scholarly journals ANALISIS DAN IMPLEMENTASI NETWORK SECURITY SYSTEM MENGGUNAKAN TEKNIK HOST-BASED INTRUSION DETECTION SYSTEM (HIDS) BERBASIS CLOUD COMPUTING

2019 ◽  
Author(s):  
Mamay Syani

Cloud Computing merepresentasikan teknologi untuk menggunakan infrastruktur komputasi dengan cara yang lebih efisien, Di sisi lain, arsitektur yang rumit dan terdistribusi semacam itu menjadi target yang menarik bagi para penyusup Cyberattacks. Penelitian ini melakukan analisis dan membangun sistem keamanan jaringan infrastruktur Cloud computing pada studi kasus di sektor pendidikan. Infrastruktur dibangun berdasarkan kebutuhan pengguna yang diperoleh melalui metode wawancara. Metodologi penelitian yang digunakan yaitu metodologi NDLC yang terdiri dari 6 tahap namun dalam penelitian ini hanya memakai 5 tahapan dari metodologi NDLC. Hasil pengujian menunjukkan bahwa sistem keamanan jaringan yang dibangun sudah berhasil dan sistem Cloud yang bangun memenuhi user requirement. hasil uji terhadap kinerja sistem menunjukan bahwa pada parameter keakurasian pendeteksian bahwa sistem OSSEC dapat mendeteksi secara akurat dari serangan yang dilakukan penguji, pada parameter kecepatan pendeteksian bahwa sistem OSSEC lumayan cepat dalam mendeteksi adanya ancaman yang masuk, sedangkan pada parameter penggunaan sumber daya bahwa sistem OSSEC mengambil sedikit sekali penggunaan CPU dan RAM sehingga tidak memberatkan server, hasil observasi juga menunjukan bahwa sistem OSSEC yang dibangun berjalan dengan baik, berdasarkan dari observasi yang dilakukan oleh penulis hasil yang didapat terdapat sebanyak 620 peringatan pengintaian, 38849 peringatan authentication control, 569 peringatan attack/misue, 9018 peringatan Access Control, 0 peringatan Network Control, 230 peringatan System Monitor, dan 0 peringatan Policy Violation

Author(s):  
Nitesh Singh Bhati ◽  
Manju Khari ◽  
Vicente García-Díaz ◽  
Elena Verdú

An Intrusion Detection System (IDS) is a network security system that detects, identifies, and tracks an intruder or an invader in a network. As the usage of the internet is growing every day in our society, the IDS is becoming an essential part of the network security system. Therefore, the proper research and implementation of IDSs are required. Today, with the help of improved technologies at our disposal, many solutions have been found to create many intrusion detection systems. However, it is difficult to identify the perfect solution from the vast options we have available. Hence, motivated by the need of a better security system, this paper presents a survey of different published solutions that have been developed and/or researched on the topic of intrusion detection techniques during the period from 2000 to 2019, including the accuracy of the output. With the help of this survey, an all-inclusive view of the different papers would be at one’s disposal.


2014 ◽  
Vol 602-605 ◽  
pp. 1526-1529
Author(s):  
Hai Yan Chen

With the popularization and development of Internet, the network has penetrated into every corner of social life. Network brings people convenient but at the same time it also brings a series of safety problems. Intrusion detection system is an important part of network security system. Computer security problem is increasingly prominent, which puts forward higher requirements on intrusion detection system. In this paper, the application of data mining and intelligent Agent detection in the intrusion detection system is researched.


2021 ◽  
Author(s):  
Farah Jemili ◽  
Hajer Bouras

In today’s world, Intrusion Detection System (IDS) is one of the significant tools used to the improvement of network security, by detecting attacks or abnormal data accesses. Most of existing IDS have many disadvantages such as high false alarm rates and low detection rates. For the IDS, dealing with distributed and massive data constitutes a challenge. Besides, dealing with imprecise data is another challenge. This paper proposes an Intrusion Detection System based on big data fuzzy analytics; Fuzzy C-Means (FCM) method is used to cluster and classify the pre-processed training dataset. The CTU-13 and the UNSW-NB15 are used as distributed and massive datasets to prove the feasibility of the method. The proposed system shows high performance in terms of accuracy, precision, detection rates, and false alarms.


With winning advances like catch of Things, Cloud Computing and Social Networking, mammoth proportions of framework traffic associated information area unit made Intrusion Detection System for sort out security suggests the strategy to look at partner unapproved access on framework traffic. For Intrusion Detection System we are going to call attention to with respect to Machine Learning Approaches. it's accomplice rising field of enrolling which can explicitly act with a decent arrangement of less human affiliation. System gains from the data intentionally affirmation and makes perfect objectives. all through this paper we keep an eye on zone unit going to separated styles of Machine Learning pulls in near and had done relative examination in it. inside the last we keep an eye on territory unit going to foreseen the idea of hybrid development, that might be a blend of host principally and framework based for the most part Intrusion Detection System.


Sign in / Sign up

Export Citation Format

Share Document