Main Article Content

Boy Rizky Akbar
Muhammad Iqbal
Arpan

Abstract

Attacks on computer network security are very common, crimes in cyberspace are often carried out by someone and even a group of people who want to penetrate a security data on a network. This activity aims to search, damage, modify, steal and even obtain information or data on the network, one of which is Packet Sniffer attacks. This method is done by monitoring or analyzing data packets that are transmitted from the client computer to the server computer through a computer network. File Transfer Protocol (FTP) is still a reference as a medium used to transfer data with a fast process of uploading and downloading from server to client so that data is more secure, and on FTP Server security.

Downloads

Download data is not yet available.

Article Details

How to Cite
Akbar, B. R., Muhammad Iqbal and Arpan (2022) “Design and Build Data Transfer Process Security on File Transfer Protocol (Ftp) Servers Using Transport Layer Security (Tls) Protocol”, Jurnal Mantik, 6(2), pp. 2664-2675. doi: 10.35335/mantik.v6i2.2786.
References
[1] D. Hari, P. Dewa, ES Pramukantoro, and DP Kartikasari, "Analysis of Security Mechanisms Between TLS / SSL and Crypto in IoT Middleware Communications With HTTP Protocol-Based Subscribers," J. Developer. Technol. inf. and Computing Science., vol. 2, no. 10, pp. 4027–4033, 2018.
[2] S. Gaddafi, S. Nurmuslimah, and FK Anggakusuma, "Implementation of Firewall and Port Knocking for Security Data Transfer on Linux-Based Ftp Server Ubuntu Server,"Nero, vol. 4, no. 3, pp. 181–188, 2019.
[3] Sugiyono, "The computer network security system uses the watchguard firebox method at PT Guna Karya Indonesia," J. CKI, vol. 9, no. 1, pp. 1–8, 2016.
[4] Zulkarnain, "Analyzing FTP Server Security Using Man-In-The-Middle Attack,"Telcomatics, vol. 5, no. 1, pp. 12–18, 2020, doi:10.37253/telcomatics.v5i1.851.
[5] A. Oklilas and B. Irawan, “Implementation of an FTP Server with Transfer Layer Security Method for Data Transfer Security Using CentOS 5.8,”J. Generic, vol. 9, no. 2, pp. 348–355, 2014.
[6] MS Novelan, “SMS Security System on Mobile Devices Using Tiny Encryption Algorithm SMS Security System on Mobile Devices Using Tiny Encryption Algorithm,”J. Phys. conf. Ser., 2018.
[7] J. Polektro and J. Power, “FTP SERVER DESIGN WITHN SECURE SOCKETS SECURITY Journal homepage : http://ejournal.poltektegal.ac.id/index.php/powerelektro,” vol. 8, no. 2, 2020.
[8] Dasril and Adryanto, "Designing Ftp Server With SSL Security on Amik Ibnu Khaldun Palopo Campus,"Juteks, vol. 1, no. 2, pp. 1–6, 2018.
[9] M. Iqbal, M. Zarlis, Tulus, and H. Mawengkang, “Meta-Heuristic Development in Combinatorial Optimization,”J. Phys. conf. Ser., vol. 1255, no. 1, 2019, doi:10.1088/1742-6596/1255/1/012091.
[10] S. Wongkar, A. Sinsuw, and X. Najoan, “Analisa Internet Network Implementation By Combining Lan And Wlan Networks In Lower Kawangkoan Village, Amurang II Region,” J. Tek. Electrical and Computing., vol. 4, no. 6, pp. 62–68, 2015.
[11] MF Adriant and I. Mardianto, “Implementation of Wireshark for Criminalsadapan (Sniffing) Network Data Packets,” Semin. Nas. Scholar, pp. 224–228, 2015, [Online]. Available: https://www.trijurnal.lemlit.trisakti.ac.id/semnas/article/download/139/138.
[12] IB Prasetyo, “ICMP Packet Sniffing Analysis using Wireshark,”Systemation, vol. 8, no. 1, p. 221, 2019, doi:10.32520/stmsi.v8i1.339.
[13] D. Ruwaida and D. Kurnia, "Design of File Transfer Protocol (Ftp) With Open SSL Security on Mikrotik Vpn Network at Dwiwarna High School,"Comput. eng. science. syst. J., vol. 3, no. 1, p. 45, 2018, doi:10.24114/cess.v3i1.8267.
[14] D. Irawan, "Analysis and Tapping of Computer Network Data Packet Transmission Using Wireshark,"anal. and Transm Tapping. Jar Data Packages. computer. Using Wireshark, vol. 7, no. 1, pp. 1–5, 2017.
[15] R. Tri, I. Gunawan, I. Marleni, O. Gregarius, and M. Nanda, “WiFi Security Analysis Using Wireshark,” vol. 1, no. 1, pp. 1-3, 2021.
[16] IPAE Pratama and PA Dharmesta, “Implementation of Wireshark in Monitoring Finger Protocolsgan (Case Study: Intranet of the Department of Information Technology, Udayana University),” Mantik Penusa, vol. 3, no. 1, pp. 94–99, 2019