QUICK REPORT FOR HOST BASED INTRUSION DETECTION SYSTEM (HIDS)

Rahmad Abdillah

Abstract


Saat ini, Notifikasi penyusup pada Intrusion detection system masih menggunakan teknologi pager. Penelitian ini mengusulkan quick report pada sistem pendeteksian penyusupan berbasis hosts (HIDS) sebagai alternatif notifikasi instrusi kepada administrator ketika terdeteksi oleh IDS. Quick report ini dibangun menggunakan konsep SMS Gateway. HIDS dihubungkan dengan teknologi SMS gateway sebagai media penyampaian notifikasi intrusi, sehingga administrator lebih cepat mendapatkan informasi penyusup di dalam server.

Keywords


Host Based , Sistem Pendeteksi Penyusup, Quick Report

Full Text:

PDF

References


Abdillah, R., 2012. Pencegahan Brute Force Authentication Via Protokol Ssh (Secure Shell) Menggunakan Metode Host Based Intrusion Detection System (HIDS). In Konferensi Nasional Sistem Informasi (KNSI). Bali, 2012.

Al-Saedi, K. et al., 2013. RESEARCH PROPOSAL: AN INTRUSION

DETECTION SYSTEM ALERT REDUCTION AND ASSESSMENT

FRAMEWORK BASED ON DATA MINING. Journal of Computer Science,

(4), pp.421-26.

Anon., 2012. Internet World Stats - Usage and Population Statistic. [Online] Available at: HYPERLINK "http://www.internetworldstats.com/t

op20.htm" http://www.internetworldstats.com/top20. htm [Accessed 1 May 2014].

Anon., 2013. BBC - Homepage. [Online] Available at: HYPERLINK

"http://www.bbc.co.uk/news/technology-25547738" http://www.bbc.co.uk/news/technology-25547738 .

Anon., 2014. BBC - Homepage. [Online] Available at: HYPERLINK

"http://www.bbc.com/news/technology-13846031" http://www.bbc.com/news/technology-13846031.

Babbin, J., Biles, S. & Orebaugh, A.D., 2005. Snort Cookbook. O'Reilly.

Baker, A.R. & Esler, J., 2007. Snort® IDS and IPS Toolkit. Burlington: Syngress.

Beale, J., Baker, A.R. & Caswell, B.P.M., 2004. Snort 2.1 Intrusion Detection. 2nd ed. Rockland, United States of America: Syngress Publishing.

ID-SIRTII/CC, 2014. ID-SIRTII/CC. [Online] Available at: HYPERLINK

"http://idsirtii.or.id/berita/baca/41/setahun-40-juta-konsumen-jadi-korbanhacking-.html" http://idsirtii.or.id/berita/baca/41/setahun-40-juta-konsumen-jadi-korban-hacking-.html [Accessed 1 May 2014].

Jalali, H. & Baraani, A., 2012. Process Aware Host-based Intrusion Detection Model. International Journal of Communication Networks and Information Security (IJCNIS), 4(2), pp.117-24.

Ridwan, T., 2010. APLIKASI REMOTE ACCESS CONSOLE LINUX

BERBASIS SMS GATEWAY MENGGUNAKAN GAMMU DAN GAMBAS (STUDY KASUS PROXYSERVER GLOBAL DEVELOPMENT LEARNING NETWORK UNIVERSITY OF RIAU). Tugas Akhir. Pekanbaru: Universitas Islam Negeri Sultan Syarif Kasim Riau.

Scarfone, K. & Mell, P., 2007. 800-94 Guide to Intrusion Detection and Prevention Systems (IDPS). Special Publication. Gaithersburg: National Institute of Standards and Technology (NIST).




DOI: http://dx.doi.org/10.24014/sitekin.v11i2.761

Refbacks



Copyright (c) 2015 Jurnal Sains dan Teknologi Industri

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.


Editorial Address:
FAKULTAS SAINS DAN TEKNOLOGI
UIN SULTAN SYARIF KASIM RIAU

Kampus Raja Ali Haji
Gedung Fakultas Sains & Teknologi UIN Suska Riau
Jl.H.R.Soebrantas No.155 KM 18 Simpang Baru Panam, Pekanbaru 28293
Email: sitekin@uin-suska.ac.id
© 2023 SITEKIN, ISSN 2407-0939

SITEKIN Journal Indexing:

Google Scholar | Garuda | Moraref | IndexCopernicus | SINTA


Creative Commons License
SITEKIN by http://ejournal.uin-suska.ac.id/index.php