Penggunaan Snort Sebagai Sistem Pendeteksi Serangan Pada Jaringan Menggunakan Notifikasi Telegram (Kasus Dinas Komunikasi Informatika Dan Persandian Kabupaten Sukabumi)
(1) Universitas Nusa Putra, Sukabumi, Indonesia
(2) Universitas Nusa Putra, Sukabumi, Indonesia
(3) Universitas Nusa Putra, Sukabumi, Indonesia
(*) Corresponding Author
Abstract
Network security has become very important to protect individuals, companies, and agencies from threats such as cyberattacks, and data theft. Therefore, understanding the importance of network security is essential. Based on the interview results, there is a server in the Sukabumi District Command Center managed by DISKOMINFOSAN Sukabumi District, the server is used as an application server. The server does not have a network security monitoring system that provides alerts when there is an attempted attack on the server in real time. One way to improve security on the server is to use an Intrusion Detection System (IDS). IDS is a system intended to detect suspicious activity or attacks on the network. One of the main goals of IDS is to provide warnings against security threats that may occur. Snort is one of the open-source IDS tools. Snort was created to identify network attacks and provide realtime alerts to administrators when identifying certain behaviors or attack patterns. In this study the authors used the SPDLC development method. Security Policy Development Life Cycle (SPDLC) is a system development method that focuses on network security. After testing, it can be concluded that snort can be used as an IDS installed on ubuntu server 22.04, with the rules that have been made snort can detect when someone tries port scanning to the server using masscan and can detect ping attacks aimed at the server in real time. With the script that has been created, snort can send alerts to network administrators using telegram in realtime so that these alerts can be followed up immediately.
Full Text:
PDFReferences
M. Y. Samad and Pratama Dahlian Persadha, “Memahami Perang Siber dan Peran Badan Intelijen Negara Dalam Menangkal Ancaman di Siber,” J. IPTEKKOM J. Ilmu Pengetah. Teknol. Inf., vol. 24, no. 2, pp. 135–146, 2022, doi: 10.17933/iptekkom.24.2.2022.135-146.
I. A. S. Dewi Paramitha, G. M. A. Sasmita, and I. M. S. Raharja, “Analisis Data Log IDS Snort dengan Algoritma Clustering Fuzzy C-Means,” Maj. Ilm. Teknol. Elektro, vol. 19, no. 1, p. 95, 2020, doi: 10.24843/mite.2020.v19i01.p14.
H. Awal, “Implementasi Intrusion Detection Prevention System Sebagai Sistem Keamanan Jaringan Komputer Kejaksaan Negeri Pariaman Menggunkan Snort Dan Iptables Berbasis Linux,” J. Sains Inform. Terap., vol. 2, no. 1, pp. 38–44, 2023, doi: 10.62357/jsit.v2i1.184.
M. Waruwu, “Pendekatan Penelitian Pendidikan: Metode Penelitian Kualitatif, Metode Penelitian Kuantitatif dan Metode Penelitian Kombinasi (Mixed Method),” J. Pendidik. Tambusai , vol. 7, no. 1, pp. 2896–2910, 2023.
F. Riza, “Sistem Deteksi Intrusi pada Server secara Realtime Menggunakan Seleksi Fitur dan Firebase Cloud Messaging,” J. Sistim Inf. dan Teknol., vol. 5, pp. 7–9, 2022, doi: 10.37034/jsisfotek.v5i1.161.
G. Tambunan and M. IGN, “Implementasi Keamanan Ids / Ips Dengan Snort Dan IP Tables pada Server,” Semin. Nas. Mhs. Ilmu Komput. dan Apl. Jakarta-Indonesia, 28 Januari 2020 IMPLEMENTASI, pp. 10–16, 2020.
L. Shuai and S. Li, “Performance optimization of Snort based on DPDK and Hyperscan,” Procedia Comput. Sci., vol. 183, no. 2018, pp. 837–843, 2021, doi: 10.1016/j.procs.2021.03.007.
