Spanning Tree Protocol (STP) Based Computer Network Performance Analysis on BPDU Config Attacks and Take Over Root Bridge Using the Linear Regression Method
DOI:
https://doi.org/10.15575/join.v6i2.703Keywords:
Config BPDU, Linear regression, Spanning Tree Protocol, Take Over Root BridgeAbstract
References
M. Miroshnichenko,“Design And Configuration Of A Factory Network,†Bachelor’s thesis Inf. Technol., 2018.
J. Sidabutar, J. Raya, P. Nutug, and J. Barat, “Desain Jaringan Komputer Terintegrasi Menggunakan Arsitektur Campus LAN,†J. Jaring SainTek, vol. 2, no. 1, pp. 25–32, 2020.
E. Buulolo, F. T. Waruwu, and S. R. Siregar, “Konfigurasi Sharing Internet dan Sharing Printer Dikantor Kepala Desa Dagang Kerawan,†J. ABDIMAS Budi Darma, vol. 1, no. 1, pp. 5–8, 2020.
I. M. Widiarta, S. Esabella, and P. Widiantara, “Analisis Model Pengembangan Infrastruktur Jaringan Komputer Pada Universitas Teknologi Sumbawa Sebagai Inovasi Menggunakan Metode PPDIOO,†J. TAMBORA, vol. 4, no. 2, pp. 99–108, 2020.
A. Wijaya and T. D. Purwanto, “Implementasi Metode Rekayasa Sistem Jaringan Komputer untuk Pengembangan Jaringan,†JEPIN, vol. 5, no. 3, pp. 294–300, 2019.
A. Ayuningtyas, S. Sudaryanto, and D. D. Cessara, “Sistem Manajemen Virtual Local Area Network ( VLAN ) Pada Cisco Catalyst 3750 Berbasis WEB,†J. SIMETRIS, vol. 11, no. 1, pp. 297–306, 2020.
A. I. Wicaksono and C. B. Setiawan, “VLAN Wireless Performance Analysis Of Central Access Point Management Topology According To The Ieee 802.11 Standard,†Compiler, vol. 8, no. 2, pp. 119–130, 2019.
H. Wintolo and A. Farhati, “Pembagian jaringan komputer menggunakan virtual local area network guna mendukung perpustakaan digital,†J. Kaji. Inf. Perpust., vol. 8, no. 2, pp. 133–150, 2020.
W. Saputra and F. Suryawan, “Implementasi VLAN dan Spanning Tree Protocol Menggunakan GNS 3 dan Pengujian Sistem Keamanannya,†Khazanah Inform., pp. 64–72, 2017.
Z. Balogh, Š. Korda, and J. Francis “LAN security analysis and design,†Int. Conf. Appl. Inf. Commun. Technol., 2018.
A. W. Muhammad, I. Riadi, and Sunardi, “Deteksi Serangan DDoS Menggunakan Neural Network dengan Fungsi Fixed Moving Average Window,†JISKa, vol. 1, no. 3, pp. 115–122, 2017.
Z. Munawar and N. I. Putri, “Keamanan Jaringan Komputer Pada Era Big Data,†J. Sist. Inf. – J-SIKA, vol. 02, pp. 14–20, 2020.
B. Fachri and F. H. Harahap, “Simulasi Penggunaan Intrusion Detection System ( IDS ) Sebagai Keamanan Jaringan dan Komputer,†J. MEDIA Inform. BUDIDARMA, vol. 4, no. April, pp. 413–420, 2020.
X. Li, “Application of Data Encryption Technology in Computer Network Communication Security,†ICCASIT, 2020.
R. Dermawati, M. H. Siregar, U. Islam, K. Singingi, and K. Singingi, “Implementasi Honeypot Pada Jaringan Internet Labor Fakultas Teknik UNIKS Menggunakan Dionaea Sebagai Keamanan Jaringan,†J. Ilm. Edutic, vol. 7, no. 1, pp. 20–30, 2020.
N. Hafifah and A. Nurhayati, “Analisis Keamanan Jaringan LAN berdasarkan Log Data CCR ( Cloud Core Router ) pada Laboratorium SMK Telkom Jakarta,†eJournal Mahasiswwa Akad. Telkom Jakarta.
X. Ma and W. Huang, “Introduction to Baselining the Ethernet Traffic of Substation Communication Networks,†2018 IEEE/PES Transm. Distrib. Conf. Expo., pp. 1–9, 2018.
V. James, “Network Automation Methodology for detecting Rogue Switch,†Tech. Libr., p. 337, 2019.
M. Santos and P. A. Alc, “Security in the data link layer of the OSI model on LANs wired Cisco,†J. Sci. Res. Rev. Cienc. E Investig. ´ON, vol. 3, pp. 106–112, 2018.
S. Syed, “Case Study : Intranet Penetration Testing of MUET,†vol. 2020, no. December, pp. 17–19, 2020.
Djumhadi and Riovan Styx Roring,“Perancangan Dan Implementasi Jaringan Failover Menggunakan Protokol Spanning Tree Pada PT. PLN UP3B Kalimantan Timur,†J. Ilm. MATRIK, vol. 22, no. 3, pp. 249–256, 2020.
P. Willis, “A Performance Analysis of the Meshed Tree Protocol and the Rapid Spanning Tree Protocol,†Theses, 2019.
S. Rudroju,“Root Failure Analysis in Meshed Tree Networks,†Theses, 2020.
W. de S. Ferreira ,“Multiple Spanning-Tree (MST) To Improve Enterprise Network Security,†Int. Res. to Pract. Conf. Educ. postgraduates students "Languages Prof. Commun., pp. 480–486, 2020.
A. F. Boy,“Implementasi Data Mining Dalam Memprediksi Harga Crude Palm Oil (CPO) Pasar Domestik Menggunakan Algoritma Regresi Linier Berganda (Studi Kasus Dinas Perkebunan Provinsi Sumatera Utara) Ahmad,†J. Sci. Soc. Res., vol. 4307, no. August, pp. 78–85, 2020.
E. H. Briliant and M. H. S. Kurniawan, “Perbandingan Regresi Linier Berganda dan Regresi Buckley- James Pada Analisis Survival Data Tersensor Kanan,†Proc. 1st STEEEM 2019, vol. 1, no. 1, pp. 1–10, 2019.
N. R. Lase and F. Riandari, “Perancangan Aplikasi Prediksi Jumlah Pendaftar Siswa Baru Dengan Metode Regresi Linier ( Studi Kasus : SMA RK Deli Murni Bandar Baru ),†J. Nas. Komputasi dan Teknol. Infromasi, vol. 3, no. 3, pp. 330–334, 2020.
Downloads
Published
Issue
Section
Citation Check
License
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
-
Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
-
NoDerivatives — If you remix, transform, or build upon the material, you may not distribute the modified material.
-
No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
- You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation.
- No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.
This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License