QUICK REPORT FOR HOST BASED INTRUSION DETECTION SYSTEM (HIDS)
Abstract
Keywords
Full Text:
PDFReferences
Abdillah, R., 2012. Pencegahan Brute Force Authentication Via Protokol Ssh (Secure Shell) Menggunakan Metode Host Based Intrusion Detection System (HIDS). In Konferensi Nasional Sistem Informasi (KNSI). Bali, 2012.
Al-Saedi, K. et al., 2013. RESEARCH PROPOSAL: AN INTRUSION
DETECTION SYSTEM ALERT REDUCTION AND ASSESSMENT
FRAMEWORK BASED ON DATA MINING. Journal of Computer Science,
(4), pp.421-26.
Anon., 2012. Internet World Stats - Usage and Population Statistic. [Online] Available at: HYPERLINK "http://www.internetworldstats.com/t
op20.htm" http://www.internetworldstats.com/top20. htm [Accessed 1 May 2014].
Anon., 2013. BBC - Homepage. [Online] Available at: HYPERLINK
"http://www.bbc.co.uk/news/technology-25547738" http://www.bbc.co.uk/news/technology-25547738 .
Anon., 2014. BBC - Homepage. [Online] Available at: HYPERLINK
"http://www.bbc.com/news/technology-13846031" http://www.bbc.com/news/technology-13846031.
Babbin, J., Biles, S. & Orebaugh, A.D., 2005. Snort Cookbook. O'Reilly.
Baker, A.R. & Esler, J., 2007. Snort® IDS and IPS Toolkit. Burlington: Syngress.
Beale, J., Baker, A.R. & Caswell, B.P.M., 2004. Snort 2.1 Intrusion Detection. 2nd ed. Rockland, United States of America: Syngress Publishing.
ID-SIRTII/CC, 2014. ID-SIRTII/CC. [Online] Available at: HYPERLINK
"http://idsirtii.or.id/berita/baca/41/setahun-40-juta-konsumen-jadi-korbanhacking-.html" http://idsirtii.or.id/berita/baca/41/setahun-40-juta-konsumen-jadi-korban-hacking-.html [Accessed 1 May 2014].
Jalali, H. & Baraani, A., 2012. Process Aware Host-based Intrusion Detection Model. International Journal of Communication Networks and Information Security (IJCNIS), 4(2), pp.117-24.
Ridwan, T., 2010. APLIKASI REMOTE ACCESS CONSOLE LINUX
BERBASIS SMS GATEWAY MENGGUNAKAN GAMMU DAN GAMBAS (STUDY KASUS PROXYSERVER GLOBAL DEVELOPMENT LEARNING NETWORK UNIVERSITY OF RIAU). Tugas Akhir. Pekanbaru: Universitas Islam Negeri Sultan Syarif Kasim Riau.
Scarfone, K. & Mell, P., 2007. 800-94 Guide to Intrusion Detection and Prevention Systems (IDPS). Special Publication. Gaithersburg: National Institute of Standards and Technology (NIST).
DOI: http://dx.doi.org/10.24014/sitekin.v11i2.761
Refbacks
Copyright (c) 2015 Jurnal Sains dan Teknologi Industri
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Editorial Address: FAKULTAS SAINS DAN TEKNOLOGI UIN SULTAN SYARIF KASIM RIAU Kampus Raja Ali Haji Gedung Fakultas Sains & Teknologi UIN Suska Riau Jl.H.R.Soebrantas No.155 KM 18 Simpang Baru Panam, Pekanbaru 28293 Email: sitekin@uin-suska.ac.id © 2023 SITEKIN, ISSN 2407-0939 |
SITEKIN Journal Indexing:
Google Scholar | Garuda | Moraref | IndexCopernicus | SINTA
SITEKIN by http://ejournal.uin-suska.ac.id/index.php