ANALISIS SISTEM KEAMANAN WEB SERVER DAN DATABASE SERVER MENGGUNAKAN SURICATA
Abstract
Full Text:
PDFReferences
S. Dave, B. Trivedi, and J. Mahadevia, “Application Profiling based on Attack Alert Aggregation,” Glob. J. Comput. Sci. Technol. Network, Web Secur., vol. 13, no. 16, pp. 20–30, 2013.
W. I. E. Nvironment, “Efficacy Of Attack Detection Capability Of IDPS Based On ITSD Eployment In Wired and Wireless Environtment,” Int. J. Netw. Secur. Its Appl., vol. 5, no. 2, pp. 103–115, 2013.
T. Oisf et al., “Known issues & missing features About Suricata,” pp. 1–2.
J.M. Kizza (springer-Verlag London), Computer Communications and Networks. 2013.
A. M. R. Wajong, “Kerentanan yang dapat terjadi dijaringan komputer umumnya,” ComTech, vol. 3, no. 9, pp. 474–481, 2012.
M. Anif, S. Hws, and M. D. Huri, “Penerapan Intrusion Detection System ( IDS ) dengan metode Deteksi Port Scanning pada Jaringan Komputer di Politeknik Negeri Semarang,” J. Tele, vol. 13, no. Maret, pp. 25–30, 2015.
B. S. Candra, “No Title,” Fak. Ilmu Komput., vol. 1, no. Mei, pp. 1–23, 2015.
A. Dan, I. Honeypot, and M. Honeyd, “Analisis dan Implementasi Honeypot menggunakan Honeyd sebagai Alat Bantu Pengumpulan Informasi Aktivitas Serangan pada Jaringan,” J. Jarkom, vol. 1, no. 1, pp. 40–48, 2013.
G. Singh, “Intrusion Detection Using Network Monitoring Tools,” pp. 1–12, 2014.
É. Leblond and V. Julien, “Suricata Features Advanced functionalities IPS basics IPS advanced functions,” Open Inf. Secur. Found., pp. 30–41, 2013.
L. Kulkarni and J. Bakal, “Intrusion Detection System ( IDS ) for Wireless Ad-hoc Networks using Evolution Identification on Streaming Network Data for Detecting Unknown Network Attacks,” Int. J. Res. Comput. Commun. Technol., vol. 3, no. 2, pp. 213–218, 2014.
Refbacks
- There are currently no refbacks.
FAKULTAS SAINS DAN TEKNOLOGI
UIN SUSKA RIAU
Kampus Raja Ali Haji
Gedung Fakultas Sains & Teknologi UIN Suska Riau
Jl.H.R.Soebrantas No.155 KM 18 Simpang Baru Panam, Pekanbaru 28293
Email: sntiki@uin-suska.ac.id