Network Security Analysis with SnortIDS Using ACID (Analysis Console for Intrusion Databases
DOI:
https://doi.org/10.32877/bt.v5i3.728
Keywords:
ACID, IPTables, Network Security, Ntop, Snort IDS
Abstract
The use of Wi-Fi and Ethernet is increasing in today's computer networks due to the advancement of technology. The development of networks today is characterized by the need for low-latency and high-bandwidth technology. The technology has also introduced 5G and Wi-Fi 6 which support high-speed internet surfing. The introduction of Network File System (NFS) in this era sparked the demand for Ethernet. NFS also increased the use of UNIX in education and professional computing in the 1980s. Then, in 1982, Token Ring Topology emerged as an alternative to the internet and was only standardized in 1985. Network security is an important factor in ensuring data is not stolen or damaged. With the increasing knowledge of hacking and cracking, and the availability of tools that can be easily used to launch attacks or intrusions, it is important to investigate when an attack occurs. One network forensic method for monitoring attacks on the network is using Snort IDS and Ntop to facilitate the logging process for monitoring the network system. Based on the results obtained from designing a network security with Snort Intrusion Detection System (IDS) using ACID (Analysis Console for Intrusion Databases) with the utilization of IPTables on Ubuntu Server can stop attackers. In this research, the researcher used IPTables on Ubuntu as a firewall to anticipate attacks. To prevent port scanning attacks conducted by the attacker, the author created a firewall using IPTables where the IPTables rules aim to block the IP address of the attacker.
Downloads
References
N. Shiba, “Perkembangan Jaringan Komputer,” STMIK Indo Daya Suvana, 2022. https://ids.ac.id/sejarah-dan-perkembangan-jaringan-komputer/
Stallings and William, Komunikasi data dan komputer: dasar-dasar komunikasi data. Jakarta: Salemba Teknika, 2000.
Pinandita and Harjono, "Deteksi Malware di Jaringan Lokal Universitas Muhammadiyah Purwokerto Menggunakan Dionaea," 2012.
Harjono and A. P. Wicaksono, "Honeyd untuk Mendeteksi Serangan Jaringan di Universitas Muhammadiyah Purwokerto," JUITA ISSN:2086-9398, vol. 2, no. 4, 2013.
R. Mentang, A. A. E. Sinsuw, and X. B. N. Najoan, "Perancangan Dan Analisis Keamanan Jaringan Nirkabel Menggunakan Wireless Intrusion Detection System," J. Tek. Elektro dan Komput. ISSN 2301-8402, vol. 4, no. 7, pp. 35–44, 2015.
B. Sugiantoro and J. E. Istianto, “ANALISA SISTEM KEAMANAN INTRUSION DETECTION SYSTEM (IDS), FIREWALL SYSTEM, DATABASE SYSTEM DAN MONITORING SYSTEM MENGGUNAKAN AGENT BERGERAK,” UPN ”Veteran” Yogyakarta ISSN 1979-2328, pp. c21–c29, 2010.
N. S. J. Abraham, Harianto, Agus, and Alexander, "Perancangan dan Implementasi Intrusion Detection System pada Jaringan Nirkabel BINUS University," Universitas Bina Nusantara, 2009.
Abdul and Kadir, Pengenalan Sistem Informasi Edisi Revisi. Yogyakarta : Andi, 2004.
D. D. Prasetyo, Aplikasi Database Client/Server Menggunakan PHP dan MySQL. Jakarta: PT.Elex Media Komputindo, 2004.
R. A. Wibowo, “Analisis dan Implementasi IDS menggunakan Snort pada cloud server di jogja digital valley,” AMIKOM YOGYAKARTA, 2014.
M. Syafrizal, Pengantar Jaringan Komputer. Yogyakarta: Andi, 2005.
Setiawan and Thomas, “Analisis Keamanan Jaringan Internet Menggunakan Hping, Nmap, Nessus, dan Ethereal.,” Institut Teknologi Bandung, 2004.
D. Ariyus, Intrusion Detection System. Yogyakarta: C.V. Andi Offset, 2007.
T. Gregory, Melihat Lalu Lintas di Network Dengan NTOP. IlmuKomputer.Com, 2007.
A. Sukamaaji and Rianto, Jaringan Komputer : Konsep Dasar Pengembangan Jaringan dan Keamanan Jaringan. Yogyakarta : Andi, 2008.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 bit-Tech
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
I hereby assign and transfer to bit-Tech all exclusive copyright ownership rights to the above work. This includes, but is not limited to, the right to publish, republish, downgrade, distribute, transmit, sell, or use the work and other related materials worldwide, in whole, or in part, in all languages, in electronic, printed, or any other form of media, now known or hereafter developed and reserves the right to permit or license a third party to do any of the above. I understand that this exclusive right will belong to bit-Tech from the date the article is accepted for publication. I also understand that bit-Tech, as the copyright owner, has sole authority to license and permit reproduction of the article. I understand that, except for copyright, any other proprietary rights associated with the work (e.g. patents or other rights to any process or procedure) must be retained by the author. In addition, I understand that bit-Tech permits authors to use their papers in any way permitted by the applied Creative Commons license.