Mengoptimalkan Pencegahan Serangan Brute Force pada Linux melalui Penerapan Metode Aplikasi IDS Snort

  • Dody Hidayat Universitas Harapan Medan, Medan, Indonesia
  • Ramli Ramli Universitas Harapan Medan, Medan, Indonesia
Keywords: IDS, Snort, Linux, Bruteforce

Abstract

Network security system on the server is an important factor to ensure the stability, integrity and validity of data. Implementation of Snort-based Intrusion Detection System can save software procurement costs because it is free and reliable enough to detect security attacks. Snort-based IDS system can be implemented on Linux operating system. An attack may or may not be detected by Snort IDS depending on the presence or absence of appropriate rules. The testing process used is a port scanning attack technique, brute force attack technique, and hacker IP address blocking. The port scanning attack technique can generate important information about a network and can detect open ports, including port 22, which is the secure shell. The brute force attack technique can generate illegal username and password combinations on the server system. IDS snort can detect incoming attacks on the server system, then IDS snort can detect the IP address that is trying to hack the server system. Ensure data on the server system is secure by allowing the administrator to track any hacker activity.

Downloads

Download data is not yet available.

References

[1] W. Zaenal Mutaqin Subekti, Hendra Setiawan, Satria, Widia Murni Wijaya,Aliy Hafiz, “Perancangan Infrastruktur Domain Name Server Lokal Menggunakan Ubuntu Server 16.04 Pada PT. Xyz,” no. 2, p. 6, 2021.
[2] T. M. Diansyah and R. Liza, “Paper Simulasi Pengamanan Virtual Server Menggunakan Dionaea Honeypot Dan Tunneling Sebagai Proses Pengamanan Komunikasi Data”.
[3] A. S. Rosana, “Kemajuan Teknologi Informasi dan Komunikasi dalam Industri Media di Indonesia,” Gema Eksos, vol. 5, no. 2, pp. 146–148, 2010, [Online]. Available: https://www.neliti.com/id/publications/218225/kemajuan-teknologi-informasi-dan-komunikasi-dalam-industri-media-di-indonesia
[4] D. Purwanto, “Peranan Kriptografi Dalam Peningkatan Pengamanan Sistem Informasi,” Semin. Soc. Sci. Eng. Hum., pp. 188–193, 2020.
[5] R. Rupiat, S. Faisal, T. Al Mudzakir, and S. Arum Puspita Lestari, “Deteksi Serangan Peretas Menggunakan Honeypot Cowrie Dan Intrusion Detection System Snort,” Conf. Innov. Appl. Sci. Technol. , no. Ciastech, pp. 727–736, 2020.
[6] J. Tektro, “IMPLEMENTASI INTRUSION DETECTION SYSTEM ( IDS ) PADA SISTEM KEAMANAN JARINGAN MENGGUNAKAN TELEGRAM,” vol. 7, no. 1, pp. 44–50, 2023.
[7] L. Putri, “Implementasi Intrusion Detection System ( Ids ) Menggunakan Snort Pada Jaringan Wireless ( Studi Kasus : Smk Triguna Ciputat ),” Implementasi Intrusion Detect. Syst. ( Ids ) Menggunakan Snort Pada Jar. Wirel. ( Stud. Kasus Smk Triguna Ciputat ), no. 1, pp. 1–105, 2011.
[8] F. A. Kurniawan, “Pendekatan Business Model Canvas Sebagai Perancangan Strategi Bisnis Baru (Studi Pada UMKM UD. Gading Mas Pasuruan).,” J. SKETSA BISNIS, vol. 4, no. 2, pp. 123–131, 2017.
[9] A. Aptika, “Keamanan Jaringan Internet dan Firewall,” 2017. https://aptika.kominfo.go.id/2017/06/keamanan-jaringan-internet-dan-firewall/
[10] T. Pangestu and R. Liza, “Analisis Keamanan Jaringan pada Jaringan Wireless dari Serangan Man In The Middle Attack DNS Spoofing,” Jitekh, vol. 10, no. 2, pp. 60–67, 2022.
[11] M. I. Triwahyudi and I. Veritawati, “Sistem Informasi Pelayanan Jaringan Komputer,” Format J. Ilm. Tek. Inform., vol. 11, no. 1, 2022, doi: 10.22441/10.22441/format.2022.v11.i1.006.
[12] I. K. K. A. Marta, I. N. B. Hartawan, and I. K. S. Satwika, “Analisis Sistem Monitoring Keamanan Server Dengan Sms Alert Berbasis Snort,” Inser. Inf. Syst. Emerg. Technol. J., vol. 1, no. 1, p. 25, 2020, doi: 10.23887/insert.v1i1.25874.
[13] A. Wicaksana and T. Rachman, “Implementasi Kinerja Intrusion Prevention System (IPS) sebgai sistem keamanan pada Jaringan Wireless,” Angew. Chemie Int. Ed. 6(11), 951–952., vol. 3, no. 1, pp. 10–27, 2018, [Online]. Available: https://medium.com/@arifwicaksanaa/pengertian-use-case-a7e576e1b6bf
[14] M. Ulfa, J. Jenderal, A. Yani, and N. Palembang, “Di Jaringan Internet Universitas Bina Darma,” J. Imiah MATRIK, vol. 15, no. 12, pp. 105–118, 2013.
[15] M. Jufri and H. Heryanto, “Peningkatan Keamanan Jaringan Wireless Dengan Menerapkan Security Policy Pada Firewall,” JOISIE (Journal Inf. Syst. Informatics Eng., vol. 5, no. 2, pp. 98–108, 2021, doi: 10.35145/joisie.v5i2.1759.
Published
2023-08-21
How to Cite
Hidayat, D., & Ramli, R. (2023, August 21). Mengoptimalkan Pencegahan Serangan Brute Force pada Linux melalui Penerapan Metode Aplikasi IDS Snort. JiTEKH, 11(2), 57-61. https://doi.org/https://doi.org/10.35447/jitekh.v11i2.764