Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 33 dokumen yang sesuai dengan query
cover
Jacobson, Douglas
Boca Raton: CRC Pres, 2009
005.8 JAC i
Buku Teks SO  Universitas Indonesia Library
cover
Wrightson, Tyler
New York: McGraw-Hill, 2012
005.8 WRI w
Buku Teks SO  Universitas Indonesia Library
cover
Eko Kurniawan
Fakultas Ilmu Komputer Universitas Indonesia, 2003
T40229
UI - Tesis Membership  Universitas Indonesia Library
cover
Stallings, William
Boston: Pearson , 2017
005.8 STA c
Buku Teks SO  Universitas Indonesia Library
cover
Kizza, Joseph Migga
"We will focus on these three components in a computer network. But what is a computer network? The reader should be aware that our use of the phrase computer network , from now on, will refer to the traditional computer network.
A computer network is a distributed system consisting of loosely coupled computers and other devices. Any two of these devices, which we will from now on
refer to as network elements or transmitting elements without loss of generality, can
communicate with each other through a communication medium. In order for these connected devices to be considered a communicating network, there must be a set of communicating rules or protocols each device in the network must follow to communicate with another device in the network. The resulting combination consisting of hardware and software is a computer communication network or computer network in short."
London: Springer-Verlag , 2015
e20528512
eBooks  Universitas Indonesia Library
cover
Stallings, William
"Stallings' Cryptography and Network Security: Principles and Practice introduces students to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. The purpose of this book is to provide a practical survey of both the principles and practice of cryptography and network security. The first part of the book explores the basic issues to be addressed by a network security capability and provides a tutorial and survey of cryptography and network security technology. The latter part of the book deals with the practice of network security, covering practical applications that have been implemented and are in use to provide network security"
United Kingdom: Pearson, 2023
005.13 STA c
Buku Teks SO  Universitas Indonesia Library
cover
Wang, Jie
Singapore: John Wiley & Sons, 2015
004 WAN i
Buku Teks SO  Universitas Indonesia Library
cover
Stallings, William
New York: Pearson, 2018
005.8 STA c
Buku Teks SO  Universitas Indonesia Library
cover
Ibrahim Rijal
"Penelitian ini bertujuan untuk mengembangkan mekanisme pemblokiran yang efek- tif dan efisien pada traffic QUIC, guna mendukung kebutuhan kontrol jaringan, baik untuk tujuan keamanan maupun kebijakan jaringan. Metode penelitian ini men- cakup analisis protokol QUIC, pengembangan algoritma pemblokiran berbasis in- speksi lalu lintas, serta uji coba pada lingkungan simulasi untuk mengukur efektiv- itas mekanisme pemblokiran yang dikembangkan. Hasil penelitian menunjukkan bahwa mekanisme yang diusulkan mampu mengenali dan memblokir lalu lintas QUIC dengan tingkat akurasi yang tinggi tanpa mempengaruhi performa jaringan secara signifikan. Diharapkan, hasil penelitian ini dapat menjadi dasar pengem- bangan lebih lanjut dalam manajemen traffic internet dan keamanan jaringan.

This study aims to develop an effective and efficient blocking mechanism for QUIC traffic to support network control needs, both for security purposes and network policies. Research methods include analyzing the QUIC protocol, developing a traf- fic inspection-based blocking algorithm, and conducting trials in a simulated envi- ronment to measure the effectiveness of the proposed blocking mechanism. The re- sults demonstrate that the proposed mechanism can identify and block QUIC traffic with a high level of accuracy without significantly affecting network performance. It is expected that the findings of this study can serve as a foundation for further development in Internet traffic management and network security."
Depok: Fakultas Teknik Universitas Indonesia, 2025
S-pdf
UI - Skripsi Membership  Universitas Indonesia Library
cover
Faris Humam
"Phishing adalah salah satu jenis penipuan pada Internet berupa halaman web palsu yang meniru halaman web asli untuk menipu pengguna agar mengirim informasi sensitif kepada phisher. Pada data statistik yang disampaikan oleh APWG dan Phistank, jumlah web phishing dari 2015 hingga 2020 cenderung meningkat terus menerus. Untuk mengatasi masalah tersebut telah dilakukan beberapa penelitian terkait diantaranya dengan melakukan pendeteksian halaman web phishing menggunakan berbagai fitur-fitur dari halaman web dengan berbagai metode. Sayangnya penggunaan beberapa metode yang dilakukan dinilai sebagian pihak kurang efektif karena desain dan evaluasi hanya terlalu fokus pada capaian akurasi pendeteksian di penelitian namun evaluasi tidak mewakili pengaplikasian di dunia nyata. Padahal sebuah alat pendeteksi keamanan seharusnya membutuhkan efektifitas, performa yang baik, dapat diterapkan, dan tepat guna. Pada penelitian ini penulis melakukan evaluasi beberapa metode dan megusulkan aplikasi berbasis rules yang dapat mendeteksi phishing dengan lebih efisien.

Phishing is a type of fraud on the Internet in the form of fake web pages that mimic the original web pages to trick users into sending sensitive information to phisher. The statistics presented by APWG and Phistank show that the number of phishing websites from 2015 to 2020 tends to increase continuously. To overcome this problem, several studies have been carried out including detecting phishing web pages using various features of web pages with various methods. Unfortunately, the use of several methods is not effective because the design and evaluation are only too focused on the achievement of detection accuracy in research, but evaluation does not represent application in the real world. Whereas a security detection device should require effectiveness, good performance, and deployable. In this study the authors evaluated several methods and proposed rules-based applications that can detect phishing more efficiently."
Depok: Fakultas Ilmu Komputer Universitas Indonesia, 2020
T-pdf
UI - Tesis Membership  Universitas Indonesia Library
<<   1 2 3 4   >>