Implementasi Metrik Keluaran Unjuk Kerja Network Intrusion Detection System
DOI:
https://doi.org/10.18196/st.v19i2.2339Keywords:
Network Intrusion Detection System, Network Security, SnortAbstract
Perfomance of Network Intrusion Detection System (NIDS) very important to be monitored, because this system must perform packet inspection on computer network. Failure to detect data packets can produce malicious packet sneak into networks. Snort is one of the NIDS plug ins in the form of perfomance statistics that will provide performance information in real time, in the form of comma delimited value format. It takes long time to generated performance information. Thepigdoktah is a tools that can be used to process the output performance of the NIDS to be more informative .This research has been successfully implemented on a computer network, one of the performance information that can be generated is the average packet loss amounted to 0,012%.
References
Balasubramaniyan D.Z.J, Frenandez J.O.G, Isacoff D, Spafford E. (1998). An architecture for intrusion detection using autonomous agents. Proceeding of Computer Security Application. (pp.13-24).
Cummings J.J(2010). Thepigdoktah. Available:https://code.google.com/p/thepigdoktah/.
Kamaruzaman Maskat, Mohd Afizi Mohd Shukran, Mohammad Adib Khairuddin & Mohd Rizal Mohd Isa (2011). Mobile Agents in Intrusion Detection System: Review and Analysis. Modern Applied Science Vol. 5, No. 6; December 2011. National University Defense University of Malaysia.
Michael J.B, Orebaugh A, Clark G, Becky Pinkard B (2005). Intrusion Prevention And Active Response Deploying Network And Host Ips. Syngress
Snort.org (2016). Users Manual Snort 2.9.9.0
Salah K, & Kahtani K, (2009). Improving Snort performance under Linux. IET Commun., Vol. 3, Iss. 12, (pp.1883–1895)
Salah K, Al-Khiyati M, Ahmed R, Mahdi A (2011). Performance Evaluation of Snort under Windows 7 and Windows Server 2008. Journal of Universal Computer Science, vol. 17, no. 11, (pp.1605-1622)
Vijayarani S and Maria S.S (2015). Intrusion Detection System – A Study. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 4, No 1 (pp.31-44)
Downloads
Additional Files
Published
How to Cite
Issue
Section
License
Semesta Teknika is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).