Design and Implementation of Sucirata-Based Instrusion Detection System as a Network Security System Cloud Computers

Ali Idrus(1*), Lipur Sugiyanta(2), Murien Nugraheni(3), S Subhiyanto(4),

(1) Universitas Negeri Jakarta, Indonesia
(2) Universitas Negeri Jakarta, Indonesia
(3) Universitas Negeri Jakarta, Indonesia
(4) STMIK Antar Bangsa
(*) Corresponding Author

Abstract


Cloud computing is currently being developed and widely used by companies that require large and efficient computing resources. As technology evolves, security threats in cloud services continue to increase. Various threats in cloud computing technology can be avoided by maximizing the identification of security holes. Information threats associated with cloud computing require network and service security against possible attacks. Suricata is a threat detection identifier supported by existing rules. When an attack is detected, Suricata will create a log of the attack committed, Suricata can also perform automatic detection at level 7. The author collected the results of the attack in a log. Sign Suricata and the authors also evaluate whether Suricata can detect port scanning, brute force, denial of service, and backdoors for Cloud Computing. From the test results, optimal results were obtained from the results of attacks detected by the Suricata Intrusion Detection System (IDS) logs in the /var/log/suricata/fast directory.log, the author added that the Suricata configuration is not only for detection, so it can also run drops if there is suspicious activity using network filters that already exist in Suricata and manipulated configuration assumptions to optimally improve security in the cloud.

Full Text:

PDF

References


Ariyanto, Yuri. Harijanto, Budi. Watequlis S, Yan. (2017). "Suricata Implementation on Proxmox VE Cloud Server as an Intrusion Detection System (IDS) in Network Security". Proceedings of Sentrinov, p TE178-TE179.

Athailah. (2013). "A Quick Guide to Mastering the Router." Jakarta: PT. TransMedia, p. 6-15.

Atmojo, Y. P. (2018). "Snort Bot Alert with Telegram Bot API on Intrusion Detection System." IDS Case Study on Web Server, 176–180.

Badrul, M. (2012). "Network Computer Engineering." East Jakarta: Inti Prima Promosindo, p. 64-66.

Eka P, Ricky. Rachman, Andy. and Wahyu H, Tri, (2010). "Virtual Private Server (VPS) as an Alternative to Dedicated Server." Surabaya: Sepuluh Nopember Institute of Technology, 2010.

Fajrin, T. (2012). "Analysis of data storage systems using systems. Cloud Computing Case Study of SMK N 2 Karanganyar." 1 (10), p. 31– 35.

Gaddafi, S., Meilani, D. B., and Arifin, S. (2017). "Open Cloud Computing Security System Using IDS (Intrusion Detection System) and IPS (Intrusion Prevention System)". Journal of Science and Technology, 21(2), p. 67–76.




DOI: https://doi.org/10.30645/ijistech.v7i2.310

Refbacks

  • There are currently no refbacks.







Jumlah Kunjungan:

View My Stats

Published Papers Indexed/Abstracted By: