Pemanfaatan Iptables Sebagai Intrusion Detection System (IDS) pada Linux Server

Authors

  • Ery Setiyawan Jullev Atmadji
  • Bekti Maryuni Susanto

Abstract

Network security becomes an important thing for all industries and companies to protect the important data and information inside it. Security protection in a network is generally based on the security of data transmission created and applied to help secure a particular network. To further optimize the decision making then required a machine that is able to collaborate with the IDS database and IPS, so that a very wide range of attacks can be mapped with more optimal. One of the databases that have an existing rule is IPTABLES, this is because in IPTABLES there is a firewall function that can handle multiple types of attacks and masife. Server that will be used is server with linux operating system. While the IDS attack database used is a KDD 99 database that has been recognized as one of the database attacks are very complex. With the utilization of IPTABLES is expected server security will be monitored with more optimal. IPTABLES is usually used as one of the firewalls used on the server.

 

Keywords— Monitoring Network Security, IDS,  IP TABLES, KDD99..

 

References

Anif, M., Hws, S. and Huri, M.D., 2015, Penerapan Intrusion Detection System ( IDS ) dengan metode Deteksi Port Scanning pada Jaringan Komputer di Politeknik Negeri Semarang. JURNAL TELE, Volume 13 Nomor 1, 13(1), pp.25–30.

[2] Chadli, S., Saber, M. and Emharraf, M., 2014, A new model of IDS architecture based on multi ­ agent systems for MANET. , (ii).

Chitnis, S., Deshpande, N. and Shaligram, A., 2016, An investigative study for smart home security: Issues, challenges and countermeasures. Wireless Sensor Network, 8(4), pp.61–68. Available at: http://dx.doi.org/10.4236/wsn.2016.84006.

[3] COMMONWEALTH OF VIRGINIA, R.O.T.J.C.O.T.A.S., 2016, States Confront the Cyber Challenge. , pp.1–4.

Cyril Jose, A. and Malekian, R., 2015, Smart Home Automation Security: A Literature Review. The Smart Computing Review, 5(4), pp.269–285. Available at: http://smartcr.org/view/download.php?filename=smartcr_vol5no4p004.pdf.

[5] Hammersland, R., 2007, ROC in assessing IDS quality. Norwegian Information Security, Gjovik, pp.1–7. Available at: http://rune.hammersland.net/tekst/roc.pdf.

[6] Kumar, B.S. et al., 2013, Intrusion Detection System- Types and Prevention. International Journal of Computer Science and Information Technologies, 4(1), pp.77–82.

Kurniawan, A., Putri, Sayyidah, N. and Hermanto, D.;, 2012, Implementasi Intrusion Prevention System (Ips) Menggunakan Snort, Ip Tables, dan Honeypot pada Router Mikrotik. Stmik Gi Mdp, (x), pp.1–12.

[7] Sondakh, G., I Najoan, M.E. and Lumenta, A.S., 2014, Perancangan Filtering Firewall Menggunakan Iptables Di Jaringan Pusat Teknologi Informasi Unsrat. , pp.2301–8402.

Stephenson, P., 2002, I NVESTIGATING C OMPUTER -R ELATED C RIME A H ANDBOOK FOR C ORPORATE I NVESTIGATORS,

Published

08-02-2018