Sistem Keamanan Jaringan Komputer Berbasis Teknik Intrusion Detection System (IDS) Untuk Mendeteksi Serangan Distrubuted Denial Of Service (DDOS)

Raihan Fauzi(1*), Yusuf Muhyidin(2), Dayan Singasatia(3),

(1) STT Wastukancana Purwakarta, Indonesia
(2) STT Wastukancana Purwakarta, Indonesia
(3) STT Wastukancana Purwakarta, Indonesia
(*) Corresponding Author

Abstract


Madrasah Aliyah Purwakarta State. is a public high school located in the Purwakarta Regency, Purwakarta District, all activities at this school have used computer networks to support the activities in this school. Madrasah Aliyah Purwakarta State. at this time it has not implemented a computer network security system, because there is no computer network security system implemented at Madrasah Aliyah Negeri Purwakarta, it is still vulnerable to attacks including Ping Attack, Network Scanning and DDOS. Network Development Lyfe Cycle (NDLC) is a method for planning and managing the process of developing a computer network, the NDLC method has 5 stages, namely analysis, design, simulation prototyping, implementation, monitoring, and management. Madrasah Aliyah Purwakarta State. The result of this research is a computer network security system design based on Intrusion Detection System (IDS) using snort and portsentry to detect an attack that enters the computer network of Madrasah Aliyah Negeri Purwakarta such as Ping icmp, nmap (port scan) and DDOS, with get a notification of an attack that enters the computer network, the attack can be prevented by implementing portsentry so that attacks such as Ping icmp, nmap and DDOS will not be able to enter the computer network.

Full Text:

PDF

References


P. T. Samudera and I. Rahayu, ““ Rancangan Dan Konfıgurası Jarıngan Pada,” vol. 1, no. 1, pp. 597–603, 2021.

A. R. Machdi, “Analisa dan Implementasi Sistem Kemananan Jaringan Intrusion Detection System ( IDS ) Berbasis Mikrotik,” vol. 1, no. 1, pp. 16–21, 2021.

W. W. Purba and R. Efendi, “Perancangan dan analisis sistem keamanan jaringan komputer menggunakan SNORT,” Aiti, vol. 17, no. 2, pp. 143–158, 2021, doi: 10.24246/aiti.v17i2.143-158.

M. Syani, “Implementasi Intrusion Detection System (Ids) Menggunakan Suricata Pada Linux Debian 9 Berbasis Cloud Virtual Private Servers (Vps),” J. Inkofar, vol. 1, no. 1, pp. 13–20, 2020, doi: 10.46846/jurnalinkofar.v1i1.155.

R. S. Putra, R. Mayasari, and N. B. A. Karna, “Implementasi Dan Analisis Keamanan Jaringan Virtual HIPS Snort Pada Layanan Web Server Dengan Penyerangan DOS DAN DDOS,” e-Proceeding Eng., vol. 5, no. 3, pp. 4958–4965, 2018.

S. Khadafi, Y. D. Pratiwi, and E. Alfianto, “Keamanan Ftp Server Berbasiskan Ids Dan Ips Menggunakan Sistem Operasi Linux Ubuntu,” Netw. Eng. Res. Oper., vol. 6, no. 1, p. 11, 2021, doi: 10.21107/nero.v6i1.190.

U. A. Ahmad, R. E. Saputra, and P. Y. Pangestu, “Perancangan Infrastruktur Jaringan Komputer Menggunakan Fiber Optic Dengan Metode Network Develpoment Life Cycle ( Ndlc ) Design Of Computer Network Infrastructure Using Optical Fiber With Network Development Life Cycle (NDLC) Method,” vol. 8, no. 6, pp. 12066–12079, 2021.




DOI: http://dx.doi.org/10.30645/j-sakti.v7i1.572

Refbacks

  • There are currently no refbacks.



J-SAKTI (Jurnal Sains Komputer & Informatika)
Published Papers Indexed/Abstracted By:


Jumlah Kunjungan :

View My Stats