Claim Missing Document
Check
Articles

Found 1 Documents
Search

Pengujian Efektivitas Intrusion Detection Systems (IDS) Snort,Suricata, dan Zeek terhadap Serangan SYN Flood tection System Snort, Suricata, dan Zeek dalam Mendeteksi Serangan SYN Flood pada Windows Server 2022 Arya Wirianda, I Nyoman Bagus; Huwae, Raphael Bianco; Jatmika, Andy Hidayat
Jurnal Bumigora Information Technology (BITe) Vol. 7 No. 2 (2025)
Publisher : Universitas Bumigora

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30812/bite.v7i2.5226

Abstract

Background: Network security is an essential aspect of IT infrastructure management, with the main threat beingDenial-of-Service (DoS) attacks, particularly SYN Flood attacks.Objective: The purpose of this study is to evaluate the effectiveness of three Intrusion Detection Systems (IDS), namelySnort, Suricata, and Zeek, in detecting TCP SYN Flood attacks. The testing environment uses Windows Server 2022 asthe target system to simulate real-world conditions on a production network.Methods: This study employs an experimental method comprising the following stages: problem identification, analysis,design/development, implementation, testing, and results analysis.Result: This study shows that Snort performs best in attack detection, with an average of 68.25%, followed by Suricata at61.08% and Zeek at 55.77%. In terms of CPU usage, Snort also leads with an average of 16.3%, while Suricata and Zeekuse 24.5% and 21.7%, respectively. For RAM usage, Snort recorded an average of 18.2%, followed by Zeek at 16.6% andSuricata at 24.5%.Conclusion: This study concludes that Snort is superior in network detection and CPU efficiency. At the same time,Zeek is more efficient with RAM usage, while Suricata has average performance and the highest resource usage.