PENERAPAN HIDS (HOST INTRUSION DETECTION SYSTEM) DALAM MEMBANGUN KONFIGURASI FIREWALL SECARA DINAMIK

Alfian Firdaus, Haruno Sajati, Yuliani Indrianingsih

Abstract

Development o f information technology and computer networks in particular its services on the one hand facilitate the work of human beings, but as the very widespread use of the internet, the security level of digital data has become more vulnerable to exploitation. The problem arises when the attacks happened on a computer network in a relatively fast, so that an administrator must always keep an eye on the computer network security. Limitations o f an administrator is exactly what underlies the
creation o f a system capable o f detecting and prevention of these attacks, so the time efficiency can be actually implemented. The system is built to prevent attacks on computer networks such as port scanning, ftp, ssh and telnet brute force. This system will analyze the number o f errors that occur on login these services, and makes a decision system if the login error exceeds the tolerance of an administrator. I f the number o f errors exceeds the tolerance, it will automatically create the firewall rules in a very short duration is one minute, so the system is able to prevent the attacks which happened in a very quick time.

References

Cartealy, Imam. 2013. Linux Networking (Ubuntu, Kubuntu, Debian, dll). Jasakom.

Raharjo, Budi. 2011. Belajar otodidak PEMROGRAMAN WEB dengan PHP + ORACLE. Bandung : Informatika Bandung.

Riyanto. 2010. Sistem Informasi Penjualan dengan PHP dan MySQL. Yogyakarta : GAVA MEDIA

Sulistiyani, Sri. Administrasi jaringan dengan Linux ubuntu. 2011. Yogyakarta : ANDI.

Tuxkeren, Athailah. 2013 . Ubuntu Server Panduan Singkat & Cepat. Jasakom.

Zam, Efvy. 2012. Wireless Hacking. Jakarta : PT Elex Media Komputindo

Article Metrics

Abstract view: 389 times
Download     : 424   times

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

Refbacks

  • There are currently no refbacks.