Intruder Detection Monitoring System in Computer Networks Using Snort Based Sms Alert (Sistem Monitoring Deteksi Penyusup Dalam Jaringan Komputer Menggunakan Snort Berbasis Sms Alert)
DOI:
https://doi.org/10.35134/komtekinfo.v7i2.76Keywords:
Monitoring, Network, Snort, IDS, SMS AlertAbstract
Network security is an important factor in guaranteeing data. Guaranteed security can avoid losses caused by attacks that occur in the network. Administrators play an important role in maintaining data or file security, but administrators cannot at all times monitor the security of the network. This problem can be overcome by adding a system for data traffic detection or called IDS. IDS will be linked by SMS Alert so that administrators can receive notifications of interruptions on the network. In this study, researchers conduct analysis and testing of problems that arise so that it will produce a system that is able to detect attacks or disruptions on the network quickly and can provide warnings to network administrators, so that administrators can take steps to anticipate these disruptions. Attacks can be detected from the pattern of attacks that are in the IDS rule so that intruders who try to enter will be detected and the system will send an SMS notification to the administrator.
References
Imama, Chusnul, and Aries Dwi Indriyanti. 2013. "Penerapan Case BasedReasoning Dengan Algoritma Nearest Neighbor Untuk Analisis Pemberian Kredit di Lembaga Pembiayaan." Jurnal Manajemen Informatika 2.01
Kusrini, “Aplikasi Sistem Pakar, and Aplikasi Sistem Pendukung Keputusan. 2007."Andi Offset."
Kusrini, 2007. Konsep dan Aplikasi Sistem Pendukung KeputusanYogyakarta: Andi. Larry, Roy, “Jurus kilat mahir HTML & CSS [secara otodidak].” Jakarta Timur: Dunia Komputer.
Padilah, Fitri Pauziah, Gunawan Abdillah, and Faiza Renaldi. 2016."Rekomendasi Penanganan Anak Berkebutuhan Khusus Pada Sekolah Luar Biasa Negeri Citeureup Menggunakan Case Based Reasoning Dan Nearest Neighbors.2013." Prosiding SNST Fakultas Teknik 1.
Rosa, Ariani Sukamto, and Muhammad Shalahuddin.2013. "Rekayasa perangkat lunak terstruktur dan berorientasi objek." Bandung: Informatika.
Sumarlin, Sumarlin. 2015."Implementasi Algoritma K-Nearest Neighbor Sebagai Pendukung Keputusan Klasifikasi Penerima Beasiswa PPA dan BBM." JSINBIS (Jurnal Sistem Informasi Bisnis)5.1.
Tim, E. M. S. 2014. "Teori dan Praktik PHP-MySQL untuk Pemula." Jakarta: PT Elex Media Komputindo.
Sibero, Alexander FK. "Web Programming Power Pack." (2013).
Abdul Aziz, dan Arry Budi Kurnia 2015. Monitoring Seragan Pada Jaringan Komputer Menggunakan Snort Berbasis SMS GATEWAY. POLITEKNOLOGI VOL. 14. No.2 MEI 2015.
Asep Fauzi Mutaqin 2016. Rancang Bangun Sistem Monitoring Keamanan Jaringan Prodi Teknik Informatika Melalui SMS Alert dengan Snort. Jurnal Sistem dan Teknologi Informasi (JUSTIN) Vol. 1, No. 1, (2016).
Puji Hartono. 2005, Sistem Pencegahan Penyusupan pada Jaringan berbasis Snort IDS dan IPTables Firewall
Suryayusra, Imam Solikin, Maria Ulfa. 2017. Penerapan Sistem Keamanan Jaringan Smk Negeri 1 Indralaya Utara Dengan Mikrotik. Jurnal Ilmiah MATRIK Vol.19 No.3, Desember 2017:197-206.
Triandini, Rizki, 2016, Implementasi Intrusion Detection System Menggunakan SNORT, Barnyard2 dan BASE Pada Sistem Operasi Linux. Bandung : 2016.
Yasir, Mohamad. 2010. Membangun Software Monitoring Jaringan Dengan Sms Alert.
Sofana, iwan, 2018. Membangun Jaringan Komputer.
yanto, heri. (2018). SISTEM PENDUKUNG KEPUTUSAN UNTUK SELEKSI USULAN PENGAJUAN SERTIFIKASI GURU MENGGUNAKAN ALGORITMA K-NEAREST NEIGHBOR BERBASIS WEB. Jurnal KomtekInfo, 5(2), 42-5


