Senin, 22 Oktober 2012

SISTEM PENCEGAHAN FLOODING DATA PADA JARINGAN KOMPUTER


ABSTRAKSI

      Suatu serangan ke dalam Server jaringan computer dapat terjadi kapan saja. Baik pada saat administrator sedang kerja atupun tidak. Dengan demikian dibutuhkan sistem pertahanan didalam server itu sendiri yang bisa menganalisa langsung apakah setiap paket yang masuk tersebut adalah data yang diharapkan ataupun data yang tidak diharapkan. Kalau paket tersebut merupakan data yang tidak diharapkan, diusahakan agar komputer bisa mengambil tindakan yaitu dengan mengeblok IP asal paket tersebut.
Pemodelan suatu sistem yang digunakan untuk mengatasi flooding data pada suatu jaringan. Sistem didesain dengan jalan membuat suatu firewall yang aktif yang bisa mendifinisikan setiap data yang masuk kedalam server, apakah data yang datang itu merupakan sebuah data flood atau data yang diperlukan oleh user. Pemodelan dibuat dengan menggunakan bahasa pemrograman Delphi, dan dalam lingkungan jaringan computer berbasis ip address.

 

                                                   DAFTAR  ISI

LEMBAR PENGESAHAN
PLAGIAT TUGAS AKHIR
ABSTRAK.............................................................................................................i
KATA PENGANTAR............................................................................................iii
DAFTAR ISI..........................................................................................................v
DAFTAR GAMBAR DAN TABEL.......................................................................ix

BAB I PENDAHULUAN........................................................................................1
1.1  Latar Belakang.......................................................................................1
1.2  Tujuan....................................................................................................3
1.3  Ruang Lingkup dan Batasan Masalah....................................................3
1.4  Metodologi Penelitian............................................................................3
1.5  Sistematika Pembahasan........................................................................5

BAB II LANDASAN TEORI..................................................................................7
            2.1 Pendahuluan...........................................................................................7
            2.2 Model Referensi OSI..............................................................................9
            2.3Internet Protocol (IP) ............................................................................12
                        2.2.1 Format Alamat IP..................................................................12
            2.4 Macam-macam protokol IP..................................................................13
                        2.4.1 Internet Control Message Protocol (ICMP) .........................13
                                    2.3.1.1 Format header ICMP..............................................14
                        2.4.2 User Datagram Protocol (UDP) ...........................................17
                                    2.4.2.1 Format header UDP...............................................18
                        2.4.3 Transmission Control Protokol (TCP)..................................19
                                    2.4.4.1 Format header TCP................................................20
            2.5 Flood Data............................................................................................23
2.6 Metoda Pengambilan Data...................................................................26
2.7 Metoda Pemblokiran IP.... ...................................................................29
2.8 Rekayasa Perangkat Lunak..................................................................32
            2.8.1 Model Proses Perangkat lunak..............................................32
2.8.2 Model Analisis......................................................................32
2.8.3 Analisis Terstruktur..........................................................................33
2.8.4 Flow Map Diagram...........................................................................34 
2.8.5 Entity Relationship Diagram (ERD).................................................34 
2.8.6 Data Flow Diagram (DFD)...............................................................35

BAB III ANALISIS DAN PERANCANGAN SISTEM.......................................36
            3.1 Spesifikasi Sistem................................................................................36
            3.2 Sistem Operasi dan Alat Bantu yang digunakan..................................37
3.2.1 Windows 98..........................................................................38
3.2.2 Windows 2000 .....................................................................38
3.2.3 Delphi 6.................................................................................39
            3.3 Desain Secara Umum ..........................................................................39
            3.4 Desain Pengambilan Data....................................................................40
            3.5 Desain Pengidentikasian Data..............................................................41
            3.6 Desain Data Base.................................................................................43
                        3.6.1 Pemrosesan data base ICMP dan UDP.................................45
                        3.6.2 Pemrosesan database pada paket TCP..................................46
            3.7 Desain Pengolahan data.......................................................................47
                        3.7.1 Pengolahan Data ICMP.........................................................47
                        3.7.2 Pengolahan Data UDP...........................................................48
                        3.7.3 Pengolahan Data TCP...........................................................50
            3.8 Desain Pemblokiran IP.........................................................................52

BAB IV IMPLEMENTASI DAN PENGUJIAN...................................................53
            4.1 Batasan Pengujian ...............................................................................53
            4.2 Cara pengujian ....................................................................................53
            4.3 Prototype Jaringan Internet .................................................................54
            4.4 Konfigurasi sistem ..............................................................................55
            4.5 Program Penguji...................................................................................56
            4.6 Hasil Pengujian ...................................................................................59
                        4.6.1 Program yang dihasilkan ......................................................59
                                    4.6.1.1 Program secara keseluruhan ..................................59
                                    4.6.1.2 Option program .....................................................60
                                    4.6.1.3 Tabel list data paket datang ...................................64
                                    4.6.1.4 Tabel list IP yang di blok ......................................65
                        4.6.2 Kemampuan sistem dalam mengambil data .........................65
                        4.6.3 Kemampuan sistem dalam mengolah data ...........................67
                        4.6.4 Pengujian ketahanan sistem pada flooding data....................68

BAB V KESIMPULAN DAN SARAN.................................................................72
            5.1 Kesimpulan..........................................................................................72
            5.2 Saran.....................................................................................................73

DAFTAR PUSTAKA
LAMPIRAN


HARGA: Rp. 50.000,-


DOWNLOAD

 

Tidak ada komentar:

Posting Komentar

Entri Populer

Cara Cepat Hamil