PERANCANGAN PENGAMANAN SERVER SECARA OTOMATIS MENGGUNAKAN METODE ADAM (AUTOMATIC EVENT DETECTION AND ACTIVITY MONITORING)

Anggraini Kusumaningrum, Rolas Sianturi

Submitted : 2017-02-09, Published : .

Abstract

In an era like today's global, Internet-based information system security is a must to be considered, because of the public nature of the internet network and global is not safe. Basically the threat is coming from someone who wishes mempuyai gain illegal access to a computer network. Whenever there is a threat encountered on the server such as port scanning, the attacker IP addresses will be captured. Next will be used method Automatic Event Detection And Activity Monitoring (ADAM) to process security. ADAM will carry out retaliatory attacks in the form of a computer virus that was sent to the attacker. For this reason when a computer network is attacked by the intruder, then ADAM server will detect this type of attack is done, then asked for help from another server to strike back. Security server by applying the method ADAM able to do the blocking of port scanning the attacker did not end there ADAM will then send the file is a virus automatically. In terms of time efficiency, the method of securing the ADAM automatically faster than if all phases of the security is done manually. ADAM test non-adaptive systems this takes 4.4 minutes, while the time taken by the ADAM system to immobilize the attacker system only 1 minute 03:59 seconds, so the method ADAM work faster. Traffic normal state (RX 232B, 144B TX), but when encountered in the form of port scanning attacks become 21.46Kib TX RX 25.83Kib, and after working as RX 219B ADAM TX127B, resulting in a significant reduction in traffic.

Keywords

Information Systems Security, Server Monitoring, Threat Detection

References

Eichel,Zee., Baster, James., Rizqi, Habibi., 2012. Attacking Site With Backtrack. Indonesian Backtrack Team

Nikodemus, 2012. Network Hacking dengan Linux Backtrack. Penerbit : Andi Yogyakarta dan Wahana Komputer

Rahman, Rizal. 2013. Mahir Administrasi Server dan Router dengan Linux Ubuntu Server 12.04 LTS. Bekasi, Creative Commons Attribution-ShareAlike 3.0 Unported License (CC by SA)

http://blog.pusheax.com/2014/01/dictionary-and-brute-force-attack-using.html. Diakses pada 10 Juli 2015, 02:01:17 AM

http://blog.pusheax.com/2014/12/metasploit-port-scanning.html. Diakses pada 10 Juli 2015, 02:35:23 AM

https://www.howtoforge.com/triggering-commands-on-file-or-directory-changes-with-incron. Diakses pada 14 Juli 2015, 2:04:13 PM

http://www.w3schools.com/php/func_filesystem_fgets.asp. Diakases pada 14 Juli 2015, 2:03:09 PM

http://www.ubuntugeek.com/bandwidth-monitoring-tools-for-ubuntu-users.html. Diakses pada 01 Agustus 2015, 20:18 WIB

https://id.scribd.com/doc/171582542/Gilang-Instalasi-Konfigurasi-Portsentry. Diakses pada 2 Agustus 2015, 2:11:24 AM

http://www.asus87.com/2011/05/aplikasi-ftp-client-di-linux-ubuntu/. Diakses pada 02 Agustus 2015, 02:33 WIB

Article Metrics

Abstract view: 365 times
Download     : 432   times

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

Refbacks

  • There are currently no refbacks.