scholarly journals DESIGN OF PRIVATE CLOUD STORAGE  USING SECURITY METHODS IDS AND IPS

2021 ◽  
Vol 15 (4) ◽  
pp. 461-465
Author(s):  
Deval Gusrion ◽  
Silky Safira ◽  
Retno Devita ◽  
Ruri Hartika Zain ◽  
Rini Sovia

Cloud computing is a form of technological progress that has developed along with the times, this has spurred the increasing use of the internet. By usingtechnology internet that is able to implement server a virtual, which has the aim of building a cloud computing server at the District Communications and Information Office. Padang Pariaman uses the Operating System (OS) Proxmox VE (Virtual Environment) 6.4. Cloud computing is able to provide storage services that can be used simultaneously. The results of this study produce a cloud computing server that implements a security system with themethods ids (intrusion detection system) and ips (intrusion prevention system)that are able to process data(storagestorage), use software simultaneously in the network, and use infrastructure within the scope of this research.network cloud computing at the District Communications and Information Office. Padang Pariaman using aservice model private cloud

Author(s):  
Augustin Anggeliung ◽  
Arief Dwi Rachmadian ◽  
Vincent Vincent

The development of technology is very fast, one of them is cloud computing. Cloud computing has been used from various circles and began to be developed. There are various problems that arise in cloud computing, such as problems from data, whether the data will be safe. To ensure that the data is safe, several methods or tools can be used. In this scientific work we use the Intrusion Detection System as an aid tool needed to access the network, including whether packages can protect data in cloud computing. Although the intrusion detection system there are still some shortcomings such as only being able to read some data and the performance will decrease the data very much. To overcome this it is necessary to use several additional tools such as the Intrusion Prevention System which is a refinement of the Intrusion Detection System and using the AES algorithm


Teknika ◽  
2017 ◽  
Vol 6 (1) ◽  
pp. 19-23
Author(s):  
Ery Setiyawan Jullev Atmadji ◽  
Bekti Maryuni Susanto ◽  
Rahardian Wiratama

Keamanan jaringan menjadi hal yang penting untuk semua industri dan perusahaan untuk melindungi data dan informasi penting yang berada didalamnnya. Perlindungan keamanan dalam suatu jaringan umumnya berbasis pada keamanan transmisi data yang dibuat dan diaplikasikan untuk membantu mengamankan suatu jaringan tertentu. Untuk lebih mengoptimalkan pengambilan keputusan maka diperlukan sebuah mesin yang mampu berkolaborasi dengan database IDS maupun IPS, sehingga tipikal serangan yang sangat beragam dapat dipetakan dengan lebih optimal. Salah satu database yang mempunyai rule yang sudah ada adalah IPTABLES, hal ini dikarenakan pada IPTABLES terdapat fungsi firewall yang mampu menangani jenis serangan yang berlipat serta masif. Server yang akan digunakan adalah server dengan sistem operasi Linux. Sedangkan database serangan IDS yang digunakan adalah database KDD 99 yang sudah diakui sebagai salah satu database serangan yang sangat kompleks. Dengan pemanfaatan IPTABLES ini maka diharapkan keamanan server akan bisa dimonitor dengan lebih optimal. IPTABLES biasanya digunakan sebagai salah satu firewall yang digunakan pada server.


Author(s):  
Akshat Divya Akshay ◽  
Anchit Bhushan ◽  
Nihal Anand ◽  
Rishabh Khemka ◽  
Sumithra Devi K.A

The number of computers connecting to the internet is getting increased day by day, while the number of computers connected is increasing then it is obvious that the amount of network-based attacks will also increase. In this way, we use a honeypot that is a framework trap that is set to act against unapproved utilization of PCs and data frameworks. Around the globe, a huge number of individuals get to the web each day, honeypot which can likewise be called Intrusion Detection Technology is another time of security innovation that screens device to avoid malicious sports. The whole factor of this research paper is an Intrusion Detection System and Intrusion Prevention System, elements accomplished via honeypot and honeytrap methodologies. A great deal of research went into this review paper and the discoveries propose that the honeypots are drawing in light of a legitimate concern for analysts as a significant security system that can be actualized to stop or occupy the assaults the system assaults and give a chance to find out increasingly more about the source and nature of these assaults. Hence we can say that a honeypot can be utilized as an examination apparatus to accumulate increasingly more data about the expanding number of system assaults that are going on consistently.


2021 ◽  
Vol 5 (1) ◽  
pp. 60-69
Author(s):  
Farid Wahyudi ◽  
◽  
Listanto Tri Utomo ◽  

Security is very main in computer networks, where many devices are connected to each other to interact and exchange data without limits. Network security is also a very important issue to prioritize, one of which is to use an intrusion prevention system. At PDTI UNIRA there are often network security problems, one of which is that during the test season, the server experiences many intrusion problems. The purpose of this research is to develop a social science system based on the analysis at PDTI of Raden Rahmat Islamic University Malang. This research method uses a computer security development approach, namely the Intrusion Prevention System (IPS), by combining firewall engineering methods and Intrusion-Detection System (IDS). The result of this research is a technology that can be used to prevent attacks that will enter the local network checking and recording all data packets and recognizing sensor packets, when the attack has been identified, IPS will deny access (block) and record (log) all data packets. identified. So IPS acts as a firewall that will allow and block combined with IDS that can detect packets in detail. With a network security system, the Unira PDTI server is safer and can avoid intrusion.


