Abstract

The network at SMK Negeri 5 Bengkulu City at this time often has complaints such as a decrease in internet network performance which in turn affects all computers connected to the network. Intrusion Detection System (IDS) whose job is to monitor networks and suspicious activities in a network system. The research method that the authors use is a linear sequential process model. The life cycle of implementing a network system is defined in a number of phases, namely: Problem Identification and Formulation, Literature Study, Testing, Implementation, System Design, System Requirements Analysis. The author uses Snort, Telegram Bot on Ubuntu based IDS sensor engine. The results of this thesis research conclude that the applied IDS system can function to detect intruders or intruders on the IDS sensor machine, which is displayed in the form of notifications to telegrams.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.