Security And Development Of Modern Computer Networks: A Literature Review On Monitoring, Cyber Threats, And Intelligent Detection Systems
DOI:
https://doi.org/10.62671/jataed.v3i1.92Keywords:
computer networks, network security, cyber threats, network monitoring, attack detectionAbstract
The development of modern computer networks has become a fundamental foundation for the implementation of various digital services in the era of digital transformation. Improvements in network speed, scalability, and integration provide significant benefits for the education, government, industrial, and financial sectors. However, behind these advancements, serious challenges emerge in terms of network security. The increasing complexity of modern network architectures raises the potential for cyber threats that may compromise data confidentiality, integrity, and availability. This study aims to examine the development and security of modern computer networks using a descriptive qualitative approach through a literature review method. Data sources were obtained from scientific articles, academic books, and relevant publications discussing computer networks, network monitoring, cyber threats, and intelligent attack detection systems. The results indicate that cyber threats such as phishing, malware, port scanning, and Distributed Denial of Service (DDoS) remain dominant issues. Network monitoring plays an important role as an early detection mechanism, but it has limitations in handling complex and dynamic attacks. Therefore, the implementation of machine learning-based intrusion detection systems is considered capable of enhancing network security effectiveness. The integration of technology, monitoring systems, and improved user security awareness is a key strategy in building adaptive and sustainable network security systems.
References
Anif, M., Sasono, S. H. W., & Huri, M. D. (2015). Implementation of intrusion detection systems (IDS) using port scanning detection methods in computer networks. TELE (Jurnal Teknik Elektro), 13(1).
Army, W. L., Barovih, G., Seta, H. B., Guntoro, G., & Margiutomo, S. A. S. (2022). Computer network technology. CV Widina Media Utama.
Kurose, J. F., & Ross, K. W. (2021). Computer networking: A top-down approach (8th ed.). Pearson.
Muftiadi, A., Agustina, T. P. M., & Evi, M. (2022). Analysis of phishing threats in online banking services. Jurnal Ilmiah Teknologi Informasi, 7(2), 45–52.
Oppenheimer, P. (2010). Top-down network design (3rd ed.). Cisco Press.
Scarfone, K., & Mell, P. (2012). Guide to intrusion detection and prevention systems (IDPS) (NIST Special Publication 800-94). National Institute of Standards and Technology.
Stallings, W. (2018). Network security essentials: Applications and standards (6th ed.). Pearson.
Sugiyono. (2019). Qualitative, quantitative, and R&D research methods. Alfabeta.
Tanenbaum, A. S., & Wetherall, D. J. (2019). Computer networks (5th ed.). Pearson.
Uzlah, L. I., Saputra, R. A., & Isnawaty. (2024). Cyberattack detection in computer networks using the Random Forest method. JATI (Jurnal Mahasiswa Teknik Informatika), 8(3), 2778–2785.
Wajong, A. M. R. (2012). Vulnerabilities commonly found in computer networks. Journal of Computer, Mathematics and Engineering.
Wardana, G. B. (2020). Data communication and computer networks and their impacts. Universitas Negeri Malang.
Widodo, A. (2017). Implementation of computer network monitoring using The Dude. Jurnal Teknologi Informasi.
Yudianto, M. J., & Noor, J. (2014). Computer networks and their definitions. Ilmukomputer.com.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Dela Susanti, Dirja Nur Ilham

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.










