Analisis Perbandingan Intrustion Detection System Snort dan Suricata

HAKIM, LUTFI NUR and , Prof. Dr. Budi Murtiyasa, M.Kom and , Dr. Ir. Bana Handaga, M.T. (2015) Analisis Perbandingan Intrustion Detection System Snort dan Suricata. Skripsi thesis, Universitas Muhammadiyah Surakarta.

[img] PDF (Halaman Depan)
HALAMAN DEPAN2.pdf

Download (120kB)
[img] PDF (BAB I)
BAB I.pdf

Download (138kB)
[img] PDF (BAB II)
BAB II.pdf
Restricted to Repository staff only

Download (276kB)
[img] PDF (BAB III)
BAB III.pdf
Restricted to Repository staff only

Download (321kB)
[img] PDF (BAB IV)
BAB IV.pdf
Restricted to Repository staff only

Download (1MB)
[img] PDF (BAB V)
BAB V.pdf
Restricted to Repository staff only

Download (85kB)
[img] PDF (DAFTAR PUSTAKA)
DAFTAR PUSTAKA.pdf

Download (176kB)
[img] PDF (LAMPIRAN)
LAMPIRAN.pdf
Restricted to Repository staff only

Download (163kB)
[img] PDF (PERNYATAAN PUBLIKASI ILMIAH)
SCAN SURAT PERNYATAAN PUBLIKASI.pdf
Restricted to Repository staff only

Download (78kB)
[img] PDF (Naskah Publikasi)
PUBLIKASI ILMIAH.pdf

Download (290kB)

Abstract

The Growth of the Internet and computer networks that happen in this day and age provide benefits and services to computer users to be able to share resources and information. Behind the ease of accessing information provided by the internet there is a great danger that is lurking, namely the various kinds of attacks that tried to find a gap of computer network security system being used. Attacks that could cause data loss and even damage to hardware. Application of IDS proposed as one solution that can be used to assist network managers in monitoring and analyzing network conditions dangerous packets contained in the network. However, an application IDS is certainly has advantages and disadvantages, so the authors were interested in conducting research to analyze and compare the performance of both the IDS. Analysis and comparison of IDS Snort and Suricata to measure the level of accuracy, speed detection and use of resources. Measurements carried out in a virtual machine, simulating the port scanning attacks, brute force and dos. Using Snorby as the font-end IDS. Suricata is superior research results in terms of detection accuracy will attack, however, the speed and the use of resources on the measurement results Snort always superior.

Item Type: Karya ilmiah (Skripsi)
Uncontrolled Keywords: IDS, Snort, Suricata
Subjects: Q Science > QA Mathematics > QA76 Computer software
Divisions: Fakultas Ilmu Komunikasi dan Informatika > Teknik Informatika
Depositing User: LUTFI NUR HAKIM
Date Deposited: 11 Aug 2015 04:21
Last Modified: 13 Oct 2021 06:11
URI: http://eprints.ums.ac.id/id/eprint/36750

Actions (login required)

View Item View Item