Analisis Kinerja Keamanan Jaringan Host-Based Intrusion Prevention System (HIPS) Dengan Metode Anomaly-Based Detection

Imam, Yuliano Santoso (2022) Analisis Kinerja Keamanan Jaringan Host-Based Intrusion Prevention System (HIPS) Dengan Metode Anomaly-Based Detection. Undergraduate Thesis thesis, Institut Teknologi Telkom Purwokerto.

[img] Text
Cover.pdf

Download (2MB)
[img] Text
Abstract.pdf

Download (25kB)
[img] Text
Abstrak.pdf

Download (26kB)
[img] Text
BAB I.pdf

Download (16kB)
[img] Text
BAB II.pdf

Download (175kB)
[img] Text
BAB III.pdf

Download (1MB)
[img] Text
BAB IV.pdf
Restricted to Registered users only

Download (1MB) | Request a copy
[img] Text
BAB V.pdf

Download (29kB)
[img] Text
Daftar Pustaka.pdf

Download (96kB)
[img] Text
Lampiran.pdf
Restricted to Registered users only

Download (13kB) | Request a copy

Abstract

The server is the center of service providers and data processing in a network, requests sent by clients will be processed by the server. Security is needed so that the server is in good condition and can protect information on the network and minimize the occurrence of anomalous activities such as DoS attacks. Based on these problems, a research on network security was conducted using the Snort application as a Hostbased Intrusion Prevention System (HIPS) with anomaly-based detection techniques to protect the services provided by the server from attackers. From the research that has been done HIPS can detect and block 72550 of 72600 ICMP Flood attacks, 98418 of 98718 UDP Flood attacks, 25950 of 26950 SYN Flood attacks, 141 151 FTP Bruteforce attacks. In addition, an analysis of the Quality of Service value was carried out before and during the attack. The CPU value has increased because the CPU has to work to answer incoming requests, the throughput value has increased due to the amount of data received is more than the time required. The delay and jitter have decreased because the total delay and jitter have a small value compared to the number of packets received, besides the packet loss value in all experiments is zero percent or can be said to be perfect, this is because the packets that go to the server have been filtered by IPS. Keywords: Host-based Intrusion Prevention System (HIPS), DoS, Snort, Quality of Service

Item Type: Thesis (Undergraduate Thesis)
Subjects: T Technology > TA Engineering (General). Civil engineering (General)
Divisions: Faculty of Telecommunication and Electrical Engineering > Telecommunication Engineering
Depositing User: staff repository
Date Deposited: 03 Oct 2022 05:35
Last Modified: 03 Oct 2022 05:35
URI: http://repository.ittelkom-pwt.ac.id/id/eprint/8284

Actions (login required)

View Item View Item