Published: 2025-07-01
Analisis Keamanan DHCP Menggunakan RADIUS Accounting
DOI: 10.35870/jtik.v9i3.3667
Elisa Stefano Franli Purun, Dian Widiyanto Chandra
Article Metrics
- Views 0
- Downloads 0
- Scopus Citations
- Google Scholar
- Crossref Citations
- Semantic Scholar
- DataCite Metrics
-
If the link doesn't work, copy the DOI or article title for manual search (API Maintenance).
Abstract
Every computer needs and must have an IP Address to connect with other computer network users, the IP Address will be automatically distributed to network users using the Router as a DHCP Server. In addition to DHCP, the Router has a DHCP Accounting service that can improve network security with AAA and RADIUS Server features that can be implemented with Freeradius. DHCP Accounting has accounting capabilities for secure START and STOP message transmission, but the flash memory capacity on the C2691 router is around 32 MB, making the DHCP Accounting service not run optimally if it has many users. Using MySQL as a database can be a solution to this problem. When using the DHCP Accounting feature, data from DHCP Accounting will be sent and centralized on Freeradius. Accounting data centralized on Freeradius will be stored using a MySQL database so that the available storage space will be much larger and can accommodate more data from DHCP Accounting, as well as monitoring the network so as to improve network security for users.
Keywords
DHCP Accounting ; Freeradius ; MySQL
Article Metadata
Peer Review Process
This article has undergone a double-blind peer review process to ensure quality and impartiality.
Indexing Information
Discover where this journal is indexed at our indexing page to understand its reach and credibility.
Open Science Badges
This journal supports transparency in research and encourages authors to meet criteria for Open Science Badges by sharing data, materials, or preregistered studies.
How to Cite
Article Information
This article has been peer-reviewed and published in the Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi). The content is available under the terms of the Creative Commons Attribution 4.0 International License.
-
Issue: Vol. 9 No. 3 (2025)
-
Section: Computer & Communication Science
-
Published: %750 %e, %2025
-
License: CC BY 4.0
-
Copyright: © 2025 Authors
-
DOI: 10.35870/jtik.v9i3.3667
AI Research Hub
This article is indexed and available through various AI-powered research tools and citation platforms. Our AI Research Hub ensures that scholarly work is discoverable, accessible, and easily integrated into the global research ecosystem. By leveraging artificial intelligence for indexing, recommendation, and citation analysis, we enhance the visibility and impact of published research.
-
Ariyadi, T., Riyansyah, A. N., Agung, M., & Ikrar, M. A. (2023). Analisis ANALISIS SERANGAN DHCP STARVATION ATTACK PADA ROUTER OS MIKROTIK. Jurnal Ilmiah Informatika, 11(01), 85-93. https://doi.org/10.33884/jif.v11i01.7162.
-
-
Fauzi, A., Irawan, J. D., & Vendyansyah, N. (2020). Rancang Bangun Sistem Manajemen User Aaa (Authentication, Authorization, Accounting) Dan Monitoring Jaringan Hotspot Berbasis Web. JATI (Jurnal Mahasiswa Teknik Informatika), 4(1), 176-183. https://doi.org/10.36040/jati.v4i1.2328.
-
Ikhsan, A. M., & Wagito, W. (2023). Implementasi Freeradius pada Platform Itg Gmedia. JIKO (Jurnal Informatika dan Komputer), 7(1), 147-157. https://doi.org/10.26798/jiko.v7i1.737.
-
Liao, X. Q., Chang, J., & Zhao, A. X. (2013). Design and development of campus network authentication and accounting system based on Radius protocol. Applied Mechanics and Materials, 411, 507-513. https://doi.org/10.4028/www.scientific.net/AMM.411-414.507.
-
-
-
-
-
-
-
-
Wibowo, F., Hasbi, M., & Arafat, Y. (2020). Integrasi Otentikasi Aplikasi Berbasis Web Menggunakan RADIUS (Studi Kasus: Website E-Learning Jurusan Teknik Elektro POLNEP). Jurnal ELIT, 1(2), 1-12. https://doi.org/10.31573/elit.v1i2.51.
-
Yen, T. F., Oprea, A., Onarlioglu, K., Leetham, T., Robertson, W., Juels, A., & Kirda, E. (2013, December). Beehive: Large-scale log analysis for detecting suspicious activity in enterprise networks. In Proceedings of the 29th annual computer security applications conference (pp. 199-208). https://doi.org/10.1145/2523649.2523670.

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Authors who publish with this journal agree to the following terms:
1. Copyright Retention and Open Access License
Authors retain copyright of their work and grant the journal non-exclusive right of first publication under the Creative Commons Attribution 4.0 International License (CC BY 4.0).
This license allows unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
2. Rights Granted Under CC BY 4.0
Under this license, readers are free to:
- Share — copy and redistribute the material in any medium or format
- Adapt — remix, transform, and build upon the material for any purpose, including commercial use
- No additional restrictions — the licensor cannot revoke these freedoms as long as license terms are followed
3. Attribution Requirements
All uses must include:
- Proper citation of the original work
- Link to the Creative Commons license
- Indication if changes were made to the original work
- No suggestion that the licensor endorses the user or their use
4. Additional Distribution Rights
Authors may:
- Deposit the published version in institutional repositories
- Share through academic social networks
- Include in books, monographs, or other publications
- Post on personal or institutional websites
Requirement: All additional distributions must maintain the CC BY 4.0 license and proper attribution.
5. Self-Archiving and Pre-Print Sharing
Authors are encouraged to:
- Share pre-prints and post-prints online
- Deposit in subject-specific repositories (e.g., arXiv, bioRxiv)
- Engage in scholarly communication throughout the publication process
6. Open Access Commitment
This journal provides immediate open access to all content, supporting the global exchange of knowledge without financial, legal, or technical barriers.