specific IP address, then obtained the best path and
routing, then the administrator will resolve the ticket,
based on the ticket that has been resolved, the
helpdesk will inform the customer that the path
selection request and internet routing to the
destination IP address requested has been completed.
A router is one of the main devices to connect
between one network and another network which also
functions to manage exchanges and data traffic routes
with each other (Thiel, 2014). Routers are also
connected to other routers throughout the world,
which allows two computer networks connected to
different routers to be able to channel their data with
the best travel routes among various alternative
routes. But not always the route determined by the
router is the most optimal or best because of several
factors that can not be known by the router, for
example, there is a relationship in the middle of the
track with full traffic capacity or a transmission
interruption. Thus human interaction is needed as a
network manager to determine the best route for
themselves to a particular destination after checking
the existing path alternatives. A router’s functions are
to read the destination address marked in an incoming
IP packet, to consult its internal information to
identify an outgoing link to which the packet is to be
forwarded, and then to forward the packet (Medhi and
Ramasamy, 2017).
The best path selection and internet routing takes
a long time, because routing access permissions
should only be done at the administrator level,
including each connection of each Uplink Provider
connection, all of which are done manually so that it
helps with the long transition, plus the need for data
access and information for the company's internal
interests as a material for analysis, decisions and
strategic decision making of the company going
forward (Goralski, 2017).
The problems faced in the existing system
mechanism are as follows: it is necessary to examine
alternative paths one by one for two directions
(Upstream and Downstream), so that it takes more
than 1 hour, Requires expert staff at administrator
level who have the highest access rights to Router
configuration changes, with a limited number and not
always ready 24 hours to do so, changes made often
cause disruption of internet access due to inadvertent
conduct in checking and changing internet routing
lines, and not well-documented for information on
changes made as reports to supervisor and
management.
The main objectives expected with the
development of application systems are internet
routing and routing, which are: design and implement
the best internet routing and routing application
system in PT. IndosatM2, provides an easy, precise
and fast system that is the result of automation of the
best internet routing and routing processes., providing
continuity of information systems for the best internet
route and routing selection, providing recapitulation
of the best internet routing and routing processes, so
as to produce information that is more accurate and
can be utilized by internal and company management.
In this paper, we propose the use of a blockchain-
based mechanism to secure the Internet BGP and
DNS infrastructure; A tamper-resistant DNS
infrastructure also ensures that it is not possible for
the application-level PKI to spoof HTTPS traffic
(Hari and Lakshman, 2016).
Nearly all network applications rely on the global
Internet routing infrastructure to compute routes and
deliver packets; unfortunately, false Internet routes
can be maliciously introduced with relative ease into
the routing infrastructure. This is because Border
Gateway Protocol(BGP), the Internet’s global routing
protocol, lacks basic authentication and monitoring
functionalities, currently, it is impossible to prevent
such malicious injection off also traffic routes, we
believe that an ability to identify false paths through
efficient validation, proper recording and forensic
analysis of routing data, will considerably help in the
prosecution of them is creant and will act as a strong
deterrent (Kim, Massey and Ray, 2005).
BGP routing updates collected by monitoring
projects such as Route Views and RIPE have been a
vital source to our understanding of the global routing
system. However, the collected BGP data contains
both the updates generated by actual route changes
and the updates of BGP routing table transfers
resulted from BGP session resets between operational
routers and the data collection stations, In this paper,
we present the design and evaluation of the minimum
collection time (MCT) algorithm. Given a BGP
update stream, MCT can identify the start and
duration of each routing table transfer in the stream
with high accuracy. We evaluated MCT performance
by using three months of BGP data formal l RIPE
collectors. Our results show that out of the total 1664
BGP resets with 166 monitors, MCT can identify
BGP routing table transfers with over 95% accuracy,
and pinpoint the exact starting time of the detected
table transfers in 83% of such cases (Chenga, Zhang,
and Massey, 2011).
Abnormal BGP events such as attacks,
misconfigurations, electricity failures, can cause
anomalous or pathological routing behavior at either
a global level or prefix level, and thus must be
detected in their early stages. Instead of using ad-hoc
ICT4BL 2019 - International Conference on IT, Communication and Technology for Better Life
130