Implementasi DNSSec dalam Jaringan Ipv6 pada Cloud Computing
Abstract
Keamanan menjadi salah satu ancaman dibalik Quality of Service yang diberikan sebuah layanan, sehingga keamanan menjadi hal yang sangat diperhatikan. Saat ini telah banyak terjadi kasus kejahatan yang melibatkan masalah keamanan dari sebuah layanan yang ada di internet. DNS (domain name system) menjadi sasaran bagi para pelaku kejahatan, DNS Spoofing menjadi cara yang dilakukan agar memaksa user mengakses situs palsu yang dibuat pelaku kejahatan demi mendapat keuntungan tertentu. Untuk meminimalisir kejahatan terhadap DNS tersebut dapat dilakukan dengan menerapkan DNSSEC. Pembuatan ini memanfaatkan teknologi cloud computing dan berbasis IPv6, DNSSEC merupakan seperangkat protokol yang menambahkan lapisan keamanan untuk domain name system (DNS) lookup dan proses pertukaran informasi terkait domain. Ketika service DNSSEC hidup, maka setiap domain akan terverifikasi oleh public key dan signature digital, dan ketika ada ada spoofing maka user akan terhindar dari perbuatan spoofing tersebut. Untuk jawaban proses berhasil atau tidaknya validasi domain akan dikirimkan ke browser dengan bantuan extensions dnssec validator. Adanya DNSSEC tidak berpengaruh terhadap performa server, didapat dari hasil bahwa ketika servis DNSSEC hidup pemakaian rata-rata cpu 1%, rata-rata memory 80,8%, dan rata-rata throughput 50.58%.Kata kunci: DNSSEC, DNS, Spoofing, Cloud Computing, IPv6References
Abbas, R. (2012). Human perceived quality-of-service for multimedia applications. 2012 International Conference on Multimedia Computing and Systems (ICMCS) (pp. 1-6). Tangier: IEEE.
Septian, P.A. (2015). Masalah keamanan komputer merupakan hal yang sangant penting dalam jaringan komputer. Retrieved from http://dokumen.tips/documents/masalah-keamanan-merupakan-hal-yang-sangat-penting-dalam-jaringan-komputer.html.
Septian, P.A. (2015). Masalah keamanan komputer merupakan hal yang sangant penting dalam jaringan komputer. Retrieved from http://dokumen.tips/documents/masalah-keamanan-merupakan-hal-yang-sangat-penting-dalam-jaringan-komputer.html.
HTG Explains: What is DNS Cache Poisoning?. (2015). Retrieved from http://www.howtogeek.com/161808/htg-explains-what-is-dns-cache-poisoning.
What Are Domain Name System Security Extensions ?. (n.d). Retrieved from http://whatismyipaddress.com/dnssec
IPV6: A Primer for phisical Security Profesionals. (2007). Retrived from http://www.cisco.com/c/en/us/products/collateral/ physical-security/video-surveillance-manager/ prod_white_pa per0900aecd8073c232.html.
Why use clouds?. (n.d). Retrived from http://www.cloud-lounge.org/why-use-clouds.html.
Cabrera, L.F., Vermeulen, A.H., Theimer, M.M. (2010). Constraint-based domain name system. United states patent and trademark (pp. 1-7). Alexandria, Virginia: US Patent.
What Are Domain Name System Security Extensions ?. (n.d). Retrieved from http://whatismyipaddress.com/dnssec
Mell, P., & Grance, T. (2011). The NIST Definition of Cloud Computing. Gaithersburg: Computer Security Division Information Technology Laboratory National Institute of Standards and Technology.
CentOS Linux . (2016). Retrived from https://www.centos.org/about.
Menken, I., & Blokdijk, G. (2010). Cloud Computing Virtualization Specialist Complete Certification Kit : Study Guide Book and Online Course. London: Emereo Pty Ltd.
What is IPv6?. (n.d). Retrived from http://whatismyipaddress.com/ip-v6.
Kernel Virtual Machine. (n.d). Retrived from http://www.linux-kvm.org/page/Main_Page.
What is Dns Spoofing?. (n.d). Retrieved from http://www.securitysupervisor.com/security-q-a/network-security/195-what-is-dns-spoofing.
How Ettercap Works. (2010). Retrived from http://www.brighthub.com/computing/smbsecurity/articles/35545.aspx.
An Introduction to SNMP (Simple Network Management Protocol). (2014). Retrived from https://www.digitalocean.com/community/tutorials/an-introduction-to-snmp-simple-network-management-protocol.
Downloads
Published
Issue
Section
License
Copyright info for authors
1. Authors hold the copyright in any process, procedure, or article described in the work and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors retain publishing rights to re-use all or portion of the work in different work but can not granting third-party requests for reprinting and republishing the work.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) as it can lead to productive exchanges, as well as earlier and greater citation of published work.