The Role of Network Security in Class Conference During COVID-19 Pandemic


  • Ivan Sebastian Edbert Bina Nusantara University
  • Julio Pramaitama Bina Nusantara University
  • Kevin Tio Bina Nusantara University
  • Muhammad Rizky Bina Nusantara University
  • Alvina Aulia Bina Nusantara University



Network Security, Conference Class, Cyber Attack COVID-19, Zoom Bombing


Security is crucial for the network. But there are still system leaks, especially in class conferences during the pandemic. Because of a lot of data exchange and data entry, some viruses are difficult to identify. So, the role of network security is vital. Many viruses spread through links, and others can access cases of misuse of links; the issue is called Zoom bombing. So, from managing the instability of data in and out of conference classes during this pandemic, many activities are carried out online that awareness of more comprehensive network security. With the COVID-19 pandemic, class conferences are prevalent in today’s world. Millions of people use it for various reasons, and one of them is for education. However, there are issues related to the network’s security where users’ data was stolen and impersonated or network trafficking, which will cause fault and disruption in the network. This research have 3 methodologies include Systematic Literature Review, Research Questions (identify the focus of the literature review, which helps process the data more clearly), Result Finding (the study of an existing paper with specific keywords to answer the research questions). As the result, it can be concluded that there are many ways to prevent attacks by improving the network’s security such as network security defense mechanisms and firewall. So that everything can be petrified in terms of comfort in meet conferences so that class conferences activities can run safely.


Plum Analytics

Author Biographies

Ivan Sebastian Edbert, Bina Nusantara University

Computer Science Department, School of Computer Science

Julio Pramaitama, Bina Nusantara University

Computer Science Department, School of Computer Science

Kevin Tio, Bina Nusantara University

Computer Science Department, School of Computer Science

Muhammad Rizky, Bina Nusantara University

Computer Science Department, School of Computer Science

Alvina Aulia, Bina Nusantara University

Computer Science Department, School of Computer Science


G. Elmer, S. J. Neville, A. Burton, and S. Ward-Kimola, “Zoombombing During a Global Pandemic,” Social Media and Society, vol. 7, no. 3, 2021, : 10.1177/20563051211035356.

M. Anghel and G.-C. Pereteanu, “CYBER SECURITY APPROACHES IN E-LEARNING,” in INTED2020 Proceedings, Mar. 2020, vol. 1, pp. 4820–4825. doi: 10.21125/inted.2020.1323.

J. Liu, Z. Tian, R. Zheng, and L. Liu, “A Distance-Based Method for Building an Encrypted Malware Traffic Identification Framework,” IEEE Access, vol. 7, pp. 100014–100028, 2019, doi: 10.1109/ACCESS.2019.2930717.

A. M. Gabor, M. C. Popescu, and A. Naaji, “Security Issues Related To E-Learning Education,” 2017. [Online]. Available:

A. Dahiya, K. Joshi, R. Nandal, R. Yadav, and S. Bal Gupta, “Honeynetbased Defensive mechanism Against DDoS Attacks.”

Z. Wang et al., “Honeynet construction based on intrusion detection,” Oct. 2019. doi: 10.1145/3331453.3360983.

R. Swami, M. Dave, and V. Ranga, “Software-defined Networking-based DDoS Defense Mechanisms,” ACM Computing Surveys, vol. 52, no. 2, May 2019, doi: 10.1145/3301614.

P. G. Shynu, V. G. Menon, R. L. Kumar, S. Kadry, and Y. Nam, “Blockchain-Based Secure Healthcare Application for Diabetic-Cardio Disease Prediction in Fog Computing,” IEEE Access, vol. 9, pp. 45706–45720, 2021, doi: 10.1109/ACCESS.2021.3065440.

B. Rodrigues, E. Scheid, C. Killer, M. Franco, and B. Stiller, “Blockchain Signaling System (BloSS): Cooperative Signaling of Distributed Denial-of-Service Attacks,” Journal of Network and Systems Management, vol. 28, no. 4, pp. 953–989, Oct. 2020, doi: 10.1007/s10922-020-09559-4.

A. al Hayajneh, M. Z. A. Bhuiyan, and I. McAndrew, “Improving internet of things (IoT) security with software-defined networking (SDN),” Computers, vol. 9, no. 1, Mar. 2020, doi: 10.3390/computers9010008.

G. Xu, Y. Cao, Y. Ren, X. Li, and Z. Feng, “Network Security Situation Awareness Based on Semantic Ontology and User-Defined Rules for Internet of Things,” IEEE Access, vol. 5, pp. 21046–21056, Aug. 2017, doi: 10.1109/ACCESS.2017.2734681.

M. T. Arefin, M. R. Uddin, N. A. Evan, and M. R. Alam, “Enterprise network: Security enhancement and policy management using next-generation firewall (ngfw),” Lecture Notes on Data Engineering and Communications Technologies, vol. 66, pp. 753–769, 2021, doi: 10.1007/978-981-16-0965-7_59.

E. by Sabyasachi Pramanik, A. Sharma, S. Bhatia, and D.-N. Le, “An Interdisciplinary Approach to Modern Network Security.”






Abstract 73  .
PDF downloaded 61  .