QUICK REPORT FOR HOST BASED INTRUSION DETECTION SYSTEM (HIDS)

Authors

  • Rahmad Abdillah Teknik Informatika Fakultas Sains dan Teknologi Universitas Islam Negeri Sultan Syarif Kasim Riau

DOI:

https://doi.org/10.24014/sitekin.v11i2.761

Keywords:

Host Based, Sistem Pendeteksi Penyusup, Quick Report

Abstract

Saat ini, Notifikasi penyusup pada Intrusion detection system masih menggunakan teknologi pager. Penelitian ini mengusulkan quick report pada sistem pendeteksian penyusupan berbasis hosts (HIDS) sebagai alternatif notifikasi instrusi kepada administrator ketika terdeteksi oleh IDS. Quick report ini dibangun menggunakan konsep SMS Gateway. HIDS dihubungkan dengan teknologi SMS gateway sebagai media penyampaian notifikasi intrusi, sehingga administrator lebih cepat mendapatkan informasi penyusup di dalam server.

References

Abdillah, R., 2012. Pencegahan Brute Force Authentication Via Protokol Ssh (Secure Shell) Menggunakan Metode Host Based Intrusion Detection System (HIDS). In Konferensi Nasional Sistem Informasi (KNSI). Bali, 2012.

Al-Saedi, K. et al., 2013. RESEARCH PROPOSAL: AN INTRUSION

DETECTION SYSTEM ALERT REDUCTION AND ASSESSMENT

FRAMEWORK BASED ON DATA MINING. Journal of Computer Science,

(4), pp.421-26.

Anon., 2012. Internet World Stats - Usage and Population Statistic. [Online] Available at: HYPERLINK "http://www.internetworldstats.com/t

op20.htm" http://www.internetworldstats.com/top20. htm [Accessed 1 May 2014].

Anon., 2013. BBC - Homepage. [Online] Available at: HYPERLINK

"http://www.bbc.co.uk/news/technology-25547738" http://www.bbc.co.uk/news/technology-25547738 .

Anon., 2014. BBC - Homepage. [Online] Available at: HYPERLINK

"http://www.bbc.com/news/technology-13846031" http://www.bbc.com/news/technology-13846031.

Babbin, J., Biles, S. & Orebaugh, A.D., 2005. Snort Cookbook. O'Reilly.

Baker, A.R. & Esler, J., 2007. Snort® IDS and IPS Toolkit. Burlington: Syngress.

Beale, J., Baker, A.R. & Caswell, B.P.M., 2004. Snort 2.1 Intrusion Detection. 2nd ed. Rockland, United States of America: Syngress Publishing.

ID-SIRTII/CC, 2014. ID-SIRTII/CC. [Online] Available at: HYPERLINK

"http://idsirtii.or.id/berita/baca/41/setahun-40-juta-konsumen-jadi-korbanhacking-.html" http://idsirtii.or.id/berita/baca/41/setahun-40-juta-konsumen-jadi-korban-hacking-.html [Accessed 1 May 2014].

Jalali, H. & Baraani, A., 2012. Process Aware Host-based Intrusion Detection Model. International Journal of Communication Networks and Information Security (IJCNIS), 4(2), pp.117-24.

Ridwan, T., 2010. APLIKASI REMOTE ACCESS CONSOLE LINUX

BERBASIS SMS GATEWAY MENGGUNAKAN GAMMU DAN GAMBAS (STUDY KASUS PROXYSERVER GLOBAL DEVELOPMENT LEARNING NETWORK UNIVERSITY OF RIAU). Tugas Akhir. Pekanbaru: Universitas Islam Negeri Sultan Syarif Kasim Riau.

Scarfone, K. & Mell, P., 2007. 800-94 Guide to Intrusion Detection and Prevention Systems (IDPS). Special Publication. Gaithersburg: National Institute of Standards and Technology (NIST).

Downloads

Issue

Section

Articles