Network Integration and Security Using IDS and Tunneling Methods
Edy Nasri, R. Kania, S Tsauri
Available Online 6 March 2020.
- https://doi.org/10.2991/assehr.k.200303.023How to use a DOI?
- computer network, IDS, tunneling
- Security on computer networks is very important to be monitored so that network traffic runs well because a good network architecture can support existing business processes to carry out their duties and responsibilities In a network system a good security is needed so that it can support the company’s business processes. The research location is in PT ABC where there are often difficulties in accessing information due to network disruption, the implementation of network security is still weak and risky to attacks, there is no network monitoring system to monitor traffic based on these problems, it is necessary to design a network integration system with using EoIP and IPsec tunneling methods, implementing IDS (Intrusion Detection System) in network security with snort and establishing a network monitoring system with The Dude. Methods of data collection using literature studies, field analysis and conducting interviews with relevant parties. The development method system uses NDLC (Network Development Life Cycle). The results of the study it was concluded that the application of IDS and Tunneling network security integration systems can overcome the problems that occur so that business processes can run well.
- Open Access
- This is an open access article distributed under the CC BY-NC license.
Cite this article
TY - CONF AU - Edy Nasri AU - R. Kania AU - S Tsauri PY - 2020 DA - 2020/03/06 TI - Network Integration and Security Using IDS and Tunneling Methods BT - Proceedings of the 1st International Multidisciplinary Conference on Education, Technology, and Engineering (IMCETE 2019) PB - Atlantis Press SP - 91 EP - 94 SN - 2352-5398 UR - https://doi.org/10.2991/assehr.k.200303.023 DO - https://doi.org/10.2991/assehr.k.200303.023 ID - Nasri2020 ER -