Perbandingan Berbeda Alat Keamanan Untuk Mendeteksi Risiko Dalam Jaringan

Penulis

  • Muhammad Iriyanto

DOI:

https://doi.org/10.61306/jnastek.v2i3.47

Kata Kunci:

ALAT KEAMANAN

Abstrak

Today, maintaining network security is a significant challenge. Data that has crossed a network is not regarded as secure. There are many risks, including snipping, phishing, spyware, hacking, and spoofing. Various network threats were covered in this article. There are numerous open-source technologies available to defend against these attacks. This study has examined tools like Acunetix and Intrusion Prevention System (IPS).

Unduhan

Data unduhan belum tersedia.

Referensi

X Dr. Yogesh Kumar Sharma, “Deep and machine Learning Approaches for Anomaly-Based Intrusion Detection of Imbalanced Network Traffic”, IOSR Journal of Engineering (IOSR JEN),ISSN (E):2250-3021, ISSN (P):2278-8719, PP 63-67

Himani Sharma, Er. Meenakshi, Dr. Sandeep Kaur Bhatia (2017),” A COMPARATIVE ANALYSIS AND AWARENESS SURVEY OF PHISHING DETECTION TOOLS”, 2nd IEEE International Conference on Recent Trends in Electronics Information & Communication Technology (RTEICT). DOI: https://doi.org/10.1109/RTEICT.2017.8256835

Pallavi Asrodia, Hemlata Patel (2012),” Analysis of Various Packet Sniffing Tools for Network Monitoring and Analysis”, ISSN No. (Online): 2277-2626, International Journal of Electrical, Electronicsand Computer Engineering, ISSN No. (Online): 2277-2626.

Inderjit Kaur, Harkarandeep Kaur, Er. Gurjot Singh (2014), “Analysing Various Packet Sniffing Tools”, International Journal of Electrical Electronics & Computer Science Engineering Volume 1, Issue 5 (October 2014), ISSN: 2348 2273.

Sunita Saini and Dr. Yogesh Kumar Sharma, “A research study of wireless network security: A Case study”, International Journal of Advanced Research in Computer Science and Software Engineering, volume 6 issue 3, March 2016,ISSN 2277 128X.

Unduhan

Diterbitkan

31-07-2022

Cara Mengutip

Iriyanto, M. . (2022). Perbandingan Berbeda Alat Keamanan Untuk Mendeteksi Risiko Dalam Jaringan. Jurnal Nasional Teknologi Komputer, 2(3), 107–113. https://doi.org/10.61306/jnastek.v2i3.47