Network Security Analysis with SnortIDS Using ACID (Analysis Console for Intrusion Databases

bit-Tech Pub Date : 2023-04-28 DOI:10.32877/bt.v5i3.728
Ruruh Wuryani, Indah Fenriana, Dicky Surya Dwi Putra, Desiyanna Lasut, Susanto Hariyanto
{"title":"Network Security Analysis with SnortIDS Using ACID (Analysis Console for Intrusion Databases","authors":"Ruruh Wuryani, Indah Fenriana, Dicky Surya Dwi Putra, Desiyanna Lasut, Susanto Hariyanto","doi":"10.32877/bt.v5i3.728","DOIUrl":null,"url":null,"abstract":"The use of Wi-Fi and Ethernet is increasing in today's computer networks due to the advancement of technology. The development of networks today is characterized by the need for low-latency and high-bandwidth technology. The technology has also introduced 5G and Wi-Fi 6 which support high-speed internet surfing. The introduction of Network File System (NFS) in this era sparked the demand for Ethernet. NFS also increased the use of UNIX in education and professional computing in the 1980s. Then, in 1982, Token Ring Topology emerged as an alternative to the internet and was only standardized in 1985. Network security is an important factor in ensuring data is not stolen or damaged. With the increasing knowledge of hacking and cracking, and the availability of tools that can be easily used to launch attacks or intrusions, it is important to investigate when an attack occurs. One network forensic method for monitoring attacks on the network is using Snort IDS and Ntop to facilitate the logging process for monitoring the network system. Based on the results obtained from designing a network security with Snort Intrusion Detection System (IDS) using ACID (Analysis Console for Intrusion Databases) with the utilization of IPTables on Ubuntu Server can stop attackers. In this research, the researcher used IPTables on Ubuntu as a firewall to anticipate attacks. To prevent port scanning attacks conducted by the attacker, the author created a firewall using IPTables where the IPTables rules aim to block the IP address of the attacker.","PeriodicalId":405015,"journal":{"name":"bit-Tech","volume":"51 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"bit-Tech","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.32877/bt.v5i3.728","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The use of Wi-Fi and Ethernet is increasing in today's computer networks due to the advancement of technology. The development of networks today is characterized by the need for low-latency and high-bandwidth technology. The technology has also introduced 5G and Wi-Fi 6 which support high-speed internet surfing. The introduction of Network File System (NFS) in this era sparked the demand for Ethernet. NFS also increased the use of UNIX in education and professional computing in the 1980s. Then, in 1982, Token Ring Topology emerged as an alternative to the internet and was only standardized in 1985. Network security is an important factor in ensuring data is not stolen or damaged. With the increasing knowledge of hacking and cracking, and the availability of tools that can be easily used to launch attacks or intrusions, it is important to investigate when an attack occurs. One network forensic method for monitoring attacks on the network is using Snort IDS and Ntop to facilitate the logging process for monitoring the network system. Based on the results obtained from designing a network security with Snort Intrusion Detection System (IDS) using ACID (Analysis Console for Intrusion Databases) with the utilization of IPTables on Ubuntu Server can stop attackers. In this research, the researcher used IPTables on Ubuntu as a firewall to anticipate attacks. To prevent port scanning attacks conducted by the attacker, the author created a firewall using IPTables where the IPTables rules aim to block the IP address of the attacker.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
使用ACID(入侵数据库分析控制台)进行SnortIDS网络安全分析
由于技术的进步,在当今的计算机网络中,Wi-Fi和以太网的使用正在增加。当今网络发展的特点是需要低延迟和高带宽技术。该公司还推出了支持高速上网的5G和Wi-Fi 6。在这个时代,网络文件系统(NFS)的引入引发了对以太网的需求。在20世纪80年代,NFS还增加了UNIX在教育和专业计算中的使用。然后,在1982年,令牌环拓扑作为互联网的替代品出现,直到1985年才标准化。网络安全是确保数据不被盗或损坏的重要因素。随着黑客和破解知识的增加,以及可以轻松用于发起攻击或入侵的工具的可用性,在攻击发生时进行调查非常重要。监视网络攻击的一种网络取证方法是使用Snort IDS和Ntop来促进监视网络系统的日志记录过程。通过在Ubuntu服务器上使用IPTables,利用ACID (Analysis Console for Intrusion Databases)设计一个网络安全Snort入侵检测系统(IDS),可以有效地阻止攻击者。在这项研究中,研究人员在Ubuntu上使用IPTables作为防火墙来预测攻击。为了防止攻击者进行端口扫描攻击,作者使用IPTables创建了防火墙,其中IPTables规则旨在阻止攻击者的IP地址。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Implementation Search Engine Optimization (SEO) to Improve Marketing F&B Industry Analysis And Design Of Online Based Plastic Sales Information System With User Acceptance Testing Method Design a Web-based Education Development Contribution Payment Application at SDIT Tahfidz Bintangku Clustering Mental Health on Instagram Users Using K-Means Algorithm Implementation of Business Intelligence In Analyzing Data Using Tableau at PT Global Bintan Permata
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1