Efektivitas Instrusion Detection System Pada Proxy Server XYZ dalam Mencegah Scanning Port oleh Hacker

Penulis

  • Imam Asrowardi
  • Eko Subyantoro

DOI:

https://doi.org/10.25181/esai.v8i1.973

Abstrak

Due to its crucial role, a proxy server needs to be well maintained to ensure its appropriate functions. One of the causes of failure access in proxy server is data manipulation done by irresponsible users that work by scanning, gaining access, maintaining access and covering track. The scanning process appears as an important step as it exposes the types of applications and services utilized in the server. The step is to manipulate four vulnerable points of proxy server related to the operating system, applications, program modules and configurations. In order to prevent the scanning process, it is important to utilize a mechanism which is able to detect and report any indications of intruding access in the proxy server aka intrusion detection system. This research is aimed at producing an application operated in the proxy server to report any indication of access intrusion. The research uses System Development Life Cycle (SDLC) method by applying analyzing, designing, implementing and assessing.Key words: proxy, server, ids, scanning

Unduhan

Data unduhan belum tersedia.

Biografi Penulis

Imam Asrowardi

Dosen  pada Program Studi Manajemen Informatika Politeknik Negeri Lampung

Eko Subyantoro

Dosen  pada Program Studi Manajemen Informatika Politeknik Negeri Lampung

Referensi

Ali, Shakeel, dan Heriyanto, Tedi. 2011. BackTrack 4: Assuring Security by Penetration Testing- Master the art of penetration testing with BackTrack. Packt Publishing. Birmingham – Mumbai

Gandhi, Meera, dan Srivatsa S.K.2008. Detecting and preventing attacks using network intrusion detection systems.International Journal of Computer Science and Security, Volume 2,Issue 1 : Page 49-60. ISSN (Online): 1.985-1.553. CSC Journal (http://www.cscjournals.org). Kuala Lumpur-Malaysia.

Hampton,Tavis J. 2011. 9 Server Security Threats You Should Definitely Know. http://www.webmasterview.com/2011/03/server-security-threats/akses 9 November2012 .

Indrajit, Eko. 2011. Empat Domain kerawanan system. http://idsirtii.or.id/cyber-6/ diakses tanggal 13 November 2012.

Indrajit, Eko. 2011. Meneropong Isu Keamanan Internet Aspek Teknis, Bisnis, dan Sosial. http://idsirtii.or.id/cyber-6/ diakses tanggal 17 November 2012.

Id.wikipedia. 2011. Serangan brutal. http://id.wikipedia.org/wiki/Serangan_brutal. diakses tanggal 17 November 2012.

Sto. 2009. CEH Certified Ectical Hacker 100% Illegal. Penerbit Jasakom. Jakarta.

Kumar, Neeraj. 2011. Investigations in Brute Force Attack on Cellular Security Based on Des and Aes .IJCEM International Journal of Computational Engineering & Management, Vol. 14, October 2011 ISSN (Online): 2230-7893

Rebecca, B., dan Petter, M., 2002, “Intrusion Detection Systemâ€, NIST Special Publication on IDS, USA.

##submission.downloads##

Diterbitkan

2021-05-05

Terbitan

Bagian

Artikel