Network Security Monitoring System via Android Mobile App With IDS

Authors

  • Hamas Prasetyo Universitas Ahmad Dahlan
  • Nuril Anwar Universitas Ahmad Dahlan

DOI:

https://doi.org/10.12928/mf.v6i1.10317

Keywords:

Android, Intrusion Detection System , Network Security, Monitoring System, Snort

Abstract

Network security is an important factor in securing data on a server, so a server needs to be kept safe from things that could threaten the validity and integrity of stored data. One way that can be used to detect threats on a server is implementing an Intrusion detection system on the server. A literature study conducted on research that implemented intrusion detection systems, found that there was a lack of intrusion detection system research that could detect one type of network security attack with a variety of attack variables and it was also found in research that had successfully implemented an intrusion detection system to detect network security attacks but still incorrectly identifying the type of attack. This research uses the Snort intrusion detection system method with an experimental model of an attack detection system and an Android application which is applied to monitor the statistics of attacks detected on the Xyz University network. The research results showed that the rules created on the IDS can detect network security attacks, especially DoS/DDoS and PortScan attacks. Then an IDS was created that can send application alert notifications and SMS with a response time that is quite responsive based on the NIST Cybersecurity reference with an average of 22 seconds for DoS/DDoS attacks and 21 seconds for Port Scanning attacks. For the percentage results from 3 times testing the rule by sending DoS/DDoS attack packets of 309,462 to 1,459,548, getting a high level of accuracy with an average of 92.1% on first test, 91.7% on the second test and 91.5% on the third test. In the results of testing the PortScan rule by sending 1,001 to 10,564 attack packets, a high level of accuracy was obtained with an average result of 92.2% in the first test, 94.2% in the second test and 93.4% in the third test.

References

M. Ardhiansyah, S. Noris, and R. Andrianto, Jaringan Komputer Jaringan Komputer, 1st ed. Banten: Unpam Press, 2020. [Online]. Available: http://eprints.unpam.ac.id/8869/1/TPL0183_JARINGAN KOMPUTER-ok.pdf

I. Sofana, “No Title,” Membangun Jaringan Komputer: Mudah membuat Jaringan Komputer (Wire & Wireless) untuk pengguna Windows dan Linux, 2013.

M. Wills, “Information Security Fundamentals,” in (ISC)2 SSCP Systems Security Certified Practitioner Official Study Guide, Wiley, 2019, pp. 25–49. doi: 10.1002/9781119547921.ch2.

A. Sadiqui, “Fundamentals of Network Security,” in Computer Network Security, Wiley, 2020, pp. 1–14. doi: 10.1002/9781119706762.ch1.

R. Widodo and I. Riadi, “Sistem Deteksi Penyusup Pada Jaringan Komputer Menggunakan Teknik Host Based Intrusion Detection System,” Buletin Ilmiah Sarjana Teknik Elektro, 2019.

J. Wang and Z. A. Kissel, “Intrusion Detections,” in Introduction to Network Security: Theory and Practice, Wiley, 2015, pp. 309–336. doi: 10.1002/9781119113102.ch9.

H. Yanto and F. Hadi, “Intruder Detection Monitoring System in Computer Networks Using Snort Based Sms Alert (Sistem Monitoring Deteksi Penyusup Dalam Jaringan Komputer Menggunakan Snort Berbasis Sms Alert),” Jurnal KomtekInfo, vol. 7, no. 2, pp. 159–170, 2020, doi: 10.35134/komtekinfo.v7i2.76.

N. Christianto and W. Sulistyo, “Model Pemantauan Keamanan Jaringan Melalui Aplikasi Telegram Dengan Snort,” Jurnal Teknik Informatika dan Sistem Informasi, vol. 7, pp. 2443–2229, 2021, doi: 10.28932/jutisi.v7i1.4088.

J. V. M. Edy Irwansyah, Pengantar teknologi informasi, 1st ed. Yogyakarta, 2014.

M. Irsan, T. Jl, H. Hadari, and N. Pontianak, “RANCANG BANGUN APLIKASI MOBILE NOTIFIKASI BERBASIS ANDROID UNTUK MENDUKUNG KINERJA DI INSTANSI PEMERINTAHAN.”

M. Dooley and T. Rooney, “Service Denial Attacks,” in DNS Security Management, 1st ed., Wiley, 2017, pp. 139–141. doi: 10.1002/9781119328292.ch7.

V. Trola, “Manual Network Exploration,” in Hunting Cyber Criminals, 1st ed., Wiley, 2020, pp. 45–65. doi: 10.1002/9781119541004.ch3.

W. W. Purba and R. Efendi, “Perancangan dan analisis sistem keamanan jaringan komputer menggunakan SNORT,” AITI: Jurnal Teknologi Informasi, vol. 17, no. Agustus, pp. 143–158, 2020.

A. F. Mutaqin, “Rancang Bangung Sistem Monitoring Jaringan Prodi Teknik Informatika Melalui SMS Alert dengan Snort,” Jurnal Sistem dan Teknologi Informasi (JUSTIN), vol. 1, No. 1, 2016.

Downloads

Published

2024-07-16

Issue

Section

Articles