ABSTRAKSI
Suatu serangan ke dalam Server jaringan computer dapat terjadi kapan
saja. Baik pada saat administrator sedang kerja atupun tidak. Dengan demikian
dibutuhkan sistem pertahanan didalam server itu sendiri yang bisa menganalisa
langsung apakah setiap paket yang masuk tersebut adalah data yang diharapkan
ataupun data yang tidak diharapkan. Kalau paket tersebut merupakan data yang
tidak diharapkan, diusahakan agar komputer bisa mengambil tindakan yaitu dengan
mengeblok IP asal paket tersebut.
Pemodelan suatu sistem yang digunakan untuk
mengatasi flooding data pada suatu jaringan. Sistem didesain dengan jalan
membuat suatu firewall yang aktif yang bisa mendifinisikan setiap data yang
masuk kedalam server, apakah data yang datang itu merupakan sebuah data flood
atau data yang diperlukan oleh user. Pemodelan dibuat dengan menggunakan bahasa
pemrograman Delphi, dan dalam lingkungan jaringan computer berbasis ip address.
DAFTAR ISI
LEMBAR PENGESAHAN
PLAGIAT TUGAS
AKHIR
ABSTRAK.............................................................................................................i
KATA
PENGANTAR............................................................................................iii
DAFTAR
ISI..........................................................................................................v
DAFTAR GAMBAR DAN
TABEL.......................................................................ix
BAB I PENDAHULUAN........................................................................................1
1.1 Latar
Belakang.......................................................................................1
1.2 Tujuan....................................................................................................3
1.3
Ruang Lingkup dan Batasan
Masalah....................................................3
1.4
Metodologi
Penelitian............................................................................3
1.5 Sistematika
Pembahasan........................................................................5
BAB II LANDASAN TEORI..................................................................................7
2.1
Pendahuluan...........................................................................................7
2.2 Model Referensi
OSI..............................................................................9
2.3Internet Protocol (IP)
............................................................................12
2.2.1 Format
Alamat IP..................................................................12
2.4
Macam-macam protokol
IP..................................................................13
2.4.1
Internet Control Message Protocol (ICMP) .........................13
2.3.1.1
Format header ICMP..............................................14
2.4.2
User Datagram Protocol (UDP) ...........................................17
2.4.2.1
Format header UDP...............................................18
2.4.3
Transmission Control Protokol (TCP)..................................19
2.4.4.1
Format header TCP................................................20
2.5
Flood Data............................................................................................23
2.6 Metoda Pengambilan
Data...................................................................26
2.7 Metoda Pemblokiran IP....
...................................................................29
2.8 Rekayasa Perangkat Lunak..................................................................32
2.8.1
Model Proses Perangkat lunak..............................................32
2.8.2 Model
Analisis......................................................................32
2.8.3 Analisis
Terstruktur..........................................................................33
2.8.4 Flow Map
Diagram...........................................................................34
2.8.5 Entity Relationship
Diagram (ERD).................................................34
2.8.6 Data Flow Diagram
(DFD)...............................................................35
BAB III ANALISIS DAN PERANCANGAN SISTEM.......................................36
3.1 Spesifikasi
Sistem................................................................................36
3.2 Sistem Operasi dan Alat Bantu
yang digunakan..................................37
3.2.1
Windows
98..........................................................................38
3.2.2
Windows 2000 .....................................................................38
3.2.3 Delphi
6.................................................................................39
3.3
Desain Secara Umum
..........................................................................39
3.4
Desain Pengambilan
Data....................................................................40
3.5
Desain Pengidentikasian
Data..............................................................41
3.6
Desain Data Base.................................................................................43
3.6.1
Pemrosesan data base ICMP dan UDP.................................45
3.6.2 Pemrosesan database pada paket
TCP..................................46
3.7 Desain Pengolahan
data.......................................................................47
3.7.1 Pengolahan Data
ICMP.........................................................47
3.7.2 Pengolahan Data
UDP...........................................................48
3.7.3 Pengolahan Data
TCP...........................................................50
3.8 Desain Pemblokiran
IP.........................................................................52
BAB IV IMPLEMENTASI DAN PENGUJIAN...................................................53
4.1 Batasan Pengujian
...............................................................................53
4.2 Cara pengujian
....................................................................................53
4.3 Prototype Jaringan Internet
.................................................................54
4.4 Konfigurasi sistem
..............................................................................55
4.5 Program
Penguji...................................................................................56
4.6 Hasil Pengujian
...................................................................................59
4.6.1 Program yang
dihasilkan ......................................................59
4.6.1.1
Program secara keseluruhan ..................................59
4.6.1.2
Option program .....................................................60
4.6.1.3
Tabel list data paket datang ...................................64
4.6.1.4
Tabel list IP yang di blok ......................................65
4.6.2 Kemampuan sistem
dalam mengambil data .........................65
4.6.3 Kemampuan sistem
dalam mengolah data ...........................67
4.6.4 Pengujian
ketahanan sistem pada flooding data....................68
BAB V KESIMPULAN DAN SARAN.................................................................72
5.1
Kesimpulan..........................................................................................72
5.2
Saran.....................................................................................................73
DAFTAR PUSTAKA
LAMPIRAN
Tidak ada komentar:
Posting Komentar