scholarly journals Simulasi Penggunaan Intrusion Detection System (IDS) Sebagai Keamanan Jaringan dan Komputer

2020 ◽  
Vol 4 (2) ◽  
pp. 413
Author(s):  
Barany Fachri ◽  
Fadli Hamdi Harahap

In the current era of information technology, computer network security is part of a system that is very important to maintain the validity and integrity of data and to ensure the availability of users' morning services from anywhere and anytime. And on one hand humans are very dependent on information systems. That causes the statistics of network security incidents to increase sharply from year to year. So we need a solution to overcome this, one of which is by simulation. Simulations are carried out to simulate existing real network security systems with properties that are easier to observe than the original system, to determine system performance. In this research, a system that is able to cope with threats that may occur optimally in a fast time is needed, this will speed up the process of handling disruptions and system or service recovery. One way that can be used to overcome or overcome this is to use the Intrusion Detection System (IDS). One application that supports intrusion detection system (IDS) is Snort. Snort is able to do an analysis of the forms of intruder attacks that misuse network protocols

In computer network, security of the network is a major issue and intrusion is the most common threats to security. Cyber attacks detection is becoming more enlightened challenge in detecting these threats accurately. In network security, intrusion detection system (IDS) has played a vital role to detect intrusion. In recent years, numerous methods have been proposed for intrusion detection to detect these security threats. This survey paper study examines recent work in the topic of network security, machine learning based techniques as well as a discussion of the many datasets that are commonly used to evaluate IDS. It also explains how researchers employ Machine Learning Based Techniques to detect intrusions


SISFORMA ◽  
2020 ◽  
Vol 7 (1) ◽  
pp. 21
Author(s):  
Aan Erlansari ◽  
Funny Farady Coastera ◽  
Afief Husamudin

Computer network security is an important factor that must be considered. Guaranteed security can avoid losses caused by attacks on the network security system. The most common prevention against network attacks is to place an administrator, but problems will arise when the administrator is not supervising the network, so to overcome these problems a system called IDS (Intrusion Detection System) can detect suspicious activity on the network through automating the work functions of an administrator. Snort is one of the software that functions to find out the intrusion. Data packets that pass through network traffic will be analyzed. Data packets detected as intrusion will trigger alerts which are then stored in log files. Thus, administrators can find out intrusions that occur on computer networks, and the existence of instant messaging applications can help administrators to get realtime notifications, one of which is using the Telegram application. The results of this study are,  Snort able to detect intrusion of attacks on computer networks and the system can send alerts from snort to administrators via telegram bot in real-time.


2013 ◽  
Vol 416-417 ◽  
pp. 1418-1422
Author(s):  
Yu Tao Sun

This paper first discusses the information security and network security, security threat, hacker intrusion process, system and network security vulnerabilities, and then introduces the status of intrusion detection system. By the comparison of two kinds of intrusion detection systems, the article puts forward the detection system based on the combination of the soil and the intrusion of network intrusion detection technology. Combined with the actual project development, this article focuses on the key technology design idea and the realization of the intrusion detection system in network security.


2021 ◽  
Author(s):  
Farah Jemili ◽  
Hajer Bouras

In today’s world, Intrusion Detection System (IDS) is one of the significant tools used to the improvement of network security, by detecting attacks or abnormal data accesses. Most of existing IDS have many disadvantages such as high false alarm rates and low detection rates. For the IDS, dealing with distributed and massive data constitutes a challenge. Besides, dealing with imprecise data is another challenge. This paper proposes an Intrusion Detection System based on big data fuzzy analytics; Fuzzy C-Means (FCM) method is used to cluster and classify the pre-processed training dataset. The CTU-13 and the UNSW-NB15 are used as distributed and massive datasets to prove the feasibility of the method. The proposed system shows high performance in terms of accuracy, precision, detection rates, and false alarms.


2012 ◽  
Vol 433-440 ◽  
pp. 3235-3240
Author(s):  
Ling Jia

This paper studies the security problems of campus network and summarizes the current on the current security risks and threats that campus network faces, focusing on analysis of attack-defense strategies on DOS network layer, proposing the security program of campus network which uses firewall as well as network security intrusion detection system snort. This paper analyzes the functional advantages of the program and presents in details the setup deployment and collocation methods of network security intrusion detection system based on snort in the campus network, and its application results are also summarized.


Jursima ◽  
2018 ◽  
Vol 6 (1) ◽  
pp. 1
Author(s):  
Parningotan Panggabean

<p><em>Perkembangan teknologi informasi, khususnya jaringan komputer memungkinkan terjadinya pertukaran informasi yang mudah, cepat dan semakin kompleks. Keamanan jaringan komputer harus diperhatikan guna menjaga validitas dan integritas data serta informasi yang berada dalam jaringan tersebut. Masalah yang dihadapi adalah adanya Log Bug yang didapatkan pada komputer server Dinas Lingkungan Hidup Kota Batam yang diindikasikan adanya serangan Denial of Service (DoS) pada komputer tersebut. Berdasarkan masalah diatas maka penulis mencoba membuat sebuah penelitian yang berjudul “Analisis Network Security Snort menggunakan metode  Intrusion Detection System (IDS) untuk Optimasi  Keamanan Jaringan Komputer” dan diharapkan dapat mendeteksi serangan Denial of Service (DoS). Intrusion Detection System (IDS)  adalah sebuah tool, metode, sumber daya yang memberikan bantuan untuk melakukan identifikasi, memberikan laporan terhadap aktivitas jaringan komputer. Aplikasi yang digunakan untuk mendeteksi serangan menggunakan Snort. Snort dapat mendeteksi serangan DoS. Serangan DoS dilakukan dengan menggunakan aplikasi Loic.</em></p>


Sign in / Sign up

Export Citation Format

Share Document