This Author published in this journals
All Journal Jurnal Jarkom
Sukma Ageng Prihasmoro, Sukma Ageng
Unknown Affiliation

Published : 3 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 3 Documents
Search

SIMULASI SISTEM DETEKSI PENYUSUP DALAM JARINGAN KOMPUTER BERBASIS WEB INTERFACE SERTA PENCEGAHAN UNTUK MENINGKATKAN KEAMANAN Prihasmoro, Sukma Ageng; Rachmawati, Yuliana; Fatkhiyah, Erfanti
Jurnal Jarkom Vol 2, No 1 (2014): EDISI DESEMBER 2014
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACT            Network security is a matter that needs to be given special attention, because infiltration often occurs with a variety of purposes. Intrusion detection systems (IDS) is a method of network security by detecting intrusion and provide output results in the form of alerts that can be known through the web. To implement the various components of the detection system is needed in order to maximize performance. In this study, the application is used as a detection system Snort attack. Basic Analysis and Security System (BASE) is used as a web interface. Log storage media attacks using MySQL. Fields marked with an ICMP protocol detection system ie, TCP and UDP. To follow up, use iptables and portsentry in the IP address blocking intruders. Attacks that occur can be analyzed using BASE, this application can indicate the type of attacks carried out and can see the span of attack for several months. By analyzing the types of attacks that occur, can help administrators reinforce the gap.Keywords : IDS, intruder, network security
SIMULASI SISTEM DETEKSI PENYUSUP DALAM JARINGAN KOMPUTER BERBASIS WEB INTERFACE SERTA PENCEGAHAN UNTUK MENINGKATKAN KEAMANAN Prihasmoro, Sukma Ageng; Rachamawati, Rr.Yuliana; Fatkhiyah, Erfanti
Jurnal Jarkom Vol 2, No 2 (2015): EDISI JUNI 2015
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ABSTRACT            Network security is a matter that needs to be given special attention, because infiltration often occurs with a variety of purposes. Intrusion detection systems (IDS) is a method of network security by detecting intrusion and provide output results in the form of alerts that can be known through the web. To implement the various components of the detection system is needed in order to maximize performance. In this study, the application is used as a detection system Snort attack. Basic Analysis and Security System (BASE) is used as a web interface. Log storage media attacks using MySQL. Fields marked with an ICMP protocol detection system ie, TCP and UDP. To follow up, use iptables and portsentry in the IP address blocking intruders. Attacks that occur can be analyzed using BASE, this application can indicate the type of attacks carried out and can see the span of attack for several months. By analyzing the types of attacks that occur, can help administrators reinforce the gap. Keywords : IDS, intruder, network security
SIMULASI SISTEM DETEKSI PENYUSUP DALAM JARINGAN KOMPUTER BERBASIS WEB INTERFACE SERTA PENCEGAHAN UNTUK MENINGKATKAN KEAMANAN Prihasmoro, Sukma Ageng; Rachmawati, Rr. Yuliana; Fatkhiyah, Erfanti
Jurnal Jarkom Vol 4 No 1 (2016): Juni 2016
Publisher : Jurnal Jarkom

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Keamanan jaringan merupakan hal yang perlu diberi perhatian khusus, karena penyusupan sering terjadi dengan berbagai tujuan. Intrusion detection system (IDS) adalah sebuah metode pengamanan jaringan dengan mendeteksi penyusupan dan memberikan hasil output berupa alert yang dapat diketahui melalui web. Untuk mengimplementasikan sistem deteksi diperlukan berbagai komponen agar kinerjanya lebih maksimal. Pada penelitian ini aplikasi snort digunakan sebagai sistem deteksi serangan. Basic Analysis and Security System (BASE) digunakan sebagai web interface. Media penyimpanan log serangan menggunakan MySQL. Bagian yang diberi sistem deteksi yaitu protokol ICMP,TCP dan UDP. Untuk tindak lanjut, digunakan iptables dan portsentry dalam melakukan pemblokiran IP address penyusup. Serangan yang terjadi dapat dianalisa menggunakan BASE, aplikasi ini dapat menunjukkan jenis serangan yang dilakukan serta dapat melihat rentang waktu serangan selama beberapa bulan. Dengan menganalisa jenis serangan yang terjadi, dapat membantu administrator memperkuat celah tersebut.