2020
DOI: 10.24167/sisforma.v7i1.2629
|View full text |Cite
|
Sign up to set email alerts
|

Early Intrusion Detection System (IDS) using Snort and Telegram approach

Abstract: Computer network security is an important factor that must be considered. Guaranteed security can avoid losses caused by attacks on the network security system. The most common prevention against network attacks is to place an administrator, but problems will arise when the administrator is not supervising the network, so to overcome these problems a system called IDS (Intrusion Detection System) can detect suspicious activity on the network through automating the work functions of an administrator. Snort is o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 3 publications
0
3
0
Order By: Relevance
“…Snort is logically divided into some parts. SNORT is an open source IDS for monitoring and preventing attacks on computer security and produces the output to be a required format of the detection system [19]. When working as an IDS, SNORT can detect attacks or data packets that enter computer networks and warn network administrators to take precautions.…”
Section: Snort Stagementioning
confidence: 99%
“…Snort is logically divided into some parts. SNORT is an open source IDS for monitoring and preventing attacks on computer security and produces the output to be a required format of the detection system [19]. When working as an IDS, SNORT can detect attacks or data packets that enter computer networks and warn network administrators to take precautions.…”
Section: Snort Stagementioning
confidence: 99%
“…Meskipun terlihat sederhana aplikasi instant messaging Telegram memiliki fitur yang lebih unggul dibandingkan aplikasi instant messaging lainnya. Telegram diklaim sebagai aplikasi yang aman dimana menyediakan pilihan pesan end-to-end yang akan di enskripsi [4].…”
Section: Pendahuluanunclassified
“…Nginx is a lightweight web server as well as a reverse proxy server. It is well known for its less memory usage and reliable concurrency [10]. Because of the reliability, of course, the Nginx web server will be very suitable for Teler, which can be run with high concurrency values.…”
Section: B Preparing Environment For Testing (Sandbox)mentioning
confidence: 99%
“…The preprocessor can be used to log scanning activity to a specific location other than a standard log file. Hackers can use some port scanning, for example, Nmap as a port scanning tool [10].…”
Section: Introductionmentioning
confidence: 99%