PENERAPAN METODE PORT KNOCKING DAN INTRUSION DETECTION (IDS) SYSTEM PADA VIRTUAL PRIVATE SERVER (VPS)

نویسندگان

چکیده

Keamanan Virtual Private Server perlu dijamin dengan menerapkan metode keamanan yang diperlukan sesuai ancaman-ancaman serangan mungkin terjadi. Peningkatan untuk menjamin atau mengurangi resiko peluang terjadinya cyber terjadi pada server salah satunya DDoS (Distributed Denial Of Service). Metode Port Knocking dapat mengatur buka tutup port logic dalam jaringan komputer perintah knock (pengetukan) menggunakan Knockd dan Intrusion Detection System Snort memantau lalu lintas paket jaringan. Sistem pendeteksi membaca aktivitas mencurigakan dari sistem mendeteksi melakukan selanjutnya informasi disampaikan melalui notifikasi Bot Telegram. Ujicoba sebanyak 9 kali LOIC system 100 persen berhasil dikirim ke telegram. ketukan 21 (ftp), 22 (ssh), 23 (telnet), 80 (http) knockd 3 durasi 5 detik

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Intrusion Detection System (IDS) Evaluation

This paper describes a set of metrics that will help administrators of distributed, real-time (clustered) computer facilities to select the best intrusion detection system for their facilities. The metrics herein are the subset of our general metric set that particularly impact real-time and distributed processing issues. We discuss related works in this field, the role of intrusion detection i...

متن کامل

Importance of Intrusion Detection System (IDS)

Intruders computers, who are spread across the Internet have become a major threat in our world, The researchers proposed a number of techniques such as (firewall, encryption) to prevent such penetration and protect the infrastructure of computers, but with this, the intruders managed to penetrate the computers. IDS has taken much of the attention of researchers, IDS monitors the resources comp...

متن کامل

Classifier Selection Models for Intrusion Detection System (ids)

Any abnormal activity can be assumed to be anomalies intrusion. In the literature several techniques and algorithms have been discussed for anomaly detection. In the most of cases true positive and false positive parameters have been used to compare their performance. However, depending upon the application a wrong true positive or wrong false positive may have severe detrimental effects. This ...

متن کامل

Design and Implementation of Intrusion Detection System ( Ids ) Sensor Deployment

Network intrusion detection systems provide proactive defense against security threats by detecting and blocking attack-related traffic. This task can be highly complex, and therefore, software-based network intrusion detection systems have difficulty in handling high speed links. This paper describes the design and implementation of a highperformance network intrusion detection system that com...

متن کامل

IDS/A: An Interface between Intrusion Detection System and Application

We describe a number of problems which may reduce the effectiveness of a conventional network intrusion detection system. These problems are the result of the IDS having to second-guess the components or applications it is protecting. We propose a bi-directional interface between IDS and application. Applications use this interface to describe their state and submit their actions for approval t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Methodika : Jurnal Teknik Informatika Sistem Informasi

سال: 2023

ISSN: ['2614-3143', '2442-7861']

DOI: https://doi.org/10.46880/mtk.v9i1.1695