Implementasi aplikasi snort sebagai intrusion detection system pada jaringan komputer di PT. Broardband Multimedia, TBK = Snort implementation as intrusion detection system on computer network at Pt. Broadband Multimedia, TBK

Tirtasendjaja, Liana (2006) Implementasi aplikasi snort sebagai intrusion detection system pada jaringan komputer di PT. Broardband Multimedia, TBK = Snort implementation as intrusion detection system on computer network at Pt. Broadband Multimedia, TBK. Bachelor thesis, Universitas Pelita Harapan.

[thumbnail of Title]
Preview
Text (Title)
Cover.pdf
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (19kB) | Preview
[thumbnail of Abstract]
Preview
Text (Abstract)
Abstract.pdf
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (36kB) | Preview
[thumbnail of TOC]
Preview
Text (TOC)
TOC.pdf
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (618kB) | Preview
[thumbnail of Chapter 1]
Preview
Text (Chapter 1)
Chapter 1.pdf
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (75kB) | Preview
[thumbnail of Chapter 2] Text (Chapter 2)
Chapter 2.pdf
Restricted to Registered users only
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (258kB)
[thumbnail of Chapter 3] Text (Chapter 3)
Chapter 3.pdf
Restricted to Registered users only
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (338kB)
[thumbnail of Chapter 4] Text (Chapter 4)
Chapter 4.pdf
Restricted to Registered users only
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (1MB)
[thumbnail of Chapter 5] Text (Chapter 5)
Chapter 5.pdf
Restricted to Registered users only
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (47kB)
[thumbnail of Bibliography]
Preview
Text (Bibliography)
Bibliography.pdf
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (39kB) | Preview
[thumbnail of Appendices] Text (Appendices)
Appendices.pdf
Restricted to Repository staff only
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (604kB)

Abstract

Intrusion detection system (IDS) is a system designed to detect intrusion on the computer network. IDS can show every time the intrusion comes in the network. IDS implementation can used aplications, such as: ISS Real Secure, Tiger, Snort, and Net Ranger. In this project, the application used is Snort because it is an open-source IDS and easier to study and implement. In addition, Snort has flexible rules and can be implemented in various operating systems. Snort implementation can be done by installing and configuring the Snort and BASE (Basic Analysis and Search Engine) as the Snort interface to the user. At first, download the newest version of Snort and BASE, then install the supporting application such as MySQL, Apache, and ADODB. Finally, configure Snort and BASE from Linux Fedora Core 5 server. The result of Snort implementation is it can alert the system each time an intrusion detected. From the alerts shown in IDS, it is known that the most detected intrusions are generated from TCP protocol. Snort can also give information about the attacks detected, for examples: Trojan horse, worm, or Denial of Service (DoS).
Item Type: Thesis (Bachelor)
Creators:
Creators
NIM
Email
ORCID
Tirtasendjaja, Liana
NIM08320030014
UNSPECIFIED
UNSPECIFIED
Contributors:
Contribution
Contributors
NIDN/NIDK
Email
Thesis advisor
Halim, Fransiscus Ati
UNSPECIFIED
UNSPECIFIED
Additional Information: KP 83-03 TIR i ; T 44533
Subjects: T Technology > TK Electrical engineering. Electronics Nuclear engineering > TK7885-7895 Computer engineering. Computer hardware
Divisions: University Subject > Historic > Faculty/School > Computer System Engineering
Historic > Faculty/School > Computer System Engineering
Depositing User: Christine Natalia Nababan
Date Deposited: 27 Apr 2021 08:34
Last Modified: 04 Sep 2024 02:12
URI: http://repository.uph.edu/id/eprint/29290

Actions (login required)

View Item
View Item