2021
DOI: 10.51662/jiae.v1i2.22
|View full text |Cite
|
Sign up to set email alerts
|

Network Security Monitoring System Via Notification Alert

Abstract: The development of information technology nowadays has become faster, and this makes network security become important. A huge increasing number of computers that are connected makes many gaps in a network. An administrator has an important role in protecting the security of the network. The problem comes when an administrator has human problems such as pain, negligence, and tiredness while needing rapid information when there is an intrusion on the network. This problem can be solved by adding a data traffic … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 0 publications
0
4
0
Order By: Relevance
“…Furthermore, even if not run with high specification computer and bandwidth for large-scale Internet scanning, the Zmap and Masscan applications are consistently fast scanning [25], [26]. According to de Santis [12] research, network scanning applications have high accuracy. The port scanning accuracy rate in the benchmarking test study is 100% in all experiments.…”
Section: Resultsmentioning
confidence: 99%
“…Furthermore, even if not run with high specification computer and bandwidth for large-scale Internet scanning, the Zmap and Masscan applications are consistently fast scanning [25], [26]. According to de Santis [12] research, network scanning applications have high accuracy. The port scanning accuracy rate in the benchmarking test study is 100% in all experiments.…”
Section: Resultsmentioning
confidence: 99%
“…Business Process Management (BPM) is a discipline in operations management in which various methods are used to discover, model, analyze, measure, improve, optimize, and automate business processes [5,6,7,8]. Any combination of methods used to manage a company's business processes is BPM [9].…”
Section: Methodsmentioning
confidence: 99%
“…Only those who have access rights can enter certain ports [19]. Telegram serves as a notification tool accessible from any location, facilitating administrators in promptly detecting and responding to potential attacks [20]. When an attack occurs, the mechanism for an attack on Telegram notifications is that the router's firewall rule will close service ports 22, 23, 80, and 8291.…”
Section: Introductionmentioning
confidence: 99%