Network Attack Detection Using Intrusion Detection System Utilizing Snort Based on Telegram

Authors

    Juan Adi Dharma( 1 ) Rino( 2 )

    (1) Universitas Buddhi Dharma
    (2) Universitas Buddhi Dharma

DOI:


https://doi.org/10.32877/bt.v6i2.943

Keywords:


Cybercrimes, Intrusion Detection System , Network Attack Detector, Snort , Telegram

Abstract

The constantly evolving of information technology landscape has made information security something of paramount importance, yet the development of information technology is not met with a corresponding advancement in its security systems. As a result, in the current era, there is a multitude of cybercrimes in the realm of the internet. Therefore, this research aims to create a computer network attack detector using the Linux operating system by leveraging the Telegram-based Snort application and employing the Intrusion Detection System (IDS) method through an IDS-based application, namely Snort. Additionally, this study incorporates features for blocking IP addresses and changing the Linux server password through the Telegram application for initial response when an attack is detected, accomplished by sending specific commands within the Telegram application. Furthermore, this paper also introduce a feature for categorizing the risk of computer network attacks into three categories: Low, Medium, and High within the Telegram application. The results of this research demonstrate that Snort can detect predefined rules and send alerts to the Telegram application for every attack occurring within the Wireless Local Area Network (WLAN). Successful IP address blocking is achieved through Telegram integration with the Iptables application, and changing the Linux server password is also accomplished through Telegram by integrating the bash shell programming language found in the Terminal of the Linux operating system. Finally, the risk of attacks can be viewed within the Telegram application.

Downloads

Download data is not yet available.

References

R. Pangestu and A. Solichin, “Klasifikasi Serangan Jaringan Menggunakan Metode Decision Tree Berbasis Website,” Jurnal Seminar Nasional Mahasiswa Fakultas Teknologi Informasi (SENAFTI), vol. 1, no. 1, pp. 614–620, Apr. 2022, [Online]. Available: https://senafti.budiluhur.ac.id/index.php/

B. Wijaya and A. Pratama, “Deteksi Penyusupan Pada Server Menggunakan Metode Intrusion Detection System (IDS) Berbasis Snort,” SISFOKOM(Sistem Informasi dan Komputer), vol. 09, no. 1, pp. 97–101, 2020, doi: 10.32736/sisfokom.v9.i1.770.

L. F. Nainggolan, N. F. Saragih, and F. G. N. Larosa, “Monitoring Keamanan Jaringan Pada Server Ubuntu Dari Serangan DDoS Menggunakan Snort IDS,” Jurnal Ilmiah Teknik Informatika , vol. 2, no. 2, pp. 1–10, Apr. 2022, [Online]. Available: http://ojs.fikom-methodist.net/index.php/METHOTIKA

I. G. W. Bangga and S. M. Ladjamuddin, “SIMULASI SNORT SEBAGAI ALAT PENDETEKSI INTRUSI PADA WEB DAMN VULNERABLE WEB APPLICATION,” Jurnal Rekayasa Informasi, vol. 11, no. 2, pp. 160–167, Apr. 2022.

P. S. Fat, Khairil, and E. P. Rohmawan, “Perancangan Dan Implementasi Intrusion Detection System (IDS) Untuk keamanan Wireless Local Area Network (WLAN) Pada SMKN 5 Kota Bengkulu,” Jurnal Media Computer Science, vol. 2, no. 1, pp. 1–8, 2023.

B. Pasaribu and W. Susanti, “Sistem Informasi Pengajuan Rancangan Usulan Penelitian Menggunakan PHP Native dan Bot Telegram,” Jurnal Mahasiswa Aplikasi Teknologi Komputer dan Informasi, vol. 3, no. 1, pp. 29–38, 2021, [Online]. Available: http://www.php.net.

