Simulasi Penggunaan Intrusion Detection System (IDS) Sebagai Keamanan Jaringan dan Komputer

Authors

  • Barany Fachri Universitas Pembangunan Panca Budi, Medan
  • Fadli Hamdi Harahap Universitas Pembangunan Panca Budi, Medan

DOI:

https://doi.org/10.30865/mib.v4i2.2037

Keywords:

Simulation, Intrusion Detection System, Snort, Network and Computer Security

Abstract

In the current era of information technology, computer network security is part of a system that is very important to maintain the validity and integrity of data and to ensure the availability of users' morning services from anywhere and anytime. And on one hand humans are very dependent on information systems. That causes the statistics of network security incidents to increase sharply from year to year. So we need a solution to overcome this, one of which is by simulation. Simulations are carried out to simulate existing real network security systems with properties that are easier to observe than the original system, to determine system performance. In this research, a system that is able to cope with threats that may occur optimally in a fast time is needed, this will speed up the process of handling disruptions and system or service recovery. One way that can be used to overcome or overcome this is to use the Intrusion Detection System (IDS). One application that supports intrusion detection system (IDS) is Snort. Snort is able to do an analysis of the forms of intruder attacks that misuse network protocols

Author Biographies

Barany Fachri, Universitas Pembangunan Panca Budi, Medan

Fakultas Sains Dan Teknologi, Program Studi Sistem Komputer

Fadli Hamdi Harahap, Universitas Pembangunan Panca Budi, Medan

Fakultas Sains Dan Teknologi, Program Studi Sistem Komputer

References

Ertie Nur Hartiwati, “Keamanan Jaringan Dan Keamanan Sistem Komputer Yang Mempengaruhi Kualitas Pelayanan Warnet,†J. Ilm. Inform. Komput. Univ. Gunadarma, pp. 27–33, 2014.

E. K. Dewi, “Analisis Log Snort Menggunakan Network Forensic,†JIPI (Jurnal Ilm. Penelit. dan Pembelajaran Inform., vol. 2, no. 2, pp. 72–79, 2017, doi: 10.29100/jipi.v2i2.370.

E. Risyad, M. Data, and E. S. Pramukantoro, “Perbandingan Performa Intrusion Detection System ( IDS ) Snort Dan Suricata Dalam Mendeteksi Serangan TCP SYN Flood,†J. Pengemb. Teknol. Inf. dan Ilmu Komput., vol. 2, no. 9, pp. 2615–2624, 2018.

M. Mesran, R. Rusiana, and M. Sianturi, “Decision Support System for Termination of Employment using Elimination and Choice Translation Reality Method,†J. Teknol. dan Sist. Komput., vol. 6, no. 4, p. 135, 2018, doi: 10.14710/jtsiskom.6.4.2018.135-138.

Sutarti, P. Pancaro, Adi, and I. Saputra, Fembi, “Implementasi IDS (Intrusion Detection System) Pada Sistem Keamanan Jaringan SMAN 1 Cikeusal,†J. PROSISKO, vol. 5, no. 1, 2018.

Suhartono, “Sistem Pengamanan Jaringan Admin Server Dengan Metode Intrusion Detection System ( Ids ) Snort,†J. Sci. Pinisi, vol. 3, no. April, pp. 60–64, 2017.

A. Lubis and A. Tarigan, “Security Assessment of Web ApplicationThrough Penetration System Techniques,†Jend. Gatot Subroto Km, vol. 4, no. 100, pp. 296–303, 2017.

I. Anugrah and R. H. Rahmanto, “Sistem Keamanan Jaringan Local Area Network Menggunakan Teknik De-Militarized Zone,†PIKSEL Penelit. Ilmu Komput. Sist. Embed. Log., vol. 5, no. 2, pp. 91–106, 2018, doi: 10.33558/piksel.v5i2.271.

A. Essra, U. P. Budi, and M. T. Informatika, “Implementasi Ant-Based Routing Algorithm Pada Mobile Ad Hoc Network ( Manet ),†vol. 2, no. 1, pp. 15–23, 2017.

R. N. Fuad and N. W. Haikal, “Aplikasi Keamanan File Audio Wav ( Waveform ) Dengan,†J. Nas. Inform. dan Teknol. Jar., vol. 1, no. 2, pp. 113–119, 2017.

Supiyandi and D. Kurnia, “Perancangan VLAN pada Jaringan Lokal Web Server LKP Karya Prima Menggunakan Ubuntu Server,†Peranc. VLAN pada Jar. Lokal Web Serv. LKP Karya Prima Menggunakan Ubuntu Serv., vol. 1, no. x, pp. 78–83, 2019.

B. Fachri, “Perancangan Sistem Informasi Iklan Produk Halal Mui Berbasis Mobile Web Menggunakan Multimedia Interaktif,†Jurasik (Jurnal Ris. Sist. Inf. dan Tek. Inform., vol. 3, no. 3, p. 98, 2018, doi: 10.30645/jurasik.v3i0.69.

Downloads

Published

2020-04-25

Issue

Section

Articles