ANALISIS KINERJA SISTEM PENCEGAHAN PENYUSUPAN JARINGAN MENGGUNAKAN SNORT IDS DAN HONEYD PADA WINDOWS

Usama, Usama (2019) ANALISIS KINERJA SISTEM PENCEGAHAN PENYUSUPAN JARINGAN MENGGUNAKAN SNORT IDS DAN HONEYD PADA WINDOWS. Skripsi thesis, Institut Teknologi Nasional Malang.

[img] Text
lengkap.pdf
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (1MB)
[img] Text
bab I.pdf
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (98kB)
[img] Text
bab II.pdf
Restricted to Registered users only
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (295kB) | Request a copy
[img] Text
bab II.pdf
Restricted to Registered users only
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (295kB) | Request a copy
[img] Text
bab III.pdf
Restricted to Registered users only
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (199kB) | Request a copy
[img] Text
bab IV.pdf
Restricted to Registered users only
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (302kB) | Request a copy
[img] Text
bab V.pdf
Restricted to Registered users only
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (86kB) | Request a copy
[img] Text
daftar pustaka.pdf
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (85kB)
[img] Text
Lampiran.pdf
Restricted to Registered users only
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (2MB) | Request a copy
[img] Text
Jurnal Skripsi.pdf
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (507kB)

Abstract

ANALISIS KINERJA SISTEM PENCEGAHAN PENYUSUPAN JARINGAN MENGGUNAKAN SNORT IDS DAN HONEYD PADA WINDOWS Usama YudiLimpraptono Sotyohadi usamaassegaf@gmail.com ABSTRAK Snort sebuah perangkat lunak yang open source yang mendukung semua sistem operasi seperti linux,window maupun solaris, snort merupakan sistem pendeteksi yang bisa dikembangkan menjadi sistem pencegahan dengan cara mengkombinasikan IDS dan firewall dengan menjalankan snort pada mode inline.. snort sangat membantu para administrator jaringan untuk meningkatkan sistem keamanan jaringan, karena bisa dikonfigurasi sesuai keinginan. Snort juga bisa dikonfigurasi untuk meyimpan outputnya ke database log snort, yang setiap saat bisa dilihat paket yang dianggap sebuah penyusupan. Pada skripsi ini penyusun akan mengkonfigurasi snort pada sistem operasi windows 7, kenapa memilih windows karena pada penelitian sebelumnya kebanyakan menggunakan sistem operasi linux. Disini penulis mengkonfigurasi snort sebagai sistem yang dapat mendeteksi dan mencegah paket yang di identifikasi sebuah serangan, jika terdeteksi sebagai sebuah serangan maka sistem akan mengirimkan alert untuk memblocking sehingga paket tersebut tidak terkirim ke alamat korban, namun snort akan mencatat disebuah log databasenya. Ketika Snort NIPS(Network Intrusion Prevention System) aktif, serangan seperti Ping Of death, seranga DOS dan Port Scanning bisa dicegah. Kata Kunci : Intrusion Detection System, Windows,Snort dan Rules Snort PERFORMANCE ANALYSIS OF NETWORK INTRUSION PREVENTION SYSTEM USING SNORT IDS AND HONEYD ON WINDOWS Usama YudiLimpraptono Sotyohadi usamaassegaf@gmail.com ABSTRACT Snort, an open source software that supports all operating systems such as Linux, Windows and Solaris, Snort is an Intrusion Detection System (IDS) detection system that can be developed into an Intrusion Prevention System (IPS) prevention system by combining IDS and a firewall by running snort in inline mode too. some network administrators use this software. snort is very useful for network administrators to improve the network security system because it can be configured as desired. Snort can be configured to save its output to the Snort log database which can be seen at any time which packages are considered an attack. In this thesis the author will configure the snort on the Windows 7 operating system, why choose Windows because in previous studies mostly use the Linux operating system. Here the author configures it as a prevention system that whenever a package is identified as an attack or suspicious it will be rejected. Snort works with its rules that will match the package in the snort's rules database. if it is in the form of an attack the system will send an alert to block it so that the packet is not forwarded to the victim but the snort will record it in its database log. When Snort NIPS is active, attacks like Ping of death, DOS attacks and Port Scanning are prevented Keywords : Intrusion Detection System, Windows,Snort and Rules Snort.

Item Type: Thesis (Skripsi)
Additional Information: (Usama) (1512523)
Uncontrolled Keywords: Intrusion Detection System, Windows,Snort and Rules Snort
Subjects: Engineering > Electrical Engineering
Divisions: Fakultas Teknologi Industri > Teknik Elektro S1 > Teknik Elektro S1(Skripsi)
Depositing User: Ms Nunuk Yuli
Date Deposited: 03 Oct 2019 04:26
Last Modified: 03 Oct 2019 04:26
URI: http://eprints.itn.ac.id/id/eprint/4339

Actions (login required)

View Item View Item