Pemanfaatan Network Forensic Investigation Framework untuk Mengidentifikasi Serangan Jaringan Melalui Intrusion Detection System (IDS)
Intrusion Detection System (IDS) is one of the technology to ensure the security of computers. IDS is an early detection system in the event of a computer network attack. The IDS will alert the computer network administrator in the event of a computer network attack. IDS also records all attempts an...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Universitas Islam Negeri Sunan Kalijaga Yogyakarta
2022-01-01
|
Series: | JISKA (Jurnal Informatika Sunan Kalijaga) |
Subjects: | |
Online Access: | http://ejournal.uin-suka.ac.id/saintek/JISKA/article/view/3045 |
_version_ | 1797717683402178560 |
---|---|
author | Tri Widodo Adam Sekti Aji |
author_facet | Tri Widodo Adam Sekti Aji |
author_sort | Tri Widodo |
collection | DOAJ |
description | Intrusion Detection System (IDS) is one of the technology to ensure the security of computers. IDS is an early detection system in the event of a computer network attack. The IDS will alert the computer network administrator in the event of a computer network attack. IDS also records all attempts and activities aimed at disrupting computer networks and other computer network attacks. The purpose of this study is to implement IDS on network systems and analyze IDS logs to determine the different types of computer network attacks. Logs on the IDS will be analyzed and will be used as leverage to improve computer network security. The research was carried out using the Network Forensic Investigation Framework proposed by Pilli, Joshi, and Niyogi. The stages of the Network Forensic Investigation Framework are used to perform network simulations, analysis, and investigations to determine the types of computer network attacks. The results show that the Network Forensic Investigation Framework facilitates the investigation process when a network attack occurs. The Network Forensic Investigation Framework is effectively used when the computer network has network security support applications such as IDS or others. IDS is effective in detecting network scanning activities and DOS attacks. IDS gives alerts to administrators because there are activities that violate the rules on the IDS. |
first_indexed | 2024-03-12T08:39:54Z |
format | Article |
id | doaj.art-87721080c4714dbc8475ad3608ca8f9d |
institution | Directory Open Access Journal |
issn | 2527-5836 2528-0074 |
language | English |
last_indexed | 2024-03-12T08:39:54Z |
publishDate | 2022-01-01 |
publisher | Universitas Islam Negeri Sunan Kalijaga Yogyakarta |
record_format | Article |
series | JISKA (Jurnal Informatika Sunan Kalijaga) |
spelling | doaj.art-87721080c4714dbc8475ad3608ca8f9d2023-09-02T16:57:01ZengUniversitas Islam Negeri Sunan Kalijaga YogyakartaJISKA (Jurnal Informatika Sunan Kalijaga)2527-58362528-00742022-01-017110.14421/jiska.2022.7.1.46-55Pemanfaatan Network Forensic Investigation Framework untuk Mengidentifikasi Serangan Jaringan Melalui Intrusion Detection System (IDS)Tri Widodo0Adam Sekti Aji1Universitas Teknologi YogyakartaUniversitas Teknologi YogyakartaIntrusion Detection System (IDS) is one of the technology to ensure the security of computers. IDS is an early detection system in the event of a computer network attack. The IDS will alert the computer network administrator in the event of a computer network attack. IDS also records all attempts and activities aimed at disrupting computer networks and other computer network attacks. The purpose of this study is to implement IDS on network systems and analyze IDS logs to determine the different types of computer network attacks. Logs on the IDS will be analyzed and will be used as leverage to improve computer network security. The research was carried out using the Network Forensic Investigation Framework proposed by Pilli, Joshi, and Niyogi. The stages of the Network Forensic Investigation Framework are used to perform network simulations, analysis, and investigations to determine the types of computer network attacks. The results show that the Network Forensic Investigation Framework facilitates the investigation process when a network attack occurs. The Network Forensic Investigation Framework is effectively used when the computer network has network security support applications such as IDS or others. IDS is effective in detecting network scanning activities and DOS attacks. IDS gives alerts to administrators because there are activities that violate the rules on the IDS.http://ejournal.uin-suka.ac.id/saintek/JISKA/article/view/3045Network Forensic Investigation FrameworkIntrusion Detection System (IDS)Network AttackNetwork ScanningDOS Attacks |
spellingShingle | Tri Widodo Adam Sekti Aji Pemanfaatan Network Forensic Investigation Framework untuk Mengidentifikasi Serangan Jaringan Melalui Intrusion Detection System (IDS) JISKA (Jurnal Informatika Sunan Kalijaga) Network Forensic Investigation Framework Intrusion Detection System (IDS) Network Attack Network Scanning DOS Attacks |
title | Pemanfaatan Network Forensic Investigation Framework untuk Mengidentifikasi Serangan Jaringan Melalui Intrusion Detection System (IDS) |
title_full | Pemanfaatan Network Forensic Investigation Framework untuk Mengidentifikasi Serangan Jaringan Melalui Intrusion Detection System (IDS) |
title_fullStr | Pemanfaatan Network Forensic Investigation Framework untuk Mengidentifikasi Serangan Jaringan Melalui Intrusion Detection System (IDS) |
title_full_unstemmed | Pemanfaatan Network Forensic Investigation Framework untuk Mengidentifikasi Serangan Jaringan Melalui Intrusion Detection System (IDS) |
title_short | Pemanfaatan Network Forensic Investigation Framework untuk Mengidentifikasi Serangan Jaringan Melalui Intrusion Detection System (IDS) |
title_sort | pemanfaatan network forensic investigation framework untuk mengidentifikasi serangan jaringan melalui intrusion detection system ids |
topic | Network Forensic Investigation Framework Intrusion Detection System (IDS) Network Attack Network Scanning DOS Attacks |
url | http://ejournal.uin-suka.ac.id/saintek/JISKA/article/view/3045 |
work_keys_str_mv | AT triwidodo pemanfaatannetworkforensicinvestigationframeworkuntukmengidentifikasiseranganjaringanmelaluiintrusiondetectionsystemids AT adamsektiaji pemanfaatannetworkforensicinvestigationframeworkuntukmengidentifikasiseranganjaringanmelaluiintrusiondetectionsystemids |