Spanning Tree Protocol (STP) Based Computer Network Performance Analysis on BPDU Config Attacks and Take Over Root Bridge Using the Linear Regression Method

Authors

  • Yuliani Indrianingsih Program Studi Informatika, Fakultas Teknologi Industri, Institut Teknologi Dirgantara Adisujtipto, Indonesia
  • Hero Wintolo Program Studi Informatika, Fakultas Teknologi Industri, Institut Teknologi Dirgantara Adisujtipto, Indonesia http://orcid.org/0000-0002-4338-3238
  • Eviana Yulianti Saputri Program Studi Informatika, Fakultas Teknologi Industri, Institut Teknologi Dirgantara Adisujtipto, Indonesia

DOI:

https://doi.org/10.15575/join.v6i2.703

Keywords:

Config BPDU, Linear regression, Spanning Tree Protocol, Take Over Root Bridge

Abstract

Spanning Tree Protocol (STP) is used in manageable switch devices that apply more than one path to the connection between switches. This study aims to assist engineer staff in improving STP network security. Furthermore, the benefit is to improve the STP network security system by using the Spanning Tree Protocol and Virtual Local Area Network (VLAN) trunking mitigation techniques. The results of testing data before STP is attacked, after STP attacked, and anticipatory data. Then a simple linear regression analysis is carried out by the result of that there is not a significant relationship between time and size in the DoS attack, which  48.6% of the time variable is influenced by the size of  variable, while  the remaining 51.4% by other variables. Root attack is 43.8%-time variable is influenced by size variable, the remaining 56.2% by other variables. Correlation between Karl Pearson DoS and root, there is a significant relationship between time and size, with the DoS correlation coefficient (-0.697) in contrast root (-0.662), and paired sample t-test (paired sample t-test) can be concluded the anticipation which is done by using BPDU guard and root guard mitigation.

References

M. Miroshnichenko,“Design And Configuration Of A Factory Network,†Bachelor’s thesis Inf. Technol., 2018.

J. Sidabutar, J. Raya, P. Nutug, and J. Barat, “Desain Jaringan Komputer Terintegrasi Menggunakan Arsitektur Campus LAN,†J. Jaring SainTek, vol. 2, no. 1, pp. 25–32, 2020.

E. Buulolo, F. T. Waruwu, and S. R. Siregar, “Konfigurasi Sharing Internet dan Sharing Printer Dikantor Kepala Desa Dagang Kerawan,†J. ABDIMAS Budi Darma, vol. 1, no. 1, pp. 5–8, 2020.

I. M. Widiarta, S. Esabella, and P. Widiantara, “Analisis Model Pengembangan Infrastruktur Jaringan Komputer Pada Universitas Teknologi Sumbawa Sebagai Inovasi Menggunakan Metode PPDIOO,†J. TAMBORA, vol. 4, no. 2, pp. 99–108, 2020.

A. Wijaya and T. D. Purwanto, “Implementasi Metode Rekayasa Sistem Jaringan Komputer untuk Pengembangan Jaringan,†JEPIN, vol. 5, no. 3, pp. 294–300, 2019.

A. Ayuningtyas, S. Sudaryanto, and D. D. Cessara, “Sistem Manajemen Virtual Local Area Network ( VLAN ) Pada Cisco Catalyst 3750 Berbasis WEB,†J. SIMETRIS, vol. 11, no. 1, pp. 297–306, 2020.

A. I. Wicaksono and C. B. Setiawan, “VLAN Wireless Performance Analysis Of Central Access Point Management Topology According To The Ieee 802.11 Standard,†Compiler, vol. 8, no. 2, pp. 119–130, 2019.

H. Wintolo and A. Farhati, “Pembagian jaringan komputer menggunakan virtual local area network guna mendukung perpustakaan digital,†J. Kaji. Inf. Perpust., vol. 8, no. 2, pp. 133–150, 2020.

W. Saputra and F. Suryawan, “Implementasi VLAN dan Spanning Tree Protocol Menggunakan GNS 3 dan Pengujian Sistem Keamanannya,†Khazanah Inform., pp. 64–72, 2017.