Author(s):  
Sreerama Murthy Kattamuri ◽  
Vijayalakshmi Kakulapati ◽  
Pallam Setty S.

An intrusion detection system (IDS) focuses on determining malicious tasks by verifying network traffic and informing the network administrator for restricting the user or source or source IP address from accessing the network. SNORT is an open source intrusion detection system (IDS) and SNORT also acts as an intrusion prevention system (IPS) for monitoring and prevention of security attacks on networks. The authors applied encryption for text files by using cryptographic algorithms like Elgamal and RSA. This chapter tested the performance of mail clients in low cost, low power computer Raspberry Pi, and verified that SNORT is efficient for both algorithms. Within low cost, low power computer, they observed that as the size of the file increases, the run time is constant for compressed data; whereas in plain text, it changed significantly.


2021 ◽  
Vol 5 (1) ◽  
pp. 180-186
Author(s):  
Tati Ernawati ◽  
Fikri Faiz Fadhlur Rachmat

Computer network systems have been designing to share resources. Sharing resources process, data security, and confidentiality are main issues in anticipating misuse of the access to information by unauthorized parties. The solution to anticipating these problems is the availability of a security system capable of handling various intruders who threaten the system and protect network resources. This study builds and analyzes the performance of computer network security using cowrie honeypot and snort inline-mode as an Intrusion Prevention System (IPS). The development process goes through the stages of analysis, design, implementation, and monitoring. The content analysis method has been using to explore the problems and requirements of the system built. The security system was build by configuring the IP address and network system devices (server, remote admin, client attacker). The test has been carrying out on 3 test parameters (confidentiality, availability, and integrity), comparison testing method has been using to test the integrity parameters. The test results indicate that the system functionality test for user needs have fulfilled, the results of the confidentiality test (83.3%), availability (93.3%), and the integrity of the inline-mode snort show faster response time (0.069 seconds on average) and more CPU resource usage efficient (0.04% average) than the cowrie honeypot. IPS snort inline-mode overall integrity parameter testing is more recommended for used network security systems than cowrie honeypots.  


2020 ◽  
Vol 12 (02) ◽  
pp. 131-144
Author(s):  
Suryayusra Suryayusra ◽  
Dedi Irawan

Perkembangan teknologi yang Semakin hari semakin meningkat, kita di tuntut untuk meningkatkan system keamanan jaringan yang kita miliki, karena semakin mudahnya  orang bisa mengetahui tentang hacking dan cracking dan juga didukung oleh tools yang mudah didapatkan secara gratis. Dan untuk mencegah hal itu kita harus megamankan jaringan yang kita gunakan, untuk mengamankan jaringan tersebut peneliti menggunakan sebuah  metode keamanan yang bernama Intrusion Prevention System (IPS), merupakan media yang banyak digunakan dalam membangun sebuah system keamanan komputer, lalu IPS di gabungkan dengan menggunkan Teknik firewall dan metode Intrusioan Detection System, dalam penelitian ini penulis menggunakan sistem operasi Linux yaitu Ubuntu dan CentOS, karena linux merupakan software yang bersifat free/opensource sehingga untuk memperolehnya dapat diunduh secara gratis. Pada awalnya linux merupakan system operasi yang cocok untuk jaringan tapi sekarang linux sudah berubah menjadi system operasi yang tidak hanya handal dari segi jaringan dan server tapi juga sudah menjelma menjadi sistem operasi yang enak dipakai di lingkungan desktop baik untuk keperluan pribadi atau bahkan untuk perkantoran. Untuk mengamankan jaringan tersebut menggunakan sebuah mtode keamanan yaitu Intrusion Prevention System (IPS), juga dibantu dengan sebuah tools dalam sistem Operasi Linux yang  berfungsi sebagai alat untuk melakukan filter (penyaring) terhadap lalulintas data (trafic), yaitu IPTables.   Technological developments are increasing day by day, we are required to improve our network security system, because the easier it is for people to find out about hacking and cracking and it is also supported by tools that are easily available for free. And to prevent that we have to secure the network that we use, to secure the network researchers use a security method called the Intrusion Prevention System (IPS), which is a medium that is widely used in building a computer security system, then IPS is combined with using techniques. firewall and Intrusioan Detection System method, in this study the author uses the Linux operating system, namely Ubuntu and CentOS, because Linux is a free / opensource software so that it can be downloaded for free. Initially, linux was an operating system suitable for networking, but now linux has turned into an operating system that is not only reliable in terms of networks and servers but has also been transformed into an operating system that is comfortable to use in a desktop environment for personal use or even for offices. To secure the network using a security method, namely the Intrusion Prevention System (IPS), it is also assisted by a tool in the Linux operating system which functions as a tool for filtering data traffic, namely IPTables


Sign in / Sign up

Export Citation Format

Share Document