Abstract

In an era like today's global, Internet-based information system security is a must to be considered, because of the public nature of the internet network and global is not safe. Basically the threat is coming from someone who wishes mempuyai gain illegal access to a computer network. Whenever there is a threat encountered on the server such as port scanning, the attacker IP addresses will be captured. Next will be used method Automatic Event Detection And Activity Monitoring (ADAM) to process security. ADAM will carry out retaliatory attacks in the form of a computer virus that was sent to the attacker. For this reason when a computer network is attacked by the intruder, then ADAM server will detect this type of attack is done, then asked for help from another server to strike back. Security server by applying the method ADAM able to do the blocking of port scanning the attacker did not end there ADAM will then send the file is a virus automatically. In terms of time efficiency, the method of securing the ADAM automatically faster than if all phases of the security is done manually. ADAM test non-adaptive systems this takes 4.4 minutes, while the time taken by the ADAM system to immobilize the attacker system only 1 minute 03:59 seconds, so the method ADAM work faster. Traffic normal state (RX 232B, 144B TX), but when encountered in the form of port scanning attacks become 21.46Kib TX RX 25.83Kib, and after working as RX 219B ADAM TX127B, resulting in a significant reduction in traffic.

Highlights

  • ADAM merupakan sebuah metode pengamanan jaringan yang mampu melakukan monitoring secara real time, dan menentukan kebijakan pengamanan secara otomatis ketika ditemui sebuah serangan

  • Whenever there is a threat encountered on the server such as port scanning, the attacker IP addresses will be captured

  • ADAM will carry out retaliatory attacks in the form o f a computer virus that was sent to the attacker

Read more

Summary

Pendahuluan

ADAM merupakan sebuah metode pengamanan jaringan yang mampu melakukan monitoring secara real time, dan menentukan kebijakan pengamanan secara otomatis ketika ditemui sebuah serangan. Perumusan masalah pada metode ADAM yaitu merancang dan membangun sebuah keamanan server yang mampu mendeteksi adanya sebuah aktivitas serangan, membangun sistem yang adaptif dan mampu mengatasi masalah terhadap serangan dan mampu berkomunikasi dengan server lainnya untuk memberikan sebuah serangan balasan terhadap sistem attacker secara otomatis. Sistem automatisasi hanya bekerja ketika ditemui serangan port server, komunikasi antar server hanya pada dua buah server dengan bahasa pemrograman berbasis PHP dan sistem operasi Ubuntu. ADAM merupakan sebuah metode pengamanan jaringan yang mampu melakukan monitoring secara realtime, dan mendeteksi serangan port scanning terhadap server, kemudian melakukan tindakan sesuai kebijakan keamanan yang telah ditetapkan. Dalam perancangan metode ADAM dibutuhkan sistem monitoring yang mampu mendekteksi akan adanya serangan terhadap server untuk mendapatkan sebuah pemicu terjadinya automatisasi. Pada kebijakan keamanan yang akan diterapkan pada sistem keamanan server yaitu ketika sistem monitoring mendeteksi adanya serangan, maka server menghubungi server lain untuk menginfomasikan adanya indikasi serangan

Perancangan Uji Coba
Penjelasan Sistem ADAM
Uji Deteksi Serangan
Scan I
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.