Z. Balogh, Š. Korda, and J. Francis “LAN security analysis and design,†Int. Conf. Appl. Inf. Commun. Technol., 2018.

A. W. Muhammad, I. Riadi, and Sunardi, “Deteksi Serangan DDoS Menggunakan Neural Network dengan Fungsi Fixed Moving Average Window,†JISKa, vol. 1, no. 3, pp. 115–122, 2017.

Z. Munawar and N. I. Putri, “Keamanan Jaringan Komputer Pada Era Big Data,†J. Sist. Inf. – J-SIKA, vol. 02, pp. 14–20, 2020.

B. Fachri and F. H. Harahap, “Simulasi Penggunaan Intrusion Detection System ( IDS ) Sebagai Keamanan Jaringan dan Komputer,†J. MEDIA Inform. BUDIDARMA, vol. 4, no. April, pp. 413–420, 2020.

X. Li, “Application of Data Encryption Technology in Computer Network Communication Security,†ICCASIT, 2020.

R. Dermawati, M. H. Siregar, U. Islam, K. Singingi, and K. Singingi, “Implementasi Honeypot Pada Jaringan Internet Labor Fakultas Teknik UNIKS Menggunakan Dionaea Sebagai Keamanan Jaringan,†J. Ilm. Edutic, vol. 7, no. 1, pp. 20–30, 2020.

N. Hafifah and A. Nurhayati, “Analisis Keamanan Jaringan LAN berdasarkan Log Data CCR ( Cloud Core Router ) pada Laboratorium SMK Telkom Jakarta,†eJournal Mahasiswwa Akad. Telkom Jakarta.

X. Ma and W. Huang, “Introduction to Baselining the Ethernet Traffic of Substation Communication Networks,†2018 IEEE/PES Transm. Distrib. Conf. Expo., pp. 1–9, 2018.

V. James, “Network Automation Methodology for detecting Rogue Switch,†Tech. Libr., p. 337, 2019.

M. Santos and P. A. Alc, “Security in the data link layer of the OSI model on LANs wired Cisco,†J. Sci. Res. Rev. Cienc. E Investig. ´ON, vol. 3, pp. 106–112, 2018.

S. Syed, “Case Study : Intranet Penetration Testing of MUET,†vol. 2020, no. December, pp. 17–19, 2020.

Djumhadi and Riovan Styx Roring,“Perancangan Dan Implementasi Jaringan Failover Menggunakan Protokol Spanning Tree Pada PT. PLN UP3B Kalimantan Timur,†J. Ilm. MATRIK, vol. 22, no. 3, pp. 249–256, 2020.

P. Willis, “A Performance Analysis of the Meshed Tree Protocol and the Rapid Spanning Tree Protocol,†Theses, 2019.

S. Rudroju,“Root Failure Analysis in Meshed Tree Networks,†Theses, 2020.

W. de S. Ferreira ,“Multiple Spanning-Tree (MST) To Improve Enterprise Network Security,†Int. Res. to Pract. Conf. Educ. postgraduates students "Languages Prof. Commun., pp. 480–486, 2020.

A. F. Boy,“Implementasi Data Mining Dalam Memprediksi Harga Crude Palm Oil (CPO) Pasar Domestik Menggunakan Algoritma Regresi Linier Berganda (Studi Kasus Dinas Perkebunan Provinsi Sumatera Utara) Ahmad,†J. Sci. Soc. Res., vol. 4307, no. August, pp. 78–85, 2020.

E. H. Briliant and M. H. S. Kurniawan, “Perbandingan Regresi Linier Berganda dan Regresi Buckley- James Pada Analisis Survival Data Tersensor Kanan,†Proc. 1st STEEEM 2019, vol. 1, no. 1, pp. 1–10, 2019.

N. R. Lase and F. Riandari, “Perancangan Aplikasi Prediksi Jumlah Pendaftar Siswa Baru Dengan Metode Regresi Linier ( Studi Kasus : SMA RK Deli Murni Bandar Baru ),†J. Nas. Komputasi dan Teknol. Infromasi, vol. 3, no. 3, pp. 330–334, 2020.

Downloads

Published

2021-12-26

Issue

Section

Article

Citation Check

Similar Articles

1 2 3 4 > >> 

You may also start an advanced similarity search for this article.