ANALISIS CELAH KEAMANAN JARINGAN MENGGUNAKAN PENGUJIAN INTRUTION DETECTION SYSTEM DAN MICROSOFT NETWORK MONITOR
Abstract
Cybercrime today deserves the attention of all parties carefully. Using IDS and Network Monitoring applications such as Microsoft Network Monitor can detect attacks targeting servers. Attack prevention with anomaly detection is by comparing the network traffic being monitored with network traffic that usually occurs. With this capability Snort can simplify the handling of computer network security.
Downloads
References
[2] Mutaqin, A. F. (2016). Rancang Bangun Sistem Monitoring Keamanan Jaringan Prodi Teknik Informatika Melalui Sms Alert Dengan Snort. Jurnal Sistem Dan Teknologi Informasi (Justin) Vol, 1(1), 1.
[3] Ferihadi, F., & Ilman Zuhri, Y. (2020). Perbandingan Jaringan Vpn Menggunakan Pptp (Point To Point Tunnel Protocoll) Dan L2tp (Studi Kasus: Kantor Pemerintah Walikota Palembang) (Doctoral Dissertation, Universitas Bina Darma).
[4] Anggoro, B. S., & Sulistyo, W. (2019, November). Implementasi Intrusion Prevention System Suricata Dengan Anomaly-Based Untuk Keamanan Jaringan Pt. Grahamedia Informasi. In Seminar Nasional Aptikom (Semnastik) 2019 (Pp. 280-288).
[5] Adidrajat, F. T., & Mulyani, A. (2019). Load Balancing Web Server Berbasis Cloud Dengan Menggunakan Algoritma Round-Robin Pada Sampoerna University. Journal Of Information System, Applied, Management, Accounting And Research, 3(4), 37-44.
[6] Purwaningtyas, R., Prasetijo, A. B., & Sofwan, A. (2011). Perancangan Program Bantu Pembelajaran Topologi Jaringan Lokal Secara Visual Menggunakan Borland Delphi 6.0 (Doctoral Dissertation, Jurusan Teknik Elektro Fakultas Teknik Undip)