Analisis Efektivitas Rule Snort dalam Mendeteksi Serangan Jaringan

Authors

  • Suci Sekar Sari Politeknik Negeri Bengkalis
  • Agus Tedyyana Politeknik Negeri Bengkalis

DOI:

https://doi.org/10.62951/repeater.v2i4.194

Keywords:

IDS, Snort, Telegram, DdoS

Abstract

The effectiveness of snort rules in detecting network attacks is still a question that needs further research. Although snort rules have been developed and updated regularly, network attacks also continue to evolve and may have patterns that have not been detected by existing snort rules. The main objective is to develop and analyze the effectiveness of snort rules in detecting attack patterns on the network. Benefits Provides a better understanding of the effectiveness of snort rules in detecting network attacks. The result of this research is that the development of snort rules that have been carried out is able to filter attack patterns that were previously undetectable such as DDoS attacks and is able to provide telegram notifications.

Downloads

Download data is not yet available.

References

J. Lirama et al., “IMPLEMENTASI INTRUSION DETECTION SYSTEM ( IDS ) UNTUK MENDETEKSI SERANGAN METASPLOIT EXPLOIT,” no. April, pp. 41–50, 2023.

K. Politeknik and N. Bengkalis, “11 th Applied Business and Engineering Conference 11 th Applied Business and Engineering Conference,” no. September, pp. 217–224, 2023.

B. Fachri and F. H. Harahap, “Simulasi Penggunaan Intrusion Detection System ( IDS ) Sebagai Keamanan Jaringan dan Komputer,” vol. 4, no. April, pp. 413–420, 2020, doi: 10.30865/mib.v4i2.2037.

K. Saleh, “IMPLEMENTASI INTRUSION DETECTION SYSTEM ( IDS ) PADA SERVER WEB PT . XYZ MENGGUNAKAN SNORT IMPLEMENTASI INTRUSION DETECTION SYSTEM ( IDS ) PADA SERVER WEB PT . XYZ MENGGUNAKAN SNORT,” no. April, pp. 1–5, 2020.

S. Kasus, L. Vi, J. Kampus, and I. S. T. Akprind, “Jurnal JARKOM Vol . 8 No . 1 Juni 2020 Jurnal JARKOM Vol . 8 No . 1 Juni 2020,” vol. 8, no. 1, pp. 10–19, 2020.

T. Komputer, F. Vokasi, and U. B. Darma, “PENERAPAN SISTEM KEAMANAN INTRUSION DETECTION SYSTEM SNORT PADA JARINGAN DISKOMINFO KABUPATEN OKI”.

B. Wijaya and A. Pratama, “Deteksi Penyusupan Pada Server Menggunakan Metode Intrusion Detection System ( IDS ) Berbasis Snort,” vol. 09, pp. 97–101, 2020.

I. P. Gede, A. Sudiatmika, I. P. Yesha, A. Ariwanta, I. G. Ayu, and S. Melati, “Mengoptimalkan Keamanan Jaringan Komputer Menggunakan Snort dan Telegram Bot yang Terintegrasi dengan Mikrotik,” vol. 3, no. 4, pp. 247–256, 2022, doi: 10.47065/josyc.v3i4.2037.

R. Artikel, N. Christianto, and W. Sulistyo, “Model Pemantauan Keamanan Jaringan Melalui Aplikasi Telegram Dengan Snort,” vol. 7, pp. 702–714, 2021.

D. D. Mahendra and F. S. Mukti, “Sistem Deteksi dan Pengendalian Serangan Denial of Service pada Server Berbasis Snort dan Telegram-API,” vol. 21, no. 3, pp. 511–522, 2022.

D. Untuk, M. Salah, S. Syarat, and U. Memperoleh, “SNORT DENGAN METODE PENETRATION TEST DI LABOR TEKNIK INFORMATIKA UNIVERSITAS ISLAM RIAU Skripsi UNIVERSITAS ISLAM RIAU,” 2021.

D. R. Arrasy and A. Noertjahyana, “RESOURCES DARI TOOLS PENDETEKSI SERANGAN SNORT DAN SURICATA YANG DI PASANG DI WEB”.

S. Adam and A. Suryadi, “BULLETIN OF COMPUTER SCIENCE RESEARCH Monitoring Notifikasi Status Services Pada Os Linux Menggunakan Bot Telegram,” vol. 3, no. 1, pp. 103–108, 2022, doi: 10.47065/bulletincsr.v3i1.219.

“No Title,” no. 2, 2022.

R. N. Dasmen, C. Ariyanto, M. H. Surya, and H. Ramadhan, “Penerapan Snort Sebagai Sistem Pendeteksi Serangan Keamanan Jaringan,” vol. 7, pp. 8–12, 2022.

“PEMBANGUNAN SISTEM MONITORING NETWORK SECURITY MENGGUNAKAN INTRUSION DETECTION SYSTEM SNORT DENGAN LOG ANALISIS SPLUNK ( Studi Kasus : PT . H-One Kogi Prima Auto Technologies Indonesia ) TUGAS AKHIR ‘ Pembangunan Sistem Monitoring Network Security Menggunakan Intrusion Detection System Snort Dengan Log Analisis Splunk ( Studi Kasus : PT . H-One Kogi Prima Auto Technologies Indonesia ),’” 2022.

H. Yanto, “Intruder Detection Monitoring System in Computer Networks Using Snort Based Sms Alert ( Sistem Monitoring Deteksi Penyusup Dalam Jaringan Komputer Menggunakan Snort Berbasis Sms Alert ),” vol. 7, no. 2, pp. 159–170, 2020.

L. F. Nainggolan, N. F. Saragih, and F. G. N. Larosa, “Monitoring Keamanan Jaringan Pada Server Ubuntu Dari Serangan DDoS Menggunakan Snort IDS,” vol. 2, no. 2, pp. 1–10, 2022.

Published

2024-08-27

How to Cite

Suci Sekar Sari, & Agus Tedyyana. (2024). Analisis Efektivitas Rule Snort dalam Mendeteksi Serangan Jaringan. Repeater : Publikasi Teknik Informatika Dan Jaringan, 2(4), 01–15. https://doi.org/10.62951/repeater.v2i4.194