Ridho, M. Faqih and , Fatah Yasin Al Irsyadi, S.T., M.T and , Yusuf Sulistyo Nugroho, S.T., M.Eng. (2014) Analysis And Evaluation Snort, Bro, and Suricata as Intrusion Detection System Based on Linux Server. Skripsi thesis, Universitas Muhammadiyah Surakarta.
|
PDF (Naskah publikasi)
Naskah_Publikasi.pdf Download (533kB) |
|
|
PDF (Halaman depan)
halaman_awal.pdf Download (1MB) |
|
|
PDF (Bab I)
BAB_I.pdf Download (151kB) |
|
PDF (Bab II)
BAB_II.pdf Restricted to Repository staff only Download (188kB) |
||
PDF (Bab III)
BAB_III.pdf Restricted to Repository staff only Download (390kB) |
||
PDF (Bab IV)
BAB_IV.pdf Restricted to Repository staff only Download (1MB) |
||
PDF (Bab V)
BAB_V.pdf Restricted to Repository staff only Download (91kB) |
||
|
PDF (Dafar pustaka)
daftar_pustaka.pdf Download (251kB) |
|
PDF (Lampiran)
lampiran.pdf Restricted to Repository staff only Download (216kB) |
Abstract
Security and confidentiality of data on computer networks is currently a problem that continues to grow. Installation of firewalls, antivirus, IDS (Intrusion Detection System) / IPS (Intrusion Prevention System) and various other security applications often require the best available installation cost is not small. Open source is the best solution to address the security issues that expensive. Intrusion Detection System is a system designed to collect information about the activities in the network, analyzing information, and give a warning. Snort, Bro and Suricata is an open source Intrusion Detection System. By comparing how the installation, configuration, warnings are displayed, and the resulting information can to know the advantages and disadvantages of snort Snort, Bro and Suricata as Intrusion Detection System. There are two stages of testing, such as scanning and penetration. Phase scanning is a scan of all ports, scanning is done by using NMAP application which is found on Armitage. Stage penetration is done by using the menu hail mary which is contained in Attack tab, hail mary is used to try all the exploits against computer target. Based on Scanning and penetration process, Snort detects 926 alert, Suricata detects 1218 alerts and Bro detects 128 low alerts. Snort and Suricata ease to install and update rule, Bro requires the least amount of resources.
Item Type: | Thesis (Skripsi) |
---|---|
Uncontrolled Keywords: | Bro, Intrusion Detection System, Snort, Suricata |
Subjects: | Q Science > QA Mathematics > QA76 Computer software |
Divisions: | Fakultas Ilmu Komunikasi dan Informatika > Teknik Informatika |
Depositing User: | Edy Susilo |
Date Deposited: | 10 Dec 2014 13:13 |
Last Modified: | 10 Nov 2022 04:17 |
URI: | http://eprints.ums.ac.id/id/eprint/31281 |
Actions (login required)
View Item |