Network Security Analysis with SnortIDS Using ACID (Analysis Console for Intrusion Databases

Authors

    Ruruh Wuryani( 1 ) Indah Fenriana( 2 ) Dicky Surya Dwi Putra( 3 ) Desiyanna Lasut( 4 ) Susanto Hariyanto( 5 )

    (1) Buddhi Dharma University
    (2) Buddhi Dharma University
    (3) BINUS University
    (4) Buddhi Dharma University
    (5) Buddhi Dharma University

DOI:


https://doi.org/10.32877/bt.v5i3.728

Keywords:


ACID, IPTables, Network Security, Ntop, Snort IDS

Abstract

The use of Wi-Fi and Ethernet is increasing in today's computer networks due to the advancement of technology. The development of networks today is characterized by the need for low-latency and high-bandwidth technology. The technology has also introduced 5G and Wi-Fi 6 which support high-speed internet surfing. The introduction of Network File System (NFS) in this era sparked the demand for Ethernet. NFS also increased the use of UNIX in education and professional computing in the 1980s. Then, in 1982, Token Ring Topology emerged as an alternative to the internet and was only standardized in 1985. Network security is an important factor in ensuring data is not stolen or damaged. With the increasing knowledge of hacking and cracking, and the availability of tools that can be easily used to launch attacks or intrusions, it is important to investigate when an attack occurs. One network forensic method for monitoring attacks on the network is using Snort IDS and Ntop to facilitate the logging process for monitoring the network system. Based on the results obtained from designing a network security with Snort Intrusion Detection System (IDS) using ACID (Analysis Console for Intrusion Databases) with the utilization of IPTables on Ubuntu Server can stop attackers. In this research, the researcher used IPTables on Ubuntu as a firewall to anticipate attacks. To prevent port scanning attacks conducted by the attacker, the author created a firewall using IPTables where the IPTables rules aim to block the IP address of the attacker.

Downloads

Download data is not yet available.

References

N. Shiba, “Perkembangan Jaringan Komputer,” STMIK Indo Daya Suvana, 2022. https://ids.ac.id/sejarah-dan-perkembangan-jaringan-komputer/

Stallings and William, Komunikasi data dan komputer: dasar-dasar komunikasi data. Jakarta: Salemba Teknika, 2000.

Pinandita and Harjono, "Deteksi Malware di Jaringan Lokal Universitas Muhammadiyah Purwokerto Menggunakan Dionaea," 2012.

Harjono and A. P. Wicaksono, "Honeyd untuk Mendeteksi Serangan Jaringan di Universitas Muhammadiyah Purwokerto," JUITA ISSN:2086-9398, vol. 2, no. 4, 2013.

R. Mentang, A. A. E. Sinsuw, and X. B. N. Najoan, "Perancangan Dan Analisis Keamanan Jaringan Nirkabel Menggunakan Wireless Intrusion Detection System," J. Tek. Elektro dan Komput. ISSN 2301-8402, vol. 4, no. 7, pp. 35–44, 2015.

B. Sugiantoro and J. E. Istianto, “ANALISA SISTEM KEAMANAN INTRUSION DETECTION SYSTEM (IDS), FIREWALL SYSTEM, DATABASE SYSTEM DAN MONITORING SYSTEM MENGGUNAKAN AGENT BERGERAK,” UPN ”Veteran” Yogyakarta ISSN 1979-2328, pp. c21–c29, 2010.

N. S. J. Abraham, Harianto, Agus, and Alexander, "Perancangan dan Implementasi Intrusion Detection System pada Jaringan Nirkabel BINUS University," Universitas Bina Nusantara, 2009.

Abdul and Kadir, Pengenalan Sistem Informasi Edisi Revisi. Yogyakarta : Andi, 2004.

D. D. Prasetyo, Aplikasi Database Client/Server Menggunakan PHP dan MySQL. Jakarta: PT.Elex Media Komputindo, 2004.

R. A. Wibowo, “Analisis dan Implementasi IDS menggunakan Snort pada cloud server di jogja digital valley,” AMIKOM YOGYAKARTA, 2014.

M. Syafrizal, Pengantar Jaringan Komputer. Yogyakarta: Andi, 2005.

Setiawan and Thomas, “Analisis Keamanan Jaringan Internet Menggunakan Hping, Nmap, Nessus, dan Ethereal.,” Institut Teknologi Bandung, 2004.

D. Ariyus, Intrusion Detection System. Yogyakarta: C.V. Andi Offset, 2007.

T. Gregory, Melihat Lalu Lintas di Network Dengan NTOP. IlmuKomputer.Com, 2007.

A. Sukamaaji and Rianto, Jaringan Komputer : Konsep Dasar Pengembangan Jaringan dan Keamanan Jaringan. Yogyakarta : Andi, 2008.

Downloads

Published

2023-04-28

How to Cite

[1]
R. Wuryani, I. Fenriana, D. S. Dwi Putra, D. Lasut, and S. Hariyanto, “Network Security Analysis with SnortIDS Using ACID (Analysis Console for Intrusion Databases”, bit-Tech, vol. 5, no. 3, pp. 145–154, Apr. 2023.

Issue

Section

Articles
DOI : https://doi.org/10.32877/bt.v5i3.728
Abstract views: 296 / PDF downloads: 320

Most read articles by the same author(s)