Security And Development Of Modern Computer Networks: A Literature Review On Monitoring, Cyber Threats, And Intelligent Detection Systems

Authors

  • Dela Susanti Politeknik Aceh Selatan
  • Dina Miftahul Jannah Politeknik Aceh Selatan, Indonesia
  • Amsar Yunan Politeknik Aceh Selatan, Indonesia
  • Depi Ginting Politeknik Aceh Selatan, Indonesia
  • Fera Anugreni Politeknik Aceh Selatan, Indonesia

DOI:

https://doi.org/10.62671/jataed.v3i1.92

Keywords:

computer networks, network security, cyber threats, network monitoring, attack detection

Abstract

The development of modern computer networks has become a fundamental foundation for the implementation of various digital services in the era of digital transformation. Improvements in network speed, scalability, and integration provide significant benefits for the education, government, industrial, and financial sectors. However, behind these advancements, serious challenges emerge in terms of network security. The increasing complexity of modern network architectures raises the potential for cyber threats that may compromise data confidentiality, integrity, and availability. This study aims to examine the development and security of modern computer networks using a descriptive qualitative approach through a literature review method. Data sources were obtained from scientific articles, academic books, and relevant publications discussing computer networks, network monitoring, cyber threats, and intelligent attack detection systems. The results indicate that cyber threats such as phishing, malware, port scanning, and Distributed Denial of Service (DDoS) remain dominant issues. Network monitoring plays an important role as an early detection mechanism, but it has limitations in handling complex and dynamic attacks. Therefore, the implementation of machine learning-based intrusion detection systems is considered capable of enhancing network security effectiveness. The integration of technology, monitoring systems, and improved user security awareness is a key strategy in building adaptive and sustainable network security systems.

References

Anif, M., Sasono, S. H. W., & Huri, M. D. (2015). Implementation of intrusion detection systems (IDS) using port scanning detection methods in computer networks. TELE (Jurnal Teknik Elektro), 13(1).

Army, W. L., Barovih, G., Seta, H. B., Guntoro, G., & Margiutomo, S. A. S. (2022). Computer network technology. CV Widina Media Utama.

Kurose, J. F., & Ross, K. W. (2021). Computer networking: A top-down approach (8th ed.). Pearson.

Muftiadi, A., Agustina, T. P. M., & Evi, M. (2022). Analysis of phishing threats in online banking services. Jurnal Ilmiah Teknologi Informasi, 7(2), 45–52.

Oppenheimer, P. (2010). Top-down network design (3rd ed.). Cisco Press.

Scarfone, K., & Mell, P. (2012). Guide to intrusion detection and prevention systems (IDPS) (NIST Special Publication 800-94). National Institute of Standards and Technology.

Stallings, W. (2018). Network security essentials: Applications and standards (6th ed.). Pearson.

Sugiyono. (2019). Qualitative, quantitative, and R&D research methods. Alfabeta.

Tanenbaum, A. S., & Wetherall, D. J. (2019). Computer networks (5th ed.). Pearson.

Uzlah, L. I., Saputra, R. A., & Isnawaty. (2024). Cyberattack detection in computer networks using the Random Forest method. JATI (Jurnal Mahasiswa Teknik Informatika), 8(3), 2778–2785.

Wajong, A. M. R. (2012). Vulnerabilities commonly found in computer networks. Journal of Computer, Mathematics and Engineering.

Wardana, G. B. (2020). Data communication and computer networks and their impacts. Universitas Negeri Malang.

Widodo, A. (2017). Implementation of computer network monitoring using The Dude. Jurnal Teknologi Informasi.

Yudianto, M. J., & Noor, J. (2014). Computer networks and their definitions. Ilmukomputer.com.

Downloads

Published

2025-12-23

How to Cite

Security And Development Of Modern Computer Networks: A Literature Review On Monitoring, Cyber Threats, And Intelligent Detection Systems. (2025). JATAED: Journal of Appropriate Technology for Agriculture, Environment, and Development, 3(1), 1-3. https://doi.org/10.62671/jataed.v3i1.92

Most read articles by the same author(s)

Similar Articles

1-10 of 21

You may also start an advanced similarity search for this article.