QUICK REPORT FOR HOST BASED INTRUSION DETECTION SYSTEM (HIDS)
DOI:
https://doi.org/10.24014/sitekin.v11i2.761Keywords:
Host Based, Sistem Pendeteksi Penyusup, Quick ReportAbstract
Saat ini, Notifikasi penyusup pada Intrusion detection system masih menggunakan teknologi pager. Penelitian ini mengusulkan quick report pada sistem pendeteksian penyusupan berbasis hosts (HIDS) sebagai alternatif notifikasi instrusi kepada administrator ketika terdeteksi oleh IDS. Quick report ini dibangun menggunakan konsep SMS Gateway. HIDS dihubungkan dengan teknologi SMS gateway sebagai media penyampaian notifikasi intrusi, sehingga administrator lebih cepat mendapatkan informasi penyusup di dalam server.References
Abdillah, R., 2012. Pencegahan Brute Force Authentication Via Protokol Ssh (Secure Shell) Menggunakan Metode Host Based Intrusion Detection System (HIDS). In Konferensi Nasional Sistem Informasi (KNSI). Bali, 2012.
Al-Saedi, K. et al., 2013. RESEARCH PROPOSAL: AN INTRUSION
DETECTION SYSTEM ALERT REDUCTION AND ASSESSMENT
FRAMEWORK BASED ON DATA MINING. Journal of Computer Science,
(4), pp.421-26.
Anon., 2012. Internet World Stats - Usage and Population Statistic. [Online] Available at: HYPERLINK "http://www.internetworldstats.com/t
op20.htm" http://www.internetworldstats.com/top20. htm [Accessed 1 May 2014].
Anon., 2013. BBC - Homepage. [Online] Available at: HYPERLINK
"http://www.bbc.co.uk/news/technology-25547738" http://www.bbc.co.uk/news/technology-25547738 .
Anon., 2014. BBC - Homepage. [Online] Available at: HYPERLINK
"http://www.bbc.com/news/technology-13846031" http://www.bbc.com/news/technology-13846031.
Babbin, J., Biles, S. & Orebaugh, A.D., 2005. Snort Cookbook. O'Reilly.
Baker, A.R. & Esler, J., 2007. Snort® IDS and IPS Toolkit. Burlington: Syngress.
Beale, J., Baker, A.R. & Caswell, B.P.M., 2004. Snort 2.1 Intrusion Detection. 2nd ed. Rockland, United States of America: Syngress Publishing.
ID-SIRTII/CC, 2014. ID-SIRTII/CC. [Online] Available at: HYPERLINK
"http://idsirtii.or.id/berita/baca/41/setahun-40-juta-konsumen-jadi-korbanhacking-.html" http://idsirtii.or.id/berita/baca/41/setahun-40-juta-konsumen-jadi-korban-hacking-.html [Accessed 1 May 2014].
Jalali, H. & Baraani, A., 2012. Process Aware Host-based Intrusion Detection Model. International Journal of Communication Networks and Information Security (IJCNIS), 4(2), pp.117-24.
Ridwan, T., 2010. APLIKASI REMOTE ACCESS CONSOLE LINUX
BERBASIS SMS GATEWAY MENGGUNAKAN GAMMU DAN GAMBAS (STUDY KASUS PROXYSERVER GLOBAL DEVELOPMENT LEARNING NETWORK UNIVERSITY OF RIAU). Tugas Akhir. Pekanbaru: Universitas Islam Negeri Sultan Syarif Kasim Riau.
Scarfone, K. & Mell, P., 2007. 800-94 Guide to Intrusion Detection and Prevention Systems (IDPS). Special Publication. Gaithersburg: National Institute of Standards and Technology (NIST).
Downloads
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License
Copyright Notice
An author who publishes in the SITEKIN Journal agrees to the following terms:
- Author retains the copyright and grants the journal the right of first publication of the work simultaneously licensed under the Creative Commons Attribution-ShareAlike 4.0 License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal
- Author is able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book) with the acknowledgement of its initial publication in this journal.
- Author is permitted and encouraged to post his/her work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of the published work (See The Effect of Open Access).
Read more about the Creative Commons Attribution-ShareAlike 4.0 Licence here: https://creativecommons.org/licenses/by-sa/4.0/.