A. Fathurrozi and F. Karimah, “Pelayanan Dan Informasi Customer Service Berbasis Bot Telegram Dengan Algoritma Forward Chaining Pada CV.Primguard Indonesia,” Journal of Information and Information Security (JIFORTY), vol. 2, no. 2, pp. 211–226, 2021, [Online]. Available: http://ejurnal.ubharajaya.ac.id/index.php/jiforty

Murtopo, Khairil, and Gunawan, “Perancangan Media Pembelajaran Agama Islam Secara Interaktif Berbasis Aplikasi Telegram Bot pada Politeknik Negeri Media Kreatif,” ANALYTICA ISLAMICA, vol. 11, no. 2, pp. 311–326, Jun. 2022, [Online]. Available: https://balitbangsdm.kominfo.go.id

R. Suwanto, I. Ruslianto, and M. Diponegoro, “IMPLEMENTASI INTRUSION PREVENTION SYSTEM(IPS) MENGGUNAKAN SNORT DAN IPTABLE PADA MONITORING JARINGAN LOKAL BERBASIS WEBSITE,” Jurnal Komputer dan Aplikasi, vol. 7, no. 1, pp. 97–107, 2019.

Desmira, “SISTEM KEAMANAN OPERASI LINUX UBUNTU IPTABLES SEBAGAI FIREWALL DI DINAS PENDIDIKAN KABUPATEN SERANG,” Jurnal Khatulistiwa Informatika, vol. 9, no. 1, pp. 17–22, 2021.

Nurhanif and Z. Maizi, “PEMBUATAN PETA JARINGAN UNTUK MEMONITORING KONEKSI KOMPUTER MENGGUNAKAN PEMROGRAMAN BASH SCRIPT,” Journal of Informatics and Computer Science, vol. 5, no. 2, pp. 164–173, Jun. 2019.

Runimeirati, A. Muis, and F. Muhammad, “Pelatihan Text Mining Menggunakan Bahasa Pemrograman Python,” Jurnal Pengabdian Kepada Masyarakat, vol. 3, no. 1, pp. 37–46, 2023, [Online]. Available: https://pusdig.web.id/index.php/abdimas/index

F. Caccavale, C. L. Gargalo, K. V. Gernaey, and U. Krühne, “SPyCE: A structured and tailored series of Python courses for (bio)chemical engineers,” Education for Chemical Engineers, vol. 45, pp. 90–103, Oct. 2023, doi: 10.1016/j.ece.2023.08.003.

M. I. Rafi and Saudi, “Rancang Bangun Jaringan FTP Server dengan Menggunakan Windows Server,” NetPLG Journal of Network and Computer Applications, vol. 1, no. 2, pp. 34–49, 2022, [Online]. Available: https://jurnal.netplg.com/jnca

Desmira and R. Wiryadinata, “Rancang Bangun Keamanan Port Secure Shell (SSH) Menggunakan Metode Port Knocking,” JIKOMSI [Jurnal Ilmu Komputer dan Sistem Informasi, vol. 5, no. 1, pp. 28–33, 2022.

T. Shi, J. Fu, and X. Hu, “TSE-Tran: Prediction Method of Telecommunication-network Fraud Crime Based on Time Series Representation and Transformer,” Journal of Safety Science and Resilience, vol. 4, pp. 340–347, Dec. 2023, doi: 10.1016/j.jnlssr.2023.07.001.

R. Hermawan, “TEKNIK UJI PENETRASI WEB SERVER MENGGUNAKAN SQL INJECTION DENGAN SQLMAP DI KALILINUX,” STRING (Satuan Tulisan Riset dan Inovasi Teknologi), vol. 6, no. 2, pp. 210–216, 2021.

Q. Abu Al-Haija, “Cost-effective detection system of cross-site scripting attacks using hybrid learning approach,” Results in Engineering, vol. 19, Sep. 2023, doi: 10.1016/j.rineng.2023.101266.

Downloads

Published

2023-12-28

How to Cite

[1]
J. A. Dharma and Rino, “Network Attack Detection Using Intrusion Detection System Utilizing Snort Based on Telegram”, bit-Tech, vol. 6, no. 2, pp. 118–126, Dec. 2023.

Issue

Section

Articles
DOI : https://doi.org/10.32877/bt.v6i2.943
Abstract views: 184 / PDF downloads: 193