Claim Missing Document
Check
Articles

Found 2 Documents
Search

EVALUASI PERFORMANSI DETEKSI SERANGAN PADA HIDS OSSEC EKA STEPHANI SINAMBELA
JURNAL ILMIAH KOHESI Vol 4 No 1 (2020): JURNAL ILMIAH KOHESI
Publisher : LP2MTBM MAKARIOZ

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (716.303 KB)

Abstract

HIDS (Host Intrusion Detection system) is an application which is intended for monitoring and protecting the host computer system (server) and its network activities. This intrusion detection system is integrated into the server to detect the intruder attack activities and report the events to the network administrator. Throughout the years, different HIDS technology developed to counter, the computer crime with different type of attacks that attempts for entering the computer system. Therefore, the main goal of this paper is to provide a review of a most-widely used HIDS application called OSSEC. The evaluation process is conducted by applying some scenarios that practice the intruder activities who attempts to penetrate the host computer system. Each scenario is designed to run different intruder attacks that come from one or more attacker. Finally, the performance is evaluated by measuring the response time of OSSEC to detect the intrusion, the consumption of CPU and memory while detecting the intrusion.
Design and Implementation of SDN Firewall Using Pox Controller and Open vSwitch Eka Stephani Sinambela; Jesika L Manurung; Grace Agnes Kesya; Harli J Sinabutar; Istas Pratomo Manalu; Gerry italiano wowiling; Frengki Simatupang; Marojahan M.T Sigiro
IJAI (Indonesian Journal of Applied Informatics) Vol 10, No 1 (2025)
Publisher : Universitas Sebelas Maret

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20961/ijai.v10i1.109296

Abstract

Abstrak : Perkembangan Software-Defined Networking (SDN) menghadirkan paradigma baru dalam pengelolaan jaringan melalui pemisahan antara control plane dan data plane, yang memungkinkan penerapan mekanisme keamanan jaringan secara terpusat dan terprogram. Salah satu mekanisme keamanan penting dalam SDN adalah Firewall berbasis flow rules. Penelitian ini mengimplementasikan Firewall berbasis SDN dengan memanfaatkan POX Controller sebagai control plane dan Open vSwitch (OvS) sebagai data plane. Evaluasi dilakukan melalui skenario pengujian konektivitas yang melibatkan komunikasi antara controller, OvS, dan beberapa host dalam jaringan. Hasil pengujian menunjukkan bahwa seluruh skenario berjalan sesuai dengan aturan Firewall yang dirancang. Secara kuantitatif, mekanisme pemfilteran trafik berbasis IP Address mencapai tingkat keberhasilan 100%, ditunjukkan oleh keberhasilan pemblokiran akses dan tetap terjaganya konektivitas pada jalur yang diperbolehkan. Hasil ini membuktikan bahwa integrasi POX Controller dan OvS efektif digunakan sebagai Firewall sederhana berbasis SDN serta berpotensi dikembangkan untuk mekanisme keamanan yang lebih kompleks.==================================================Abstract :The development of Software-Defined Networking (SDN) introduces a new paradigm in network management by separating the control plane from the data plane, enabling centralized and programmable network security mechanisms. One essential security mechanism in SDN is a firewall based on flow rules. This study implements an SDN-based firewall using the POX Controller as the control plane and Open vSwitch (OvS) as the data plane. The system is evaluated through connectivity testing scenarios involving communication between the controller, OvS, and multiple hosts. Experimental results show that all test scenarios operate according to the defined firewall rules. Quantitatively, the IP address–based traffic filtering mechanism achieves a 100% success rate, as indicated by successful blocking of unauthorized access while maintaining permitted network connectivity. These results demonstrate that the integration of POX Controller and OvS is effective as a simple SDN-based firewall and has the potential to be extended to support more advanced network security mechanisms.