Murien Nugraheni
Program Studi Teknik Informatika Universitas Ahmad Dahlan Yogyakarta Jl. Prof. Dr. Soepomo, S.H., Warungboto, Janturan, Yogyakarta 55164 Telp : (0274) 563515 ext. 3208

Published : 12 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 1 Documents
Search
Journal : IJISTECH (International Journal Of Information System

Design and Implementation of Sucirata-Based Instrusion Detection System as a Network Security System Cloud Computers Idrus, Ali; Sugiyanta, Lipur; Nugraheni, Murien; Subhiyanto, S
IJISTECH (International Journal of Information System and Technology) Vol 7, No 2 (2023): The August edition
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v7i2.310

Abstract

Cloud computing is currently being developed and widely used by companies that require large and efficient computing resources. As technology evolves, security threats in cloud services continue to increase. Various threats in cloud computing technology can be avoided by maximizing the identification of security holes. Information threats associated with cloud computing require network and service security against possible attacks. Suricata is a threat detection identifier supported by existing rules. When an attack is detected, Suricata will create a log of the attack committed, Suricata can also perform automatic detection at level 7. The author collected the results of the attack in a log. Sign Suricata and the authors also evaluate whether Suricata can detect port scanning, brute force, denial of service, and backdoors for Cloud Computing. From the test results, optimal results were obtained from the results of attacks detected by the Suricata Intrusion Detection System (IDS) logs in the /var/log/suricata/fast directory.log, the author added that the Suricata configuration is not only for detection, so it can also run drops if there is suspicious activity using network filters that already exist in Suricata and manipulated configuration assumptions to optimally improve security in the cloud.