Overcoming Network Security on Host-Based Intrusion Detection System (HIDS) With IP and PORT Blocking Methods

Authors

  • Muhammad Abdurrohman 1Digital Telecommunication Network Study Program, Department of Electrical Engineering, State Polytechnic of Malang, 65141, Indonesia
  • Nugroho Suharto Telecommunication Engineering Study Program, Department of Electrical Engineering, State Polytechnic of Malang, 65141, Indonesia
  • Putri Elfa Mas'udia Telecommunication Engineering Study Program, Department of Electrical Engineering, State Polytechnic of Malang, 65141, Indonesia

Keywords:

DOS, IDS, IP Blocking, Network security, Port

Abstract

Network security is important to maintain security on a network, the data and information contained in it. Based on the protection of data/information security in a network, generally all data-based security theories are created and applied to secure a particular network. Network security methods that have emerged such as using IDS (intrusion detection system), Intrusion Detection System (IDS) or intruder detection system are computer systems (can be a combination of software and hardware) that attempt to detect intrusions. At this time DOS attacks or software that occur to the general public in the form of (browsers, files, videos or images) that often occur with the aim that the server or network is unable to accommodate the traffic, causing the website/service down and cannot operate. Therefore, to assist in these attacks, it is necessary to apply blocking IP and PORT by using blocking so as to be able to add research on network protection in the internet world.

References

P. P. Putra, "Pengembangan Sistem Keamanan Jaringan Menggunakan Rumusan Snort," SATIN – Sains dan Teknologi Informasi, vol. 2, no. 1, pp. 15 - 21, 2016.

M. S. d. A. M. Ropi, "Analisis dan Implementasi Network Security System," Seminar Nasional Telekomunikasi dan Informatika, pp. 199 - 204, 2018.

M. H. D. &. S. Z. Harahap, "Implementasi Snort Intrusion Detection System (IDS)," Informatika : Fakultas Sains dan Teknologi, vol. 6, no. 3, pp. 14 - 221, 2018.

M. Arman, "Metode Pertahanan Web Server Terhadap Distributed Slow HTTP DoS Attack," Jurnal Teknik Informatika dan Sistem Informasi, vol. 7, no. 1, pp. 56-70, 2020.

Y. W. P. d. Asmunin, "Implementasi Intrusion Prevention System (IPS) Menggunakan Snort dan IP Tables Berbasis Linux," Jurnal manajemen Informatika, vol. 7, pp. 21-28, 2017.

B. Triandi, "Sistem Keamanan Jaringan Dalam Mencegah Flooding Data dengan Metode Bloking IP dan Port," Seminar Nasional Teknologi Informasi dan Multimedia 2015, pp. 49-54, 2015.

O. K. Sulaiman, "Analisis Sistem Keamanan Jaringan dengan Menggunakan Switch Port Security," CESS (Journal Of Computer Engineering, System And Science), vol. Vol.1, pp. 9-14, 2016.

N. d. W. N. A. Dwi Bayu Rendro, "Analisis Monitoring Sistem Keamanan Jaringan Komputer Menggunakan Software Nmap (Studi Kasus di Smk Negeri 1 Kota Serang)," Jurnal PROSISKO, vol. 7, no. 2, pp. 108 - 115, 2020.

Y. Pramitarini, R. H. Y. Perdana, T. Tran, K. Shim, and B. An, “A Hybrid Price Auction-Based Secure Routing Protocol Using Advanced Speed and Cosine Similarity-Based Clustering against Sinkhole Attack in VANETs,” Sensors, vol. 22, no. 15, pp. 1–22, 2022.

R. O. d. M. Ryansyah, "Implementasi Sistem Keamanan Jaringan Menggunakan Firewall Security Port pada Vitaa Multi Oxygen," Jurnal Sistem dan Teknologi Informasi, vol. 7, no. 1, pp. 52-59, 2019.

D. d. R. Wiryadinata, "Rancang Bangun Keamanan Port Secure Shell (SSH) Menggunakan Metode Port Knocking," JIKOMSI [Jurnal Ilmu Komputer dan Sistem Informasi] , vol. 5, no. 1, pp. 28-33, 2022.

R. A. T. Sumardi, "Rancang Bangun Sistem Keamanan Jaringan Dengan Metode Blocking Port Pada Sekolah Menengah Kejuruan Karya Nugraha Boyolali," Indonesian Jurnal on Networking and Security (IJNS) - ijns.org, vol. Vol. 2, pp. 16-21, 2013.

A. Josi, "Penerapan Metode Prototiping dalam Pembangunan Website Desa (Studi Kasus Desa Sugihan Kecamatan Rambang)," Jurnal Teknologi Informasi, vol. 9, no. 1, pp. 50-57, 2017.

N. T. d. A. Eka, "Analisis DNS Amplification Attack," JOEICT (Jurnal of Education and Information Communication Technology), vol. 1, no. 1, pp. 17-22, 2017.

H. A. dkk, "Analisa Keamanan Jaringan Menggunakan Network Intrusion Detection and Prevention System," JOINTECS (Journal of Information Technology and Computer Science), vol. 5, no. 1, pp. 17-24, 2020.

Downloads

Published

2023-09-19

How to Cite

[1]
M. Abdurrohman, N. Suharto, and P. E. Mas’udia, “Overcoming Network Security on Host-Based Intrusion Detection System (HIDS) With IP and PORT Blocking Methods ”, Jartel, vol. 13, no. 3, pp. 208-213, Sep. 2023.