Network Security Analysis with SnortIDS Using ACID (Analysis Console for Intrusion Databases

bit-Tech Pub Date : 2023-04-28 DOI:10.32877/bt.v5i3.728
Ruruh Wuryani, Indah Fenriana, Dicky Surya Dwi Putra, Desiyanna Lasut, Susanto Hariyanto
{"title":"Network Security Analysis with SnortIDS Using ACID (Analysis Console for Intrusion Databases","authors":"Ruruh Wuryani, Indah Fenriana, Dicky Surya Dwi Putra, Desiyanna Lasut, Susanto Hariyanto","doi":"10.32877/bt.v5i3.728","DOIUrl":null,"url":null,"abstract":"The use of Wi-Fi and Ethernet is increasing in today's computer networks due to the advancement of technology. The development of networks today is characterized by the need for low-latency and high-bandwidth technology. The technology has also introduced 5G and Wi-Fi 6 which support high-speed internet surfing. The introduction of Network File System (NFS) in this era sparked the demand for Ethernet. NFS also increased the use of UNIX in education and professional computing in the 1980s. Then, in 1982, Token Ring Topology emerged as an alternative to the internet and was only standardized in 1985. Network security is an important factor in ensuring data is not stolen or damaged. With the increasing knowledge of hacking and cracking, and the availability of tools that can be easily used to launch attacks or intrusions, it is important to investigate when an attack occurs. One network forensic method for monitoring attacks on the network is using Snort IDS and Ntop to facilitate the logging process for monitoring the network system. Based on the results obtained from designing a network security with Snort Intrusion Detection System (IDS) using ACID (Analysis Console for Intrusion Databases) with the utilization of IPTables on Ubuntu Server can stop attackers. In this research, the researcher used IPTables on Ubuntu as a firewall to anticipate attacks. To prevent port scanning attacks conducted by the attacker, the author created a firewall using IPTables where the IPTables rules aim to block the IP address of the attacker.","PeriodicalId":405015,"journal":{"name":"bit-Tech","volume":"51 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"bit-Tech","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.32877/bt.v5i3.728","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The use of Wi-Fi and Ethernet is increasing in today's computer networks due to the advancement of technology. The development of networks today is characterized by the need for low-latency and high-bandwidth technology. The technology has also introduced 5G and Wi-Fi 6 which support high-speed internet surfing. The introduction of Network File System (NFS) in this era sparked the demand for Ethernet. NFS also increased the use of UNIX in education and professional computing in the 1980s. Then, in 1982, Token Ring Topology emerged as an alternative to the internet and was only standardized in 1985. Network security is an important factor in ensuring data is not stolen or damaged. With the increasing knowledge of hacking and cracking, and the availability of tools that can be easily used to launch attacks or intrusions, it is important to investigate when an attack occurs. One network forensic method for monitoring attacks on the network is using Snort IDS and Ntop to facilitate the logging process for monitoring the network system. Based on the results obtained from designing a network security with Snort Intrusion Detection System (IDS) using ACID (Analysis Console for Intrusion Databases) with the utilization of IPTables on Ubuntu Server can stop attackers. In this research, the researcher used IPTables on Ubuntu as a firewall to anticipate attacks. To prevent port scanning attacks conducted by the attacker, the author created a firewall using IPTables where the IPTables rules aim to block the IP address of the attacker.
使用ACID(入侵数据库分析控制台)进行SnortIDS网络安全分析
由于技术的进步,在当今的计算机网络中,Wi-Fi和以太网的使用正在增加。当今网络发展的特点是需要低延迟和高带宽技术。该公司还推出了支持高速上网的5G和Wi-Fi 6。在这个时代,网络文件系统(NFS)的引入引发了对以太网的需求。在20世纪80年代,NFS还增加了UNIX在教育和专业计算中的使用。然后,在1982年,令牌环拓扑作为互联网的替代品出现,直到1985年才标准化。网络安全是确保数据不被盗或损坏的重要因素。随着黑客和破解知识的增加,以及可以轻松用于发起攻击或入侵的工具的可用性,在攻击发生时进行调查非常重要。监视网络攻击的一种网络取证方法是使用Snort IDS和Ntop来促进监视网络系统的日志记录过程。通过在Ubuntu服务器上使用IPTables,利用ACID (Analysis Console for Intrusion Databases)设计一个网络安全Snort入侵检测系统(IDS),可以有效地阻止攻击者。在这项研究中,研究人员在Ubuntu上使用IPTables作为防火墙来预测攻击。为了防止攻击者进行端口扫描攻击,作者使用IPTables创建了防火墙,其中IPTables规则旨在阻止攻击者的IP地址。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信