D.N.; Voyiatzis, A.G., "Secure
_private_network&oldid=222715612>. network design: A layered approach," Autonomous
Decentralized System, 2002. The 2nd International
[14] Tyson,J., ”How Virtual private networks Workshop on, vol., no., pp. 95‐100, 6‐7Nov. 2002
work,” http://www.howstuffworks.com/vpn.htm.
[19]Ohta, T.; Chikaraishi, T., "Network security
[15] Al‐Salqan, Y.Y., "Future trendsin Internet model," Networks, 1993. International Conference
security," Distributed Computing Systems, 1997., on Information Engineering '93. 'Communications
Proceedings of the Sixth IEEE Computer Society and Networks forthe Year 2000', Proceedings of
Work shop on Future Trends of, vol., no., pp.216‐ IEEE Singapore International Conference on ,
217, 29‐31Oct 1997 vol.2, no., pp.507‐511 vol.2, 6‐11 Sep 1993

ISSN: 2249-2615 http://www.internationaljournalssrg.org Page 103


REVIEW JURNAL
Judul A Study on Network Security Aspects and Attacking Methods

Jurnal internationaljournalssrg
Download https://pdfs.semanticscholar.org/377f/c5ac53e0fdc10e6b7c0fbd2a24733dbae1bb.pdf
International Journal of Computer Science and Mobile
Volume & Halaman =1&cad=rja&uact=8&ved=0ahUKEwj14L6js7vYAhWGHpQKHfJcAJAQFggoMAA&url=ht
Vol. 3,pg.97 – 103
Tahun 2013
Penulis P.ARUNA DEVI,S.RANI LASKHMI,K.SATHIYAVAISHNAVI

Abstrak Jurnal yang berjudul ” A Study on Network Security Aspects and Attacking Methods”
ini berisi tentang Kemanan Jaringan Menjadi Penting bagi Pengguna
Pribadi,organisasi,Militer.Banyak Bisnis Mengamankan Diri dari internet dengan
Firewall,dan Enkripsi mekanisme

Abstrak yang disajikan penulis Mudah di pahami dan saya Langsung Mengetahui
apa yang ingin si penulis sampaikan hanya dari membaca Abstraknya
Pendahuluan Didalam Baris pertama, penulis Menjelaskan tentang Jaringan,Jaringan di bagi
menjadi 2 jaringan data dan jaringan sinkron terdiri dari switch.dan beberapa
aspek topik yang luas tentang keamanan jaringan dianalisis menjadi 5 aspek.

There are currently two fundamentally different networks, data networks and synchronous
network comprised of switches.
The vast topic of network security is analyzed by researching the following:
1. History of security in networks
2. Internet architecture and vulnerable security aspects of the
Internet
3. Types of internet attacks and security methods
4. Security for networks with internet access
5. Current development in network security hardware and software
Based on this research, the future of network security is forecasted

Isi I.Keamanan Jaringan,II.Sejarah Keamanan Jaringan,III.Arsitektur Internet dan


Aspek Keamanan Yang Berharga,IV.Serangan Melalui Arus Protokol
Internet IPV V.Keaman di Jaringan yang Berbeda,VI.Pengembangan Aliran
di Keamanan Jaringan,Tren Keamanan Jaringan

Pada bagian I Kemanan Jaringan Terdapat 2 subjudul pada bagian pertama Si penulis
Ingin kita tau bahwa Sistem dan Teknologi Jaringan adalah kunci teknologi untuk berbagai
macam aplikasi,desain jaringan adalah proses yang berkembang berdasarkan Open
System Interface(OSI).dan menjelaskan tentang Keunggulan OSI,hal hal yang di perlukan
dalam mengembangkan keamanan jaringan

System and network technology is a key technology for a wide variety of


applications. Security is crucial to networks and applications. There exists a
“communication gap” between the developers of security technology and developers of
networks. Network design is a well developed process that is based on the Open Systems
Interface (OSI) model. The OSI model has several advantages when designing networks.
It offers modularity, flexibility, ease of use, and standardization of protocols. When
considering network security, it must be emphasized that the whole network is secure.
When developing a secure network, the following need to be considered [1]:
6. Access – authorized users are provided the means to communicate to and
from a particular network
7. Confidentiality – Information in the network remains private
8. Authentication – Ensure the users of the network are who they say they
are
9. Integrity – Ensure the message has not been modified in transit
10. Non repudiation – Ensure the user does not refute that he used the
network.

