Analisis Efektivitas Rule Snort dalam Mendeteksi Serangan Jaringan
DOI:
https://doi.org/10.62951/repeater.v2i4.194Keywords:
IDS, Snort, Telegram, DdoSAbstract
The effectiveness of snort rules in detecting network attacks is still a question that needs further research. Although snort rules have been developed and updated regularly, network attacks also continue to evolve and may have patterns that have not been detected by existing snort rules. The main objective is to develop and analyze the effectiveness of snort rules in detecting attack patterns on the network. Benefits Provides a better understanding of the effectiveness of snort rules in detecting network attacks. The result of this research is that the development of snort rules that have been carried out is able to filter attack patterns that were previously undetectable such as DDoS attacks and is able to provide telegram notifications.
Downloads
References
J. Lirama et al., “IMPLEMENTASI INTRUSION DETECTION SYSTEM ( IDS ) UNTUK MENDETEKSI SERANGAN METASPLOIT EXPLOIT,” no. April, pp. 41–50, 2023.
K. Politeknik and N. Bengkalis, “11 th Applied Business and Engineering Conference 11 th Applied Business and Engineering Conference,” no. September, pp. 217–224, 2023.
B. Fachri and F. H. Harahap, “Simulasi Penggunaan Intrusion Detection System ( IDS ) Sebagai Keamanan Jaringan dan Komputer,” vol. 4, no. April, pp. 413–420, 2020, doi: 10.30865/mib.v4i2.2037.
K. Saleh, “IMPLEMENTASI INTRUSION DETECTION SYSTEM ( IDS ) PADA SERVER WEB PT . XYZ MENGGUNAKAN SNORT IMPLEMENTASI INTRUSION DETECTION SYSTEM ( IDS ) PADA SERVER WEB PT . XYZ MENGGUNAKAN SNORT,” no. April, pp. 1–5, 2020.
S. Kasus, L. Vi, J. Kampus, and I. S. T. Akprind, “Jurnal JARKOM Vol . 8 No . 1 Juni 2020 Jurnal JARKOM Vol . 8 No . 1 Juni 2020,” vol. 8, no. 1, pp. 10–19, 2020.
T. Komputer, F. Vokasi, and U. B. Darma, “PENERAPAN SISTEM KEAMANAN INTRUSION DETECTION SYSTEM SNORT PADA JARINGAN DISKOMINFO KABUPATEN OKI”.
B. Wijaya and A. Pratama, “Deteksi Penyusupan Pada Server Menggunakan Metode Intrusion Detection System ( IDS ) Berbasis Snort,” vol. 09, pp. 97–101, 2020.
I. P. Gede, A. Sudiatmika, I. P. Yesha, A. Ariwanta, I. G. Ayu, and S. Melati, “Mengoptimalkan Keamanan Jaringan Komputer Menggunakan Snort dan Telegram Bot yang Terintegrasi dengan Mikrotik,” vol. 3, no. 4, pp. 247–256, 2022, doi: 10.47065/josyc.v3i4.2037.
R. Artikel, N. Christianto, and W. Sulistyo, “Model Pemantauan Keamanan Jaringan Melalui Aplikasi Telegram Dengan Snort,” vol. 7, pp. 702–714, 2021.
D. D. Mahendra and F. S. Mukti, “Sistem Deteksi dan Pengendalian Serangan Denial of Service pada Server Berbasis Snort dan Telegram-API,” vol. 21, no. 3, pp. 511–522, 2022.
D. Untuk, M. Salah, S. Syarat, and U. Memperoleh, “SNORT DENGAN METODE PENETRATION TEST DI LABOR TEKNIK INFORMATIKA UNIVERSITAS ISLAM RIAU Skripsi UNIVERSITAS ISLAM RIAU,” 2021.
D. R. Arrasy and A. Noertjahyana, “RESOURCES DARI TOOLS PENDETEKSI SERANGAN SNORT DAN SURICATA YANG DI PASANG DI WEB”.
S. Adam and A. Suryadi, “BULLETIN OF COMPUTER SCIENCE RESEARCH Monitoring Notifikasi Status Services Pada Os Linux Menggunakan Bot Telegram,” vol. 3, no. 1, pp. 103–108, 2022, doi: 10.47065/bulletincsr.v3i1.219.
“No Title,” no. 2, 2022.
R. N. Dasmen, C. Ariyanto, M. H. Surya, and H. Ramadhan, “Penerapan Snort Sebagai Sistem Pendeteksi Serangan Keamanan Jaringan,” vol. 7, pp. 8–12, 2022.
“PEMBANGUNAN SISTEM MONITORING NETWORK SECURITY MENGGUNAKAN INTRUSION DETECTION SYSTEM SNORT DENGAN LOG ANALISIS SPLUNK ( Studi Kasus : PT . H-One Kogi Prima Auto Technologies Indonesia ) TUGAS AKHIR ‘ Pembangunan Sistem Monitoring Network Security Menggunakan Intrusion Detection System Snort Dengan Log Analisis Splunk ( Studi Kasus : PT . H-One Kogi Prima Auto Technologies Indonesia ),’” 2022.
H. Yanto, “Intruder Detection Monitoring System in Computer Networks Using Snort Based Sms Alert ( Sistem Monitoring Deteksi Penyusup Dalam Jaringan Komputer Menggunakan Snort Berbasis Sms Alert ),” vol. 7, no. 2, pp. 159–170, 2020.
L. F. Nainggolan, N. F. Saragih, and F. G. N. Larosa, “Monitoring Keamanan Jaringan Pada Server Ubuntu Dari Serangan DDoS Menggunakan Snort IDS,” vol. 2, no. 2, pp. 1–10, 2022.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Repeater : Publikasi Teknik Informatika dan Jaringan

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.