Analisis Sistem Pendeteksian Dan Pencegahan Penyusup Pada Jaringan Komputer Dengan Menggunakan Snort Dan Firewall Pada Sistem Operasi Distribusi Linux Ipcop Firewall

Kundang Karsono Juman

Sari


An Intrusion detection system (IDS) is software and/or hardware designed to detect unwanted attempts at accessing, manipulating, and/or disabling of computer systems, mainly through a network, such as the Internet. These attempts may take the form of attacks, as examples, by crackers, malware and/or disgruntled employees. An IDS cannot directly detect attacks within properly encrypted traffic. An intrusion detection system is used to detect several types of malicious behaviors that can compromise the security and trust of a computer system. This includes network attacks against vulnerable services, data driven attacks on applications, host based attacks such as privilege escalation, unauthorized logins and access to sensitive files, and malware (viruses,trojan horses, and worms). An IDS can be composed of several components: Sensors which generate security events, a Console to monitor events and alerts and control the sensors, and a central Engine that records events logged by the sensors in a database and uses a system of rules to generate alerts from security events received. There are several ways to categorize an IDS depending on the type and location of the sensors and the methodology used by the engine to generate alerts. In many simple IDS implementations all three components are combined in a single device or appliance.

Keywords:  Acess Open Data, Intruder, Intrusion Detection System (IDS)


Teks Lengkap:

PDF

Referensi


Ariyus, Doni, â€Intrusion detection systemâ€, Penerbit ANDI, Yogyakarta, 2007.

http://www.bondanmanajemen.blogspot.com, search : 25 Januari 2008

http://www.gajahmada .edu, search 10 Januari 2008

http://www.google.co.id, search: 25 Desember 2007

http://www.gudanglinux.net,search: 1 Februari 2008

http://www.ipcop.org, search: 1 Desember 2007

http://www.kamii_yogyakarta.tripod.com, search : 15 Januari 2008

http://www.mhaddons.tk, search: 28 Januari 2008

http://www.snort.org, search: 11 November 2007

Muammar, Ahmad, â€Firewallâ€, www.ilmu komputer.com, search: 25 Januari 2008

Sutabri, Tata, â€Karakteristik Sistemâ€, www.google.co.id, search: 20 Desember 2007

Syukuri, Agus Fanar, â€Masa Depan Sekuriti Informasiâ€, www.ilmukomputer.com, search : 23 Desember 2007.

Tanenbaum, Andrew S, â€Jaringan Komputer Edisi Bahasa Indonesiaâ€, Penerbit Pregalindo, Jakarta, 1997.

Thomas, Tom, “Network Security First-Stepâ€, Cisco, 2004.




DOI: https://doi.org/10.47007/komp.v6i2.458

Refbacks

  • Saat ini tidak ada refbacks.


VISITOR COUNTER:

gerEGGe

 

Web Analytics Made Easy - Statcounter View My Stats