The Analysis of Web Server Security For Multiple Attacks in The Tic Timor IP Network
Lilia Ervina Jeronimo Guterres(1*), Ahmad Ashari(2)
(1) Master Program of Computer Science, FMIPA UGM, Yogyakarta
(2) Department of Computer Science and Electronics, FMIPA UGM, Yogyakarta
(*) Corresponding Author
Abstract
Keywords
Full Text:
PDFReferences
[1] R. T. Gaddam and M. Nandhini, “An analysis of various snort based techniques to detect and prevent intrusions in networks: Proposal with code refactoring snort tool in Kali Linux environment,” in Proceedings of the International Conference on Inventive Communication and Computational Technologies, ICICCT 2017, 2017, no. March 2017, pp. 10–15, doi: 10.1109/ICICCT.2017.7975177.
[online]. Available: https://ieeexplore.ieee.org/document/7975177.
[2] A. Garg and P. Maheshwari, “Performance analysis of Snort-based Intrusion Detection System,” in ICACCS 2016 - 3rd International Conference on Advanced Computing and Communication Systems: Bringing to the Table, Futuristic Technologies from Arround the Globe, 2016, vol. 01, pp. 1–5, doi: 10.1109/ICACCS.2016.7586351, [online]. Available: https://ieeexplore.ieee.org/document/7586351.
[3] N. M. Dahlan M., Latubessy A., “Analisa Keamanan Web Server Terhadap Serangan Possibility Sql Injection,” Pros. SNATIF, vol. 0, no. 0, pp. 251–258, 2015, [online]. Available: https://jurnal.umk.ac.id/index.php/SNA/article/view/331.
[4] I. Sumaiya Thaseen and C. Aswani Kumar, “Intrusion detection model using fusion of chi-square feature selection and multi class SVM,” J. King Saud Univ. - Comput. Inf. Sci., vol. 29, no. 4, pp. 462–472, 2017, doi: 10.1016/j.jksuci.2015.12.004, [online]. Available: https://doi.org/10.1016/j.jksuci.2015.12.004.
[5] S. Ramadhani and Nazwita, “Analisis Sistem Keamanan Web Server Dan Database Server Menggunakan Suricata,” Semin. Nas. Teknol. Informasi, Komun. dan Ind. 9 Fak. Sains dan Teknol. UIN Sultan Syarif Kasim Riau, pp. 308–317, 2017, [online]. Available: http://ejournal.uin-suska.ac.id/index.php/SNTIKI/article/view/3368.
[6] M. Tiwari, “Intrusion Detection System,” no. May, pp. 39–57, 2011, doi: 10.1142/9781848164482_0004.
[7] D. Ariyus, Intrusion Detection System, I. Yogyakarta: C.V Andi Offset, 2007.
[8] W. Park and S. Ahn, “Performance Comparison and Detection Analysis in Snort and Suricata Environment,” Wirel. Pers. Commun., vol. 94, no. 2, pp. 241–252, 2017, doi: 10.1007/s11277-016-3209-9, [online]. Available: https://doi.org/10.1007/s11277-016-3209-9.
[9] C. N. Aditya, “Pembuatan Aturan Snort Sederhana Menggunakan Automated Generation Rules Berbasis Log Honeypot untuk Mendeteksi Serangan Jaringan,” Yogyakarta, 2017.
[10] R. Rahmat, Mengganyang Hacker dengan Snort. Yogyakarta: C.V Andi Offset, 2010.
DOI: https://doi.org/10.22146/ijccs.53265
Article Metrics
Abstract views : 2592 | views : 2780Refbacks
- There are currently no refbacks.
Copyright (c) 2020 IJCCS (Indonesian Journal of Computing and Cybernetics Systems)
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
View My Stats1