Implementasi dan Analisa Keamanan Jaringan IDS (Intrusion Detection System) Menggunakan Suricata Pada Web Server
Main Article Content
Abstract
The defense system against servers is generally still done manually by administrators. To overcome this, we need a system that functions to inform threats that occur optimally and be resolved quickly. The IDS network security system was developed using Suricata. Suricata itself will be built using OPNsense. With the Suricata system using OPNsense, it can detect or prevent incoming attacks.
Article Details
How to Cite
Stephani, E., Fitri Nova, & Ervan Asri. (2020). Implementasi dan Analisa Keamanan Jaringan IDS (Intrusion Detection System) Menggunakan Suricata Pada Web Server. JITSI : Jurnal Ilmiah Teknologi Sistem Informasi, 1(2), 67 - 74. Retrieved from https://jurnal-itsi.org/index.php/jitsi/article/view/10
Issue
Section
Articles
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
References
[1] D. Kuswanto, "Kerja Intrusion Prevention Sistem (IPS) Berbasis Suricata Pada Jaringan Lokal Area Network Laboratorium TIA+ Teknik Informatika, Universitas Trunojoyo," Jurnal Ilmiah Nero, vol. 01 No. 02, 2014.
[2] d. Muhammad Ravis, "Perbandingan Performasi Single Web Server dan Multi Web Server dengan Metode Paired Sample T Test," 2019.
[3] Kali Linux Revealed Mastering the Penetration Testing Distribution Book.
[4] d. Ziyad R. Al Ashhab, "Detection Of HTTP Flooding DDoS Attack Using Hadoop with MapReduce," 2019.
[5] R. A. d. Raharja, "Open Source Campus Agreement-Modul Pelatihan "Administrasi Sistem Linux"," 2001.
[6] A. d. A. B. R. T. Sarifin, "Penerapan Router PFsense Berbasis FreeBSD di Warnet Emax Sragen," 2012.
[7] B. S. A. d. W. Sulistyo, "Implementasi Intrusion Prevention System Suricata dengan Anomaly-Based untuk Keamanan Jaringan PT. Grahamedia Informasi," 2019.
[8] I. Nur, "Pengembangan Firewall Pada Wireless Network dengan Sistem Operasi GNU Linux," 2008.
[9] Mukmin, "Tahapan Action Research," 2017.
[10] W. F. d. G. N. Fanthoni, "Deteksi Penyusupan Pada Jaringan Komputer Menggunakan IDS Snort, E-Proceeding Of Engineering," vol. 3, pp. 1169-1172, 2006.
[11] B. S. d. W. S. Anggoro, "Implementasi Intrusion Prevention System Suricata dengan Anomaly-Based untuk Keamanan Jaringan PT. Gramedia Informasi," Seminar Nasional APTIKOM, 2019.
[2] d. Muhammad Ravis, "Perbandingan Performasi Single Web Server dan Multi Web Server dengan Metode Paired Sample T Test," 2019.
[3] Kali Linux Revealed Mastering the Penetration Testing Distribution Book.
[4] d. Ziyad R. Al Ashhab, "Detection Of HTTP Flooding DDoS Attack Using Hadoop with MapReduce," 2019.
[5] R. A. d. Raharja, "Open Source Campus Agreement-Modul Pelatihan "Administrasi Sistem Linux"," 2001.
[6] A. d. A. B. R. T. Sarifin, "Penerapan Router PFsense Berbasis FreeBSD di Warnet Emax Sragen," 2012.
[7] B. S. A. d. W. Sulistyo, "Implementasi Intrusion Prevention System Suricata dengan Anomaly-Based untuk Keamanan Jaringan PT. Grahamedia Informasi," 2019.
[8] I. Nur, "Pengembangan Firewall Pada Wireless Network dengan Sistem Operasi GNU Linux," 2008.
[9] Mukmin, "Tahapan Action Research," 2017.
[10] W. F. d. G. N. Fanthoni, "Deteksi Penyusupan Pada Jaringan Komputer Menggunakan IDS Snort, E-Proceeding Of Engineering," vol. 3, pp. 1169-1172, 2006.
[11] B. S. d. W. S. Anggoro, "Implementasi Intrusion Prevention System Suricata dengan Anomaly-Based untuk Keamanan Jaringan PT. Gramedia Informasi," Seminar Nasional APTIKOM, 2019.