PENERAPAN INTRUSION DETECTION SYSTEM SEBAGAI FIREWALL DAN SARANA UNTUK MENANGKAL PENYUSUPAN HACKER PADA JARINGAN LOKAL ASURANSI JIWA INHEAL INDONESIA DI JAKARTA
Abstract
The attack on internet systems increasingly rampant, almost all of the information in the system vulnerable
to attack and also generated a lot of financial losses due to these attacks, of course, as network
administrators, is not an easy job to monitor the hundreds of IP in and out of clients. Install the honeypot to
fool hackers also not the only way to better secure the internal regions and Demilitary Zone (DMZ). We
need the help of a system that can monitor the data packet and record it and provide further information to
be analyzed further. System Intrusion Detection System (IDS) can help users monitor and analyze problems
in network security. In this case the IDS used a snort for windows software to monitor user activities on the
system and out of the corporate network. The expected result is to know how much inconvenience caused to
the system through a corporate network traffic. Data Base created using MySQL and what actions should
be taken on these disorders will be the future. Testing of IDS performed on a local network of PT. Asuransi
Jiwa Inhealth Indonesia for six days. Observations were made to the directory the user can monitor the
daily activities in the network and the result will be a reference in determining how much disk capacity is
needed for the system is not disturbed or damaged. Observations also held with the activities of suspected
hacker activities, such as sending large data packets that can make the system unstable or monitor activity
in and out of IP networks that are not known or suspected. The results of this analysis is that with as many
as 45 (fourty five) user disk capacity to be provided for one year is 40 GB.
Keywords : hacker, Intrusion Detection System, snort for windows
Full Text:
PDFReferences
Ajawaila, Thomas Gregory. 2003. Tutorial
Membangun Snort Sebagai Intrusion
Detection System Integrasi terhadap
BASE dan MySQL.
[http://ilmukomputer.org/2007/02/28/membangun-snort-sebagai-intrusion-detectionsystem]
(diakses tanggal 24 mei 2009).
Ardiyanto, Yudhi. 2008. Membangun Sistem
Intrusion Detection System Yang Open
Source Pada Sistem Operasi Windows.
Thesis, Universitas Muhammadiyah
Yogyakarta.
Ariyus, Dony. 2007. Intrusion Detection System
Sistem Pendeteksi Penyusupan Pada
Jaringan Komputer. Andi:Yogyakarta.
Bueno, Pedro Paulo. 2002. Understanding IDS
for Linux.
[http://www.linuxjournal.com/article/5616
] (diakses tanggal 20 Juli 2009)
Chandra, Cristian A. 2009. Hackers and Their
Threats: Insident Response and Protection
Strategic for your company . dalam
Seminar Security Attacks di Universitas
Kristen Maranatha Bandung 17 Maret
, Diselenggarakan oleh Fakultas
Teknologi Informasi, 5-10, Bandung,
Fakultas Teknologi Informasi.
Hartono, Puji. 2006. Sistem Pencegahan
Penyusupan pada Jaringan berbasis Snort
IDS dan IPTables Firewall.
[http://www.cert.or.id/~budi/courses/secur
ity/2006/puji_report.pdf] (diakses tanggal
April 2009).
Laing, Brian. 2000. Internet Security System.
How To Guide Implementing a Network
Based Intrusion Detection System. United
Kingdom: Sovereign House 57/59 Vaster
Road Reading RG18BT.
Liu, Alex X., Mohamed G. Gouda. 2004.
Diverse firewall design. In Proc. of the
International Conference on Dependable
Systems and Networks (DSN’04), pages :
-604.
[http://www.cse.msu.edu/~alexliu/publicat
ions/Diver] (diakses tanggal 26 mei 2009).
Muammar, Ahmad. 2004. FireWall. Kuliah
Umum Ilmu Komputer.
[http://ikc.depsos.go.id/umum/ammarfirewall.
php] (diakses tanggal 01 Juni
.
Northcutt, Stephen. 2004. E-mail Scums.dalam
IT Ethic Hand Book, right and wrong for
IT Professionals. ed. Stephen
Northcutt. 125-143. Rokland : Syngress
Publishing, Inc.
Sherif, Joseph S., Tommy G. Dearmond. 2002.
Intrusion Detection: Systems and Models.
in proc. of the Eleventh IEEE
International Workshops on Enabling
Technologies: Infrastructure for
Collaborative Enterprises (WETICE’02),
pages : 1-19. [http://trsnew.
jpl.nasa.gov/dspace/bitstream/2014/]
(diakses tanggal 01 Juni 2009).
Wikipedia.org. 2009. White hat hacker.
[http://id.wikipedia.org/wiki/White_hat_ha
cker] (diakses tanggal 23 Mei 2009).
Wikipedia.org. 2007. Sistem Deteksi Intrusi.
[http://id.wikipedia.org/wiki/Sistem_deteks
i_intrusi] ( diakses tanggal 07 Juli 2009).
Wikipedia.org. 2008. Black hat hacker.
[http://id.wikipedia.org/wiki/Black_hat_ha
cker] (diakses tanggal 23 mei 2009).
Wikipedia.org. 2008. Local_Area_Network.
[http://id.wikipedia.org/wiki/Local_Area_Networ
k] (diakses tanggal 22 agustus 2009).
DOI: https://doi.org/10.31294/p.v11i3.4734
Copyright (c) 2009 Hendra Supendar, Tunggul Yogi Herno
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
ISSN: 2579-3500