Implementasi Metrik Keluaran Unjuk Kerja Network Intrusion Detection System

Yudhi Ardiyanto

Abstract


Perfomance of Network Intrusion Detection System (NIDS) very important to be monitored, because this system must perform packet inspection on computer network. Failure to detect data packets can produce malicious packet sneak into networks. Snort is one of the NIDS plug ins in the form of perfomance statistics that will provide performance information in real time, in the form of comma delimited value format. It takes long time to generated performance information. Thepigdoktah is a tools that can be used to process the output performance of the NIDS to be more informative .This research has been successfully implemented on a computer network, one of the performance information that can be generated is the average packet loss amounted to 0,012%.


Keywords


Network Intrusion Detection System, Network Security, Snort

Full Text:

PDF

References


Balasubramaniyan D.Z.J, Frenandez J.O.G, Isacoff D, Spafford E. (1998). An architecture for intrusion detection using autonomous agents. Proceeding of Computer Security Application. (pp.13-24).

Cummings J.J(2010). Thepigdoktah. Available:https://code.google.com/p/thepigdoktah/.

Kamaruzaman Maskat, Mohd Afizi Mohd Shukran, Mohammad Adib Khairuddin & Mohd Rizal Mohd Isa (2011). Mobile Agents in Intrusion Detection System: Review and Analysis. Modern Applied Science Vol. 5, No. 6; December 2011. National University Defense University of Malaysia.

Michael J.B, Orebaugh A, Clark G, Becky Pinkard B (2005). Intrusion Prevention And Active Response Deploying Network And Host Ips. Syngress

Snort.org (2016). Users Manual Snort 2.9.9.0

Salah K, & Kahtani K, (2009). Improving Snort performance under Linux. IET Commun., Vol. 3, Iss. 12, (pp.1883–1895)

Salah K, Al-Khiyati M, Ahmed R, Mahdi A (2011). Performance Evaluation of Snort under Windows 7 and Windows Server 2008. Journal of Universal Computer Science, vol. 17, no. 11, (pp.1605-1622)

Vijayarani S and Maria S.S (2015). Intrusion Detection System – A Study. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 4, No 1 (pp.31-44)


Refbacks

  • There are currently no refbacks.


Creative Commons License
Jurnal Semesta Teknika is licensed under a Creative Commons Attribution 4.0 International License.