Mengoptimalkan Keamanan Jaringan Komputer Menggunakan Snort dan Telegram Bot yang Terintegrasi dengan Mikrotik
Indonesia
Abstract
The implementation of IDS (Intrusion Detection System) snort and telegram bot that can be integrated with a microtic router on the Uppala Villa Nusa Dua computer network is used to detect attack activities and suspicious activity on the Uppala Villa Nusa Dua computer network and to provide notification in real-time logs of suspicious activity on computer network. The research method used is the SPDLC (Security Policy Development Life Cycle) method which has six stages: Identification, Analysis, Design, Implementation, Testing and Evaluation. The software used on the server computer is Snort, WinPcap, Xampp and BASE (Basic Analysis and Security Engine) while for testing a computer network security system using Nmap, Loic and Brutus tools. The results obtained by the implementation of the IDS (Intrusion Detection System) Snort and telegram bot have been successfully implemented and can be integrated with the microtic router. Based on testing conducted after the implementation of the new system, it was found that 95% of the use of snort and telegram bot can optimize the computer network security system at Uppala Villa Nusa Dua.
Downloads
References
Danang Tri Atmaja, Eka Budhy Prasetya, Priadhana Edi Kresnha, "Notifikasi Adanya Serangan Pada Jaringan Komputer dengan Mengirim Pesan Melalui Aplikasi Telegram dan Kontrol Server," Jurnal Seminar Nasional Sains dan Teknologi 2018, Vol. 5, No. 1, 2-3, Oktober 2018.
Azaim. Haikal, "Mengenal Intrusion Detection System (IDS)", 12 January 2017, [Online]. Tersedia: https://netsec.id/intrusion-detection-system/ [Diakses: 21 Oktober 2019].
Sutarti, Adi Putranto Pancaro, Fembi Isnanto Saputra, "Implementasi IDS (Intrusion Detection System Pada Sistem Keamanan Jaringan SMAN 1 Cikeusal," Jurnal Prosisko, Vol. 5, No. 1, 2-3, Maret 2018.
Bangun Saputra, Setia Juli Irza Ismail, Mochamad Fachru Rizal, "Perancangan dan Implementasi NIDS (Network Intrusion Detection System) Menggunakan Snort dan BASE Pada Freebsd 10," Jurnal e-Proceeding of Applied Science, Vol. 1, No. 2, Agustus 2015.
Agung Sulistyo, Felix Andreas Sutanto, " Warning System Gangguan Konektivitas Jaringan Pada BMKG Semarang Dengan Telegram Bot," Prosiding SINTAK 2018, Oktober 2018.
Fauzi. Yusuf, "Mengenal Berbagai Jenis Serangan Pada Jaringan Komputer", 20 January 2017, [Online]. Tersedia: https://netsec.id/jenis-serangan-jaringan-komputer/ [Diakses: 21 Oktober 2019].
Yudhi Arta, Abdul Syukur, Roni Kharisma, "Simulasi Implementasi Intrusion Prevention System (IPS) Pada Router Mikrotik," IT Journal Research and Development, Vol. 3, No.1, 105-106, Agustus 2018.
I Gusti Komang Oka Mardiyana, "Keamanan Jaringan Dengan Firewall Filter Berbasis Mikrotik Pada Laboratorium Komputer STIKOM Bali," Konferensi Nasional Sistem & Informatika 2015, Oktober 2015.
Muh. Sadam Husain S.S, LM. Fid Aksara, Natalis Ransi, "Implementasi Keamanan Server Pada Jaringan Wireless Menggunakan Metode Intrusion Detection and Prevention System (IDPS) (Studi Kasus : Techno's Studio)" Journal semanTIK, Vol. 4, No.2, pp. 11-20, Jul-Des 2018.
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Mengoptimalkan Keamanan Jaringan Komputer Menggunakan Snort dan Telegram Bot yang Terintegrasi dengan Mikrotik
Pages: 247−256
Copyright (c) 2022 I Putu Gede Abdi Sudiatmika, I Putu Yesha Agus Ariwanta, I Gusti Ayu Sri Melati
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).