NETWORK SECURITY DETECTION SYSTEM ON DAPODIK SERVER AT SMPN I MUARA KELINGI AGAINST SNIFFING ATTACKS
Abstract
Information technology (IT) has been applied to various sectors, including industry, government, education and health. However, technological sophistication is also accompanied by threats in terms of data security. For this reason, a system is needed that can secure the data, where attacks on data often occur from networks connected to the internet. The world of education today is also very dependent on technological sophistication, especially in data storage. One that utilizes this technology is SMPN I Muara Kelingi. The problem currently faced is the lack of a data security system on the Dapodik Server at SMPN I Muara Kelingi. The attack that can attack the network is in the form of a sniffing attack. The purpose of making this system is so that the data or information contained in the system cannot be accessed by unauthorized persons and to prevent damage to the system. By using the Security Policy Development Life Cycle (SPDLC) and using Snort as a tool to detect packet sniffing attacks, the school can quickly detect attacks that occur on the school Dapodik Server.
Keywords
References
Y. N. Kunang et al., “Analysis and implementation of the Port Knocking method using Firewall-based Mikrotik RouterOS,” IOP Conf. Ser. Mater. Sci. Eng., vol. 8, no. 4, pp. 1907–5022, 2019.
A. Umasugi, M. D. Suratin, and S. Hamza, “Analisis Keamanan Jaringan Wifi Terhadap Packet Sniffing DiKampus a Universitas Muhammadiyah Maluku Utara,” Produktif J. Ilm. Pendidik. Teknol. Inf. , vol. 6, no. 2, pp. 597–602, 2022, [Online]. Available: https://journal.umtas.ac.id/index.php/produktif/article/view/2460
C. A. Putra, M. S. Munir, Y. V. Via, and R. Achmadipoetro, “Deteksi Serangan Trojan Horse Dengan Memanfaatkan Ids Snort,” Semin. Santika, no. September, pp. 203–206, 2019, [Online]. Available: http://santika.ijconsist.org/index.php/SANTIKA/article/view/31
M. A. S. Arifin, “Rancang Bangun Prototype Robot Lengan Menggunakan Flex Sensor Dan Accelerometer Sensor Pada Lab Mikrokontroler Stmik Musirawas,” Ilk. J. Ilm., vol. 9, no. 3, pp. 255–261, 2017, doi: 10.33096/ilkom.v9i3.152.255-261.
R. Sahara, S. Abdullah, and R. Saputra, “Analisis Ancaman Sniffing pada Jaringan WiFi di PT. Stepa Wirausaha Adiguna,” Pros. Semin. Nas. Ris. Dan Inf. Sci., vol. 4, pp. 224–230, 2022.
R. Kurniawan and A. Zulius, “Sistem Smart Parking Menggunakan Ultrasonik Sensor,” J. Sist. Komput. Musirawas, vol. 3, no. 1, p. 22, 2018, doi: 10.32767/jusikom.v3i1.309.
B. Wijaya and A. Pratama, “Deteksi Penyusupan Pada Server Menggunakan Metode Intrusion Detection System (Ids) Berbasis Snort,” J. Sisfokom (Sistem Inf. dan Komputer), vol. 9, no. 1, pp. 97–101, 2020, doi: 10.32736/sisfokom.v9i1.770.
Ilham Firdaus, Januar Al Amien, and S. Soni, “String Matching untuk Mendeteksi Serangan Sniffing (ARP Spoofing) pada IDS Snort,” J. CoSciTech (Computer Sci. Inf. Technol., vol. 1, no. 2, pp. 44–49, 2020, doi: 10.37859/coscitech.v1i2.2180.
W. Fathoni, Fitriyani, and G. N. Nurkahfi, “Deteksi Penyusupan Pada Jaringan Komputer Menggunakan Ids Snort,” e-Proceeding Eng., vol. 3, no. 1, pp. 1169–1172, 2016, [Online]. Available: https://openlibrary.telkomuniversity.ac.id/pustaka/files/114823/persembahan/deteksi-penyusupan-pada-jaringan-komputer-menggunana-ids-snort.pdf
A. Rizal Fauzi and I. Made Suartana, “Monitoring Jaringan Wireless Terhadap Serangan Packet Sniffing Dengan Menggunakan Ids,” J. Manaj. Inform., vol. 8, no. 2, p. 7, 2018.
A. Akhriana and A. Irmayana, “Web App Pendeteksi Jenis Serangan Jaringan Komputer Dengan Memanfaatkan Snort Dan Log Honeypot,” CCIT J., vol. 12, no. 1, pp. 85–96, 2019, doi: 10.33050/ccit.v12i1.604.
T. Widodo and A. S. Aji, “Pemanfaatan Network Forensic Investigation Framework untuk Mengidentifikasi Serangan Jaringan Melalui Intrusion Detection System (IDS),” JISKA (Jurnal Inform. Sunan Kalijaga), vol. 7, no. 1, pp. 46–55, 2022, doi: 10.14421/jiska.2022.7.1.46-55.
A. Prasetyo, L. Affandi, and D. Arpandi, “Implementasi Metode Naive Bayes Untuk Intrusion Detection System (Ids),” J. Inform. Polinema, vol. 4, no. 4, p. 280, 2018, doi: 10.33795/jip.v4i4.220.
Sutarti, A. P. Pancaro, and F. I. Saputra, “Implementasi IDS (Intrusion Detection System) Pada Sistem Keamanan Jaringan SMAN 1 Cikeusal,” J. PROSISKO, vol. 5, no. 1, pp. 1–8, 2018.
R. Suwanto, I. Ruslianto, and M. Diponegoro, “Implementasi Intrusion Prevention System (IPS) Menggunakan Snort Dan IPTable Pada Monitoring Jaringan Lokal Berbasis Website,” J. Komput. dan Apl., vol. 07, no. 1, pp. 97–107, 2019.
J. Fahana, R. Umar, and F. Ridho, “Pemanfaatan Telegram Sebagai Notifikasi Serangan untuk Keperluan Forensik Jaringan,” J. Sist. Inf., vol. 5341, no. 6, p. 2, 2017.
B. Fachri and F. H. Harahap, “Simulasi Penggunaan Intrusion Detection System (IDS) Sebagai Keamanan Jaringan dan Komputer,” J. Media Inform. Budidarma, vol. 4, no. 2, p. 413, 2020, doi: 10.30865/mib.v4i2.2037.
S. Alviana and I. D. Sumitra, “Analisis Pengukuran Penggunaan Sumber Daya Komputer Pada Intrusion Detection System Dalam Meminimalkan Serangan Jaringan,” Komputa J. Ilm. Komput. dan Inform., vol. 7, no. 1, pp. 27–34, 2018, doi: 10.34010/komputa.v7i1.2533.