PENERAPAN HIDS (HOST INTRUSION DETECTION SYSTEM) DALAM MEMBANGUN KONFIGURASI FIREWALL SECARA DINAMIK
Submitted : 2016-12-22, Published : .
Abstract
creation o f a system capable o f detecting and prevention of these attacks, so the time efficiency can be actually implemented. The system is built to prevent attacks on computer networks such as port scanning, ftp, ssh and telnet brute force. This system will analyze the number o f errors that occur on login these services, and makes a decision system if the login error exceeds the tolerance of an administrator. I f the number o f errors exceeds the tolerance, it will automatically create the firewall rules in a very short duration is one minute, so the system is able to prevent the attacks which happened in a very quick time.
Full Text:
PDF (Bahasa Indonesia)References
Cartealy, Imam. 2013. Linux Networking (Ubuntu, Kubuntu, Debian, dll). Jasakom.
Raharjo, Budi. 2011. Belajar otodidak PEMROGRAMAN WEB dengan PHP + ORACLE. Bandung : Informatika Bandung.
Riyanto. 2010. Sistem Informasi Penjualan dengan PHP dan MySQL. Yogyakarta : GAVA MEDIA
Sulistiyani, Sri. Administrasi jaringan dengan Linux ubuntu. 2011. Yogyakarta : ANDI.
Tuxkeren, Athailah. 2013 . Ubuntu Server Panduan Singkat & Cepat. Jasakom.
Zam, Efvy. 2012. Wireless Hacking. Jakarta : PT Elex Media Komputindo
Article Metrics
Abstract view: 611 timesDownload  : 572 times
This work is licensed under a Creative Commons Attribution 4.0 International License.
Refbacks
- There are currently no refbacks.