Efektivitas Instrusion Detection System Pada Proxy Server XYZ dalam Mencegah Scanning Port oleh Hacker
DOI:
https://doi.org/10.25181/esai.v8i1.973Abstract
Due to its crucial role, a proxy server needs to be well maintained to ensure its appropriate functions. One of the causes of failure access in proxy server is data manipulation done by irresponsible users that work by scanning, gaining access, maintaining access and covering track. The scanning process appears as an important step as it exposes the types of applications and services utilized in the server. The step is to manipulate four vulnerable points of proxy server related to the operating system, applications, program modules and configurations. In order to prevent the scanning process, it is important to utilize a mechanism which is able to detect and report any indications of intruding access in the proxy server aka intrusion detection system. This research is aimed at producing an application operated in the proxy server to report any indication of access intrusion. The research uses System Development Life Cycle (SDLC) method by applying analyzing, designing, implementing and assessing.Key words: proxy, server, ids, scanningDownloads
References
Ali, Shakeel, dan Heriyanto, Tedi. 2011. BackTrack 4: Assuring Security by Penetration Testing- Master the art of penetration testing with BackTrack. Packt Publishing. Birmingham – Mumbai
Gandhi, Meera, dan Srivatsa S.K.2008. Detecting and preventing attacks using network intrusion detection systems.International Journal of Computer Science and Security, Volume 2,Issue 1 : Page 49-60. ISSN (Online): 1.985-1.553. CSC Journal (http://www.cscjournals.org). Kuala Lumpur-Malaysia.
Hampton,Tavis J. 2011. 9 Server Security Threats You Should Definitely Know. http://www.webmasterview.com/2011/03/server-security-threats/akses 9 November2012 .
Indrajit, Eko. 2011. Empat Domain kerawanan system. http://idsirtii.or.id/cyber-6/ diakses tanggal 13 November 2012.
Indrajit, Eko. 2011. Meneropong Isu Keamanan Internet Aspek Teknis, Bisnis, dan Sosial. http://idsirtii.or.id/cyber-6/ diakses tanggal 17 November 2012.
Id.wikipedia. 2011. Serangan brutal. http://id.wikipedia.org/wiki/Serangan_brutal. diakses tanggal 17 November 2012.
Sto. 2009. CEH Certified Ectical Hacker 100% Illegal. Penerbit Jasakom. Jakarta.
Kumar, Neeraj. 2011. Investigations in Brute Force Attack on Cellular Security Based on Des and Aes .IJCEM International Journal of Computational Engineering & Management, Vol. 14, October 2011 ISSN (Online): 2230-7893
Rebecca, B., dan Petter, M., 2002, “Intrusion Detection Systemâ€, NIST Special Publication on IDS, USA.