Pemanfaatan Network Forensic Investigation Framework untuk Mengidentifikasi Serangan Jaringan Melalui Intrusion Detection System (IDS)

Intrusion Detection System (IDS) is one of the technology to ensure the security of computers. IDS is an early detection system in the event of a computer network attack. The IDS will alert the computer network administrator in the event of a computer network attack. IDS also records all attempts an...

Full description

Bibliographic Details
Main Authors: Tri Widodo, Adam Sekti Aji
Format: Article
Language:English
Published: Universitas Islam Negeri Sunan Kalijaga Yogyakarta 2022-01-01
Series:JISKA (Jurnal Informatika Sunan Kalijaga)
Subjects:
Online Access:http://ejournal.uin-suka.ac.id/saintek/JISKA/article/view/3045
_version_ 1797717683402178560
author Tri Widodo
Adam Sekti Aji
author_facet Tri Widodo
Adam Sekti Aji
author_sort Tri Widodo
collection DOAJ
description Intrusion Detection System (IDS) is one of the technology to ensure the security of computers. IDS is an early detection system in the event of a computer network attack. The IDS will alert the computer network administrator in the event of a computer network attack. IDS also records all attempts and activities aimed at disrupting computer networks and other computer network attacks. The purpose of this study is to implement IDS on network systems and analyze IDS logs to determine the different types of computer network attacks. Logs on the IDS will be analyzed and will be used as leverage to improve computer network security. The research was carried out using the Network Forensic Investigation Framework proposed by Pilli, Joshi, and Niyogi. The stages of the Network Forensic Investigation Framework are used to perform network simulations, analysis, and investigations to determine the types of computer network attacks. The results show that the Network Forensic Investigation Framework facilitates the investigation process when a network attack occurs. The Network Forensic Investigation Framework is effectively used when the computer network has network security support applications such as IDS or others. IDS is effective in detecting network scanning activities and DOS attacks. IDS gives alerts to administrators because there are activities that violate the rules on the IDS.
first_indexed 2024-03-12T08:39:54Z
format Article
id doaj.art-87721080c4714dbc8475ad3608ca8f9d
institution Directory Open Access Journal
issn 2527-5836
2528-0074
language English
last_indexed 2024-03-12T08:39:54Z
publishDate 2022-01-01
publisher Universitas Islam Negeri Sunan Kalijaga Yogyakarta
record_format Article
series JISKA (Jurnal Informatika Sunan Kalijaga)
spelling doaj.art-87721080c4714dbc8475ad3608ca8f9d2023-09-02T16:57:01ZengUniversitas Islam Negeri Sunan Kalijaga YogyakartaJISKA (Jurnal Informatika Sunan Kalijaga)2527-58362528-00742022-01-017110.14421/jiska.2022.7.1.46-55Pemanfaatan Network Forensic Investigation Framework untuk Mengidentifikasi Serangan Jaringan Melalui Intrusion Detection System (IDS)Tri Widodo0Adam Sekti Aji1Universitas Teknologi YogyakartaUniversitas Teknologi YogyakartaIntrusion Detection System (IDS) is one of the technology to ensure the security of computers. IDS is an early detection system in the event of a computer network attack. The IDS will alert the computer network administrator in the event of a computer network attack. IDS also records all attempts and activities aimed at disrupting computer networks and other computer network attacks. The purpose of this study is to implement IDS on network systems and analyze IDS logs to determine the different types of computer network attacks. Logs on the IDS will be analyzed and will be used as leverage to improve computer network security. The research was carried out using the Network Forensic Investigation Framework proposed by Pilli, Joshi, and Niyogi. The stages of the Network Forensic Investigation Framework are used to perform network simulations, analysis, and investigations to determine the types of computer network attacks. The results show that the Network Forensic Investigation Framework facilitates the investigation process when a network attack occurs. The Network Forensic Investigation Framework is effectively used when the computer network has network security support applications such as IDS or others. IDS is effective in detecting network scanning activities and DOS attacks. IDS gives alerts to administrators because there are activities that violate the rules on the IDS.http://ejournal.uin-suka.ac.id/saintek/JISKA/article/view/3045Network Forensic Investigation FrameworkIntrusion Detection System (IDS)Network AttackNetwork ScanningDOS Attacks
spellingShingle Tri Widodo
Adam Sekti Aji
Pemanfaatan Network Forensic Investigation Framework untuk Mengidentifikasi Serangan Jaringan Melalui Intrusion Detection System (IDS)
JISKA (Jurnal Informatika Sunan Kalijaga)
Network Forensic Investigation Framework
Intrusion Detection System (IDS)
Network Attack
Network Scanning
DOS Attacks
title Pemanfaatan Network Forensic Investigation Framework untuk Mengidentifikasi Serangan Jaringan Melalui Intrusion Detection System (IDS)
title_full Pemanfaatan Network Forensic Investigation Framework untuk Mengidentifikasi Serangan Jaringan Melalui Intrusion Detection System (IDS)
title_fullStr Pemanfaatan Network Forensic Investigation Framework untuk Mengidentifikasi Serangan Jaringan Melalui Intrusion Detection System (IDS)
title_full_unstemmed Pemanfaatan Network Forensic Investigation Framework untuk Mengidentifikasi Serangan Jaringan Melalui Intrusion Detection System (IDS)
title_short Pemanfaatan Network Forensic Investigation Framework untuk Mengidentifikasi Serangan Jaringan Melalui Intrusion Detection System (IDS)
title_sort pemanfaatan network forensic investigation framework untuk mengidentifikasi serangan jaringan melalui intrusion detection system ids
topic Network Forensic Investigation Framework
Intrusion Detection System (IDS)
Network Attack
Network Scanning
DOS Attacks
url http://ejournal.uin-suka.ac.id/saintek/JISKA/article/view/3045
work_keys_str_mv AT triwidodo pemanfaatannetworkforensicinvestigationframeworkuntukmengidentifikasiseranganjaringanmelaluiintrusiondetectionsystemids
AT adamsektiaji pemanfaatannetworkforensicinvestigationframeworkuntukmengidentifikasiseranganjaringanmelaluiintrusiondetectionsystemids