Pada bagian Keamanan Jaringan Sub judul kedua


Si penulis ingin kita tau Membedakan kemanan data dan keamanan Jaringan
Kemanan data,lalu si peniliti menjelaskan keamanan data,dan hubungan kemanan
jaringan dan kemanan data model OSI.

Data security is the aspect of security that allows a client’s data to be transformed into
unintelligible data for transmission. Strong cryptography in the past can be easily broken
today.
The relationship of network security and data security to the OSI model is shown in
Figure1

Pada Sub Judul Kedua Yaitu Sejarah Keamanan Jaringan di bagi mejadi 3
sub judul

Pada bagian pertama Penulis ingin kita Awal mula ketertarikan baru baru ini
keamanan di dasari oleh kejahatan yang di lakukan oleh Kevin Mitnick.

Recent interest in security was fueled by the crime committed by Kevin Mitnick. Kevin
Mitnick committed the largest computer related crime in U.S.

Pada bagian kedua Penulis memberitahu sejarah singkat internet yang lahir
pada 1969 ketika Advanced Research Project Agency Network(ARPA) di
tugaskan di Departemen Pertahanan(DOD).

The birth of the internet takes place in 1969 when Advanced Research Projects
Agency Network (ARPA Net) is commissioned by the Department of Defense
(DOD) for research in networking.

Pada Bagian Sub Ketiga membahas tentang Timeline keamanan,kriptografer


polandia menciptakan sebuah teka teki mesin pada tahun 1918 yang mengubah
pesan polos menjadi teks pada tahun 1930 dan pada tahun 1960 Alan
Truing,Mendapat panggilan hacker karna telah memecahkan kode untuk
enigma,dan pada tahun 1970 protokol telnet di kembangankan,pada tahun 1990
internet menjadi bisa di gunakan publik hingga saat ini
The timeline can be started as far back as the 1930s. Polish cryptographers created an
enigma machine in 1918 that converted plain messages to encrypted text. In 1930, Alan
Turing, a brilliant mathematician broke the code for the Enigma
During the 1970s, the Telnet protocol was developed.
In the 1990s, Internet became public and the security concerns increased tremendously.

Pada Subjudul III Arsitektur Internet dan Aspek Kemanan Berharga Terdapat 3 Sub
Judul

Pada bagian pertama membahas tentang Mekanisme keamanan jaringan lapisan


Internet Protocol Suite yang di perkenalkan oleh The Internet Engineering Task
Force(IETF).

The Internet Engineering Task Force (IETF) has introduced security mechanisms at
various layers of the Internet Protocol Suite

Pada SubJudul Pertama Memperkenalkan Arsitektur IPv4 dan IPv6


Membahas tentang IPv4 di rancang pada tahun 1980 untuk menggantikan
NCP,dan IPv6 adalah desain baru dan protocol desainnya begitu luas dan tidak
bisa di tutup semuanya.

IPv4 was design in 1980 to replace the NCP protocol on the ARPANET. The IPv4
displayed many limitations after two decades [6]. The IPv6 protocol was designed with
IPv4’s shortcomings in mind. IPv6 is not a superset of the IPv4 protocol; instead it is a
new design. The internet protocol’s design is so vast and cannot be covered fully

Pada subjudul kedua Membahas tentang Arsitektur IPv6


Saat IPv6 dikembangkan, penekanannya adalah
ditempatkan pada aspek protokol IPv4 yang dibutuhkan
untuk diperbaiki Upaya pengembangannya adalah
ditempatkan di area berikut:
1. Routing dan pengalamatan
2. Arsitektur multi protokol
3. Arsitektur keamanan
4. Kontrol lalu lintas
Ruang alamat protokol IPv6 berada
diperpanjang dengan mendukung alamat 128 bit.

