
Intruder Detection Systems on Computer Networks Using Host Based Intrusion Detection System Techniques
Abstract
Keywords
Full Text:
PDF (BAHASA)References
F. N. R. Muh. Husain, A. I.M Akasara, “Implementasi Keamanan Server Pada Jaringan Wireless Menggunakan Metode Intrusion Detection and Prevention System (Idps) (Studi Kasus : Techno’S Studio),” semanTIK, vol. 4, no. 2, pp. 11–20, 2018. https://doi.org/10.5281/zenodo.1407864
D. A. Nugroho, A. F. Rochim, and E. D. Widianto, “Perancangan dan Implementasi Instrusion Detection System di Jaringan Universitas Diponegoro,” J. Teknol. dan Sist. Komput., vol. 3, no. 2, p. 171, 2015.
https://doi.org/10.14710/jtsiskom.3.2.2015.171-178
M. Affandi and S. Setyowibowo, “Implementasi Snort Sebagai Alat Pendeteksi Intrusi Menggunakan Linux,” J. Teknol. Inf., vol. 4, no. 2, 2013. https://www.academia.edu/download/55600697/ipi320672.pdf
W. Fathoni, Fitriyani, and G. N. Nurkahfi, “Deteksi Penyusupan Pada Jaringan Komputer Menggunakan Ids Snort,” e-Proceeding Eng., vol. 3, no. 1, pp. 1169–1172, 2016. https://openlibrarypublications.telkomuniversity.ac.id/index.php/engineering/article/view/3740
I. A. Sobari, “Rancangan Wireless Intrusion Detection System Menggunakan Snort,” J. Techno Nusa Mandiri, vol. 12, no. 1, pp. 1–9, 2015. http://ejournal.nusamandiri.ac.id/index.php/techno/article/view/278
A. P. Wicaksono, J. Raya, D. Po, and B. Purwokerto, “Sistem Deteksi Intrusi dengan Snort (Intrusion Detection System with Snort),” JUITA - J. Inform., vol. 3, no. 1, pp. 31–34, 2014. https://doi.org/10.30595/juita.v3i1.850
E. K. Dewi, “Analisis Log Snort Menggunakan Network Forensic,” JIPI (Jurnal Ilm. Penelit. dan Pembelajaran Inform., vol. 2, no. 2, pp. 72–79, 2017. https://doi.org/10.29100/jipi.v2i2.370
N. Sahrun, R. Roestam, and D. Sarjon, “Pengembangan Sistem Keamanan Jaringan Komputer Melalui Perumusan Aturan (Rule) Snort untuk Mencegah Serangan Synflood,” SATIN - Sains dan Teknol. Inf., vol. 1, no. 2, pp. 25–31, 2015. https://www.researchgate.net/publication/326892939
R. Hermawan, “Analisis Konsep Dan Cara Kerja Serangan Komputer Distributed Denial of Service (Ddos),” Fakt. Exacta, vol. 5, no. 1, pp. 1–14, 2013. https://journal.lppmunindra.ac.id/index.php/Faktor_Exacta/article/viewFile/186/177
A. Fadlil, I. Riadi, and S. Aji, “Review of detection DDOS attack detection using naive bayes classifier for network forensics,” Bull. Electr. Eng. Informatics, vol. 6, no. 2, pp. 140–148, 2017. https://doi.org/10.11591/eei.v6i2.605
DOI: https://doi.org/10.12928/biste.v3i1.1752
Refbacks
- There are currently no refbacks.
Copyright (c) 2021 Rio Widodo, Imam Riadi

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.