The Analysis of Web Server Security For Multiple Attacks in The Tic Timor IP Network

https://doi.org/10.22146/ijccs.53265

Lilia Ervina Jeronimo Guterres(1*), Ahmad Ashari(2)

(1) Master Program of Computer Science, FMIPA UGM, Yogyakarta
(2) Department of Computer Science and Electronics, FMIPA UGM, Yogyakarta
(*) Corresponding Author

Abstract


The current technology is changing rapidly, with the significant growth of the internet technology, cyber threats are becoming challenging for IT professionals in the companies and organisations to guard their system. Especially when all the hacking tools and instructions are freely available on the Internet for beginners to learn how to hack such as stealing data and information. Tic Timor IP is one of the organisations involved and engaged in the data center operation. It often gets attacks from the outside networks. A network traffic monitoring system is fundamental to detect any unknown activities happening within a network. Port scanning is one of the first methods commonly used to attack a network by utilizing several free applications such as Angry IP Scan, Nmap and Low Orbit Ion Cannon (LOIC).  On the other hand, the snort-based Intrusion Detection System (IDS) can be used to detect such attacks that occur within the network perimeter including on the web server. Based on the research result, snort has the ability to detect various types of attack including port scanning attacks and multiple snort rules can be accurately set to protect the network from any unknown threats.  

Keywords


Web Server Security; Snort; BASE

Full Text:

PDF


References

[1] R. T. Gaddam and M. Nandhini, “An analysis of various snort based techniques to detect and prevent intrusions in networks: Proposal with code refactoring snort tool in Kali Linux environment,” in Proceedings of the International Conference on Inventive Communication and Computational Technologies, ICICCT 2017, 2017, no. March 2017, pp. 10–15, doi: 10.1109/ICICCT.2017.7975177.

[online]. Available: https://ieeexplore.ieee.org/document/7975177.

[2] A. Garg and P. Maheshwari, “Performance analysis of Snort-based Intrusion Detection System,” in ICACCS 2016 - 3rd International Conference on Advanced Computing and Communication Systems: Bringing to the Table, Futuristic Technologies from Arround the Globe, 2016, vol. 01, pp. 1–5, doi: 10.1109/ICACCS.2016.7586351, [online]. Available: https://ieeexplore.ieee.org/document/7586351.

[3] N. M. Dahlan M., Latubessy A., “Analisa Keamanan Web Server Terhadap Serangan Possibility Sql Injection,” Pros. SNATIF, vol. 0, no. 0, pp. 251–258, 2015, [online]. Available: https://jurnal.umk.ac.id/index.php/SNA/article/view/331.

[4] I. Sumaiya Thaseen and C. Aswani Kumar, “Intrusion detection model using fusion of chi-square feature selection and multi class SVM,” J. King Saud Univ. - Comput. Inf. Sci., vol. 29, no. 4, pp. 462–472, 2017, doi: 10.1016/j.jksuci.2015.12.004, [online]. Available: https://doi.org/10.1016/j.jksuci.2015.12.004.

[5] S. Ramadhani and Nazwita, “Analisis Sistem Keamanan Web Server Dan Database Server Menggunakan Suricata,” Semin. Nas. Teknol. Informasi, Komun. dan Ind. 9 Fak. Sains dan Teknol. UIN Sultan Syarif Kasim Riau, pp. 308–317, 2017, [online]. Available: http://ejournal.uin-suska.ac.id/index.php/SNTIKI/article/view/3368.

[6] M. Tiwari, “Intrusion Detection System,” no. May, pp. 39–57, 2011, doi: 10.1142/9781848164482_0004.

[7] D. Ariyus, Intrusion Detection System, I. Yogyakarta: C.V Andi Offset, 2007.

[8] W. Park and S. Ahn, “Performance Comparison and Detection Analysis in Snort and Suricata Environment,” Wirel. Pers. Commun., vol. 94, no. 2, pp. 241–252, 2017, doi: 10.1007/s11277-016-3209-9, [online]. Available: https://doi.org/10.1007/s11277-016-3209-9.

[9] C. N. Aditya, “Pembuatan Aturan Snort Sederhana Menggunakan Automated Generation Rules Berbasis Log Honeypot untuk Mendeteksi Serangan Jaringan,” Yogyakarta, 2017.

[10] R. Rahmat, Mengganyang Hacker dengan Snort. Yogyakarta: C.V Andi Offset, 2010.



DOI: https://doi.org/10.22146/ijccs.53265

Article Metrics

Abstract views : 2643 | views : 2802

Refbacks

  • There are currently no refbacks.




Copyright (c) 2020 IJCCS (Indonesian Journal of Computing and Cybernetics Systems)

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.



Copyright of :
IJCCS (Indonesian Journal of Computing and Cybernetics Systems)
ISSN 1978-1520 (print); ISSN 2460-7258 (online)
is a scientific journal the results of Computing
and Cybernetics Systems
A publication of IndoCEISS.
Gedung S1 Ruang 416 FMIPA UGM, Sekip Utara, Yogyakarta 55281
Fax: +62274 555133
email:ijccs.mipa@ugm.ac.id | http://jurnal.ugm.ac.id/ijccs



View My Stats1
View My Stats2