PENERAPAN INTRUSION DETECTION SYSTEM SEBAGAI FIREWALL DAN SARANA UNTUK MENANGKAL PENYUSUPAN HACKER PADA JARINGAN LOKAL ASURANSI JIWA INHEAL INDONESIA DI JAKARTA

Hendra Supendar, Tunggul Yogi Herno

Abstract


The attack on internet systems increasingly rampant, almost all of the information in the system vulnerable
to attack and also generated a lot of financial losses due to these attacks, of course, as network
administrators, is not an easy job to monitor the hundreds of IP in and out of clients. Install the honeypot to
fool hackers also not the only way to better secure the internal regions and Demilitary Zone (DMZ). We
need the help of a system that can monitor the data packet and record it and provide further information to
be analyzed further. System Intrusion Detection System (IDS) can help users monitor and analyze problems
in network security. In this case the IDS used a snort for windows software to monitor user activities on the
system and out of the corporate network. The expected result is to know how much inconvenience caused to
the system through a corporate network traffic. Data Base created using MySQL and what actions should
be taken on these disorders will be the future. Testing of IDS performed on a local network of PT. Asuransi
Jiwa Inhealth Indonesia for six days. Observations were made to the directory the user can monitor the
daily activities in the network and the result will be a reference in determining how much disk capacity is
needed for the system is not disturbed or damaged. Observations also held with the activities of suspected
hacker activities, such as sending large data packets that can make the system unstable or monitor activity
in and out of IP networks that are not known or suspected. The results of this analysis is that with as many
as 45 (fourty five) user disk capacity to be provided for one year is 40 GB.
Keywords : hacker, Intrusion Detection System, snort for windows


Full Text:

PDF

References


Ajawaila, Thomas Gregory. 2003. Tutorial

Membangun Snort Sebagai Intrusion

Detection System Integrasi terhadap

BASE dan MySQL.

[http://ilmukomputer.org/2007/02/28/membangun-snort-sebagai-intrusion-detectionsystem]

(diakses tanggal 24 mei 2009).

Ardiyanto, Yudhi. 2008. Membangun Sistem

Intrusion Detection System Yang Open

Source Pada Sistem Operasi Windows.

Thesis, Universitas Muhammadiyah

Yogyakarta.

Ariyus, Dony. 2007. Intrusion Detection System

Sistem Pendeteksi Penyusupan Pada

Jaringan Komputer. Andi:Yogyakarta.

Bueno, Pedro Paulo. 2002. Understanding IDS

for Linux.

[http://www.linuxjournal.com/article/5616

] (diakses tanggal 20 Juli 2009)

Chandra, Cristian A. 2009. Hackers and Their

Threats: Insident Response and Protection

Strategic for your company . dalam

Seminar Security Attacks di Universitas

Kristen Maranatha Bandung 17 Maret

, Diselenggarakan oleh Fakultas

Teknologi Informasi, 5-10, Bandung,

Fakultas Teknologi Informasi.

Hartono, Puji. 2006. Sistem Pencegahan

Penyusupan pada Jaringan berbasis Snort

IDS dan IPTables Firewall.

[http://www.cert.or.id/~budi/courses/secur

ity/2006/puji_report.pdf] (diakses tanggal

April 2009).

Laing, Brian. 2000. Internet Security System.

How To Guide Implementing a Network

Based Intrusion Detection System. United

Kingdom: Sovereign House 57/59 Vaster

Road Reading RG18BT.

Liu, Alex X., Mohamed G. Gouda. 2004.

Diverse firewall design. In Proc. of the

International Conference on Dependable

Systems and Networks (DSN’04), pages :

-604.

[http://www.cse.msu.edu/~alexliu/publicat

ions/Diver] (diakses tanggal 26 mei 2009).

Muammar, Ahmad. 2004. FireWall. Kuliah

Umum Ilmu Komputer.

[http://ikc.depsos.go.id/umum/ammarfirewall.

php] (diakses tanggal 01 Juni

.

Northcutt, Stephen. 2004. E-mail Scums.dalam

IT Ethic Hand Book, right and wrong for

IT Professionals. ed. Stephen

Northcutt. 125-143. Rokland : Syngress

Publishing, Inc.

Sherif, Joseph S., Tommy G. Dearmond. 2002.

Intrusion Detection: Systems and Models.

in proc. of the Eleventh IEEE

International Workshops on Enabling

Technologies: Infrastructure for

Collaborative Enterprises (WETICE’02),

pages : 1-19. [http://trsnew.

jpl.nasa.gov/dspace/bitstream/2014/]

(diakses tanggal 01 Juni 2009).

Wikipedia.org. 2009. White hat hacker.

[http://id.wikipedia.org/wiki/White_hat_ha

cker] (diakses tanggal 23 Mei 2009).

Wikipedia.org. 2007. Sistem Deteksi Intrusi.

[http://id.wikipedia.org/wiki/Sistem_deteks

i_intrusi] ( diakses tanggal 07 Juli 2009).

Wikipedia.org. 2008. Black hat hacker.

[http://id.wikipedia.org/wiki/Black_hat_ha

cker] (diakses tanggal 23 mei 2009).

Wikipedia.org. 2008. Local_Area_Network.

[http://id.wikipedia.org/wiki/Local_Area_Networ

k] (diakses tanggal 22 agustus 2009).




DOI: https://doi.org/10.31294/p.v11i3.4734

ISSN2579-3500

Dipublikasikan oleh LPPM Universitas Bina Sarana Informatika

Jl. Dewi Sartika No. 289, Cawang, Jakarta Timur Telp : 021-8010836, ext. 202
Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License