Simulasi Penggunaan Intrusion Detection System (IDS) Sebagai Keamanan Jaringan dan Komputer
DOI:
https://doi.org/10.30865/mib.v4i2.2037Keywords:
Simulation, Intrusion Detection System, Snort, Network and Computer SecurityAbstract
In the current era of information technology, computer network security is part of a system that is very important to maintain the validity and integrity of data and to ensure the availability of users' morning services from anywhere and anytime. And on one hand humans are very dependent on information systems. That causes the statistics of network security incidents to increase sharply from year to year. So we need a solution to overcome this, one of which is by simulation. Simulations are carried out to simulate existing real network security systems with properties that are easier to observe than the original system, to determine system performance. In this research, a system that is able to cope with threats that may occur optimally in a fast time is needed, this will speed up the process of handling disruptions and system or service recovery. One way that can be used to overcome or overcome this is to use the Intrusion Detection System (IDS). One application that supports intrusion detection system (IDS) is Snort. Snort is able to do an analysis of the forms of intruder attacks that misuse network protocolsReferences
Ertie Nur Hartiwati, “Keamanan Jaringan Dan Keamanan Sistem Komputer Yang Mempengaruhi Kualitas Pelayanan Warnet,†J. Ilm. Inform. Komput. Univ. Gunadarma, pp. 27–33, 2014.
E. K. Dewi, “Analisis Log Snort Menggunakan Network Forensic,†JIPI (Jurnal Ilm. Penelit. dan Pembelajaran Inform., vol. 2, no. 2, pp. 72–79, 2017, doi: 10.29100/jipi.v2i2.370.
E. Risyad, M. Data, and E. S. Pramukantoro, “Perbandingan Performa Intrusion Detection System ( IDS ) Snort Dan Suricata Dalam Mendeteksi Serangan TCP SYN Flood,†J. Pengemb. Teknol. Inf. dan Ilmu Komput., vol. 2, no. 9, pp. 2615–2624, 2018.
M. Mesran, R. Rusiana, and M. Sianturi, “Decision Support System for Termination of Employment using Elimination and Choice Translation Reality Method,†J. Teknol. dan Sist. Komput., vol. 6, no. 4, p. 135, 2018, doi: 10.14710/jtsiskom.6.4.2018.135-138.
Sutarti, P. Pancaro, Adi, and I. Saputra, Fembi, “Implementasi IDS (Intrusion Detection System) Pada Sistem Keamanan Jaringan SMAN 1 Cikeusal,†J. PROSISKO, vol. 5, no. 1, 2018.
Suhartono, “Sistem Pengamanan Jaringan Admin Server Dengan Metode Intrusion Detection System ( Ids ) Snort,†J. Sci. Pinisi, vol. 3, no. April, pp. 60–64, 2017.
A. Lubis and A. Tarigan, “Security Assessment of Web ApplicationThrough Penetration System Techniques,†Jend. Gatot Subroto Km, vol. 4, no. 100, pp. 296–303, 2017.
I. Anugrah and R. H. Rahmanto, “Sistem Keamanan Jaringan Local Area Network Menggunakan Teknik De-Militarized Zone,†PIKSEL Penelit. Ilmu Komput. Sist. Embed. Log., vol. 5, no. 2, pp. 91–106, 2018, doi: 10.33558/piksel.v5i2.271.
A. Essra, U. P. Budi, and M. T. Informatika, “Implementasi Ant-Based Routing Algorithm Pada Mobile Ad Hoc Network ( Manet ),†vol. 2, no. 1, pp. 15–23, 2017.
R. N. Fuad and N. W. Haikal, “Aplikasi Keamanan File Audio Wav ( Waveform ) Dengan,†J. Nas. Inform. dan Teknol. Jar., vol. 1, no. 2, pp. 113–119, 2017.
Supiyandi and D. Kurnia, “Perancangan VLAN pada Jaringan Lokal Web Server LKP Karya Prima Menggunakan Ubuntu Server,†Peranc. VLAN pada Jar. Lokal Web Serv. LKP Karya Prima Menggunakan Ubuntu Serv., vol. 1, no. x, pp. 78–83, 2019.
B. Fachri, “Perancangan Sistem Informasi Iklan Produk Halal Mui Berbasis Mobile Web Menggunakan Multimedia Interaktif,†Jurasik (Jurnal Ris. Sist. Inf. dan Tek. Inform., vol. 3, no. 3, p. 98, 2018, doi: 10.30645/jurasik.v3i0.69.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).