N. A. Santoso, K. B. Affandi, and R. D. Kurniawan, “Implementasi Keamanan Jaringan Menggunakan Port Knocking,” J. Janitra Inform. dan Sist. Inf., vol. 2, no. 2, pp. 90–95, 2022, doi: 10.25008/janitra.v2i2.156.
M. A. Husna and P. Rosyani, “Implementasi Sistem Monitoring Jaringan dan Server Menggunakan Zabbix yang Terintegrasi dengan Grafana dan Telegram,” JURIKOM (Jurnal Ris. Komputer), vol. 8, no. 6, p. 247, 2021, doi: 10.30865/jurikom.v8i6.3631.
A. Yudhistira and Y. Fitrisia, “Monitoring Log Server Dengan Elasticsearch, Logstash Dan Kibana (Elk),” Rabit J. Teknol. dan Sist. Inf. Univrab, vol. 8, no. 1, pp. 124–134, 2023, doi: 10.36341/rabit.v8i1.2975.
H. Khotimah, F. Bimantoro, and R. S. Kabanga, “Implementasi Security Information And Event Management (SIEM) Pada Aplikasi Sms Center Pemerintah Daerah Provinsi Nusa Tenggara Barat,” J. Begawe Teknol. Inf., vol. 3, no. 2, pp. 213–219, 2022, doi: 10.29303/jbegati.v3i2.752.
A. Setiyawan, A. Pinandito, and W. Purnomo, “Pengembangan Sistem Informasi Log Management Server Monitoring Menggunakan ELK (Elastic Search, Logstash dan Kibana) Stack pada Aplikasi Padichain di PT. Bank Rakyat Indonesia,” J. Pengemb. Teknol. Inf. dan Ilmu Komput., vol. 7, no. 5, pp. 2142–2151, 2023, [Online]. Available: http://j-ptiik.ub.ac.id
M. K. Anam, D. Sudyana, A. Noviciatie, and N. Lizarti, “Optimalisasi Penggunaan VirtualBox Sebagai Virtual Computer Laboratory untuk Simulasi Jaringan dan Praktikum pada SMK Taruna Mandiri Pekanbaru J-PEMAS STMIK Amik Riau,” http//jurnal.sar.ac.id/index.php/J-PEMAS Optim., vol. vol 1, no. 2, pp. 37–44, 2020.
S. Informasi, U. Merdeka, M. Jalan, T. Dieng, and N. Klojen, “Implementasi Honeypot Dionaea Sebagai Uji Kerentanan dan Penunjang Keamanan Jaringan,” no. September, pp. 3807–3817, 2023.
A. Fergina, M. I. Setia, M. Yusuf, and ..., “Analisis Monitoring Sistem Keamanan Jaringan Komputer menggunakan Software NMAP (Studi Kasus Jaringan di Universitas Nusa Putra),” … Ilmu Komput. …, 2023, [Online]. Available: http://prosiding.sentimeter.nusaputra.ac.id/index.php/prosiding/article/view/45%0Ahttp://prosiding.sentimeter.nusaputra.ac.id/index.php/prosiding/article/download/45/41
D. K. Hakim and S. A. Nugroho, “Implementasi Telegram Bot untuk Monitoring Mikrotik Router,” Sainteks, vol. 16, no. 2, pp. 151–157, 2020, doi: 10.30595/st.v16i2.7132.
M. Mukmin, P. Purnawansyah, and M. Hasnawi, “Notifikasi Bot Telegram Untuk Monitoring Jaringan Pada Kementrian Kelautan Dan Perikanan Untia,” Bul. Sist. Inf. dan Teknol. Islam, vol. 3, no. 2, pp. 127–133, 2022, doi: 10.33096/busiti.v3i2.1162.
DOI: https://doi.org/10.30645/kesatria.v5i3.416
DOI (PDF): https://doi.org/10.30645/kesatria.v5i3.416.g412
Refbacks
- There are currently no refbacks.
Published Papers Indexed/Abstracted By: