Jurnal Eksploitasi Jaringan Pada Server
Jurnal Eksploitasi Jaringan Pada Server
ABSTRACT
Server on a network becomes an important point because its function is to serve all requests required by all
clients on a network. For that, maintaining the security of a server is also very important because if the server is
experiencing a problem then there is no one the network can serve the request from the client. This makes a
server administrator must see traffic to the server at any time. For this reason, it is important to conduct an
attack detection system research in order to help the performance of administrators. Detection of attacks
directed to the server is an early solution in securing a server from attack. For attack detection systems, SNORT
is generally able to detect almost any attack because it has many rules that can be modified. Detection system by
configuring and adding the rule first on the server. If there is an incoming attack then SNORT will compare the
attack with the existing rule, SNORT will later categorize the attack into 3 types of High, Medium and Low. The
design of attack detection system using SNORT and web server is planted on Raspberry Pi. Web server that is
planted on Raspberry Pi as information system or container of attack records. In addition, Raspberry Pi also
implemented database to store attack log which will be sent via sms gateway. The overall test results of the
system built on this final project work well. The admin user can login the web server and do the user creation
properly. Among the 6 rule attacks that have been implemented, all rules can read the attack accurately and able
to save it into the database. From 75 attacks recorded in the database, only 80% attack detection can be
displayed in the web server. And the web server is capable of sending 77.3% of attack notifications to the admin.
Keywords: Attack Detection System, Computer Network, SNORT, SMS Gateway, Barnyard2, Gammu.
PC Client
Server
192.168.90.2
192.168.90.1
Gambar 10 Simulasi Test Serangan
Jika terlihat seperti gambar diatas maka Tabel 3 Data Create User Admin
dipastikan instalasi gammu pada raspberry pi telah Username Email Password
berhasil, selanjutnya yaitu mencoba untuk Ihsan141 [email protected] Blackbriar141
mengirimkan sebuah sms dari Raspberry menuju 2 om 2
Handphone. Sebagai Gambaran, simulasi Dari data Tabel 3, data yang diinputkan
pengiriman sms dapat dilihat pada Gambar 16. disimpan dengan mengklik tombol register dan
browser secara otomatis akan menampilkan halaman
catatan serangan seperti pada Gambar 20
PUSTAKA
Afrina, Mira dan Ali Ibrahim, Pengembangan
Sistem Informasi SMS Gateway Dalam
Meningkatkan Layanan Komunikasi
Sekitar Akademika Fakultas Ilmu
Komputer Unsri. Jurnal Sistem Informasi
(JSI), VOL. 7, NO. 2, Okt 2015
A. Masse, Fitriyanti, Andi Nurul Hidayat dan
Badriyanto., Penerapan Network Intrusion
Detection System Menggunakan SNORT
Berbasis database MySql pada Hotspot
Kota. Jurnal Elektronik Sistem Informasi
dan Komputer STMIK Bina Mulia. Vol. 1.,
No. 2., 2015
Ariyus, Dony. Intrusion Detection System,
Yogyakarta. Penerbit ANDI. 2007.
Dawood, Rahmad., Said Fairuz Qiana, dan Sayed
Muchallil, Kelayakan Raspberry Pi sebagai
Web Server: Perbandingan Kinerja Nginx,
Apache, dan Lighttpd pada Platform
Raspberry Pi. Jurnal Rekayasa Elektrika
Vol. 11. No. 1. 2014.
Firdaus, PHP & MYSQL dengan Dreamweaver,
Palembang, Maxicom, 2007.
Mutaqin, Asep Fauzi. Rancang Bangun Sistem
Monitoring Jaringan Prodi Teknik
Informatika Melalui SMS Alert dengan
Snort. Jurnal Sistem dan Teknologi
Informasi (JUSTIN) Vol.1, No.1, 2016
Prastiyanto,Dhidik., Struktur Jaringan Komunikasi
Data Paket Berdasar Protokol X.25., Jurnal
Teknik Elektro Vol.2, No.2. 2010.
Rafiudin, Rahmat. Mengganyang Hacker dengan
SNORT, Yogyakarta. Penerbit ANDI.
2010.
Sofana, Iwan. Teori & Modul Praktikum Jaringan
Komputer. Bandung Penerbit Modula.
2011.
Sofana, Iwan. Membangun Jaringan Komputer
Mudah Membuat Jaringan Komputer (Wire
& Wireless) Untuk Pengguna Linux.
Bandung. Penerbit Informatika. 2013.
Sukmaaji, Anjik, dan Rianto, Jaringan Komputer:
Konsep Dasar Pengembangan Jaringan dan
Keamanan Jaringan. Yogyakarta. Penerbit
ANDI. 2008.
Towidjojo, Rendra. Mikrotik Kung Fu Kitab 1.
Jakarta . Jasakom. 2016.