When IPv6 was being developed, emphasis was placed on aspects of the IPv4 protocol
that
needed to be improved. The development efforts were placed in the following areas:

1. Routing and addressing


2. Multi protocol architecture
3. Security architecture
4. Traffic control
The IPv6 protocol’s address space was extended by supporting 128 bit addresses

Pada Subjudul ke IV Serangan Melalui Arus Protokol Internet IPv4

Membahas tentang empat element utama keaman komputer,atribut keamanan.


Ada empat atribut keamanan komputer utama.
Atribut keamanan ini adalah kerahasiaan,
integritas, privasi, dan ketersediaan. Kerahasiaan
dan integritas masih berpegang pada definisi yang sama.
Ketersediaan berarti aset komputer bisa jadi
diakses oleh orang yang berwenang [8]. Privasi adalah
hak untuk melindungi rahasia pribadi [8]. Berbagai serangan
Metode berhubungan dengan keempat atribut keamanan ini.
There are four main computer security attributes. These security attributes are
confidentiality, integrity, privacy, and availability. Confidentiality and integrity still hold
to the same definition. Availability means the computer assets can be accessed by
authorized people [8]. Privacy is the right to protect personal secrets [8]. Various attack
methods relate to these four security attributes. Table1 shows the attack methods and
solutions.

Pada sub judul pertama membahas tentang metode serangan internet yang umum
Metode serangan internet yang umum dipecah
ke dalam kategori. Beberapa serangan mendapatkan sistem
pengetahuan atau informasi pribadi, seperti
menguping dan phishing
dan membahas beberapa virus dan serangan.
Common internet attacks methods are broken down into categories. Some attacks gain
system knowledge or personal information, such as eavesdropping and phishing

Pada subjudul ke V Keamanan Di Jaringan Yang Berbeda

Bisnis saat ini menggunakan kombinasi firewall,


enkripsi, dan mekanisme otentikasi untuk dibuat
"Intranet" yang terhubung ke internet tapi
dilindungi dari itu pada waktu yang sama. Intranet adalah a
jaringan komputer pribadi yang menggunakan internet
protokol

The businesses today use combinations of firewalls, encryption, and authentication


mechanisms to create “intranets” that are connected to the internet but protected from it at the
same time. Intranet is a private computer network that uses internet protocols.

Pada Subjudul Ke VI Perkembangan saat ini Di Keamanan Jaringan

Membahas tentang perkembangan keras dari Sistem biometric dan smartcard


hingga workstation dan juga membahas tentang perkembangan perangkat lunak

Hardware developments are not developing rapidly. Biometric systems and smart cards
are the only new hardware technologies that are widely impacting security. The most
obvious use of biometrics for network security is for secure workstation logons for a
workstation connected to a network. Each workstation requires some software support for
biometric identification of the user as
The software aspect of network security is very vast. It includes firewalls, antivirus,
intrusion detection, and much more.

Pada Subjudul VII Tren Masa Depan Di Keamanan Jaringan

Apa yang akan mendorong keamanan Internet


adalah seperangkat aplikasi lebih dari apa pun.
Masa depan mungkin keamanannya
mirip dengan sistem kekebalan tubuh. Sistem kekebalan tubuh
berjuang dari serangan dan membangun dirinya sendiri untuk berjuang
lebih keras
musuh. Banyak perkembangan keamanan itu
Berlangsung berada dalam keamanan yang sama
teknologi yang sedang digunakan saat ini dengan beberapa
sedikit penyesuaian

What is going to drive the Internet security is the set of applications more than anything
else. The future will possibly be that the security is similar to an immune system. The
immune system fights off attacks and builds itself to fight tougher enemies. Many security
developments that are taking place are within the same set of security technology that is
being used today with some minor adjustments.

Simpulan Pada bagian kesimpulan, penulis Menjelaskan Pentingnya Kemanan Jaringan


Meski kebanyakan kemanan Jaringan berbasis Perangkat Lunak,dan IPv6 dapat
memberikan banyak manfaat bagi keamanan intelektual dalam waktu dekat.
Kekuatan Penelitian 1. Penjelasan,Penemu hingga Contoh Untuk Mencari Teori di berikan Secara Lengkap
2. Bahasa yang digunakan oleh penulis mudah dipahami maksud dan tujuannya oleh
pembaca. Analisisnya sangat rinci dan mudah dipahami

You might also like