Implementation of intrusion prevention system (IPS) to analysis triad cia on network security attacks on web server

Amilia Anggraeni, Jafaruddin Gustri Amri Ginting, Syariful Ikhwan
{"title":"Implementation of intrusion prevention system (IPS) to analysis triad cia on network security attacks on web server","authors":"Amilia Anggraeni, Jafaruddin Gustri Amri Ginting, Syariful Ikhwan","doi":"10.20895/infotel.v14i4.813","DOIUrl":null,"url":null,"abstract":"Computer networks are built to achieve the main goal of communicating with each other . During the transmission process, it is expected that information can be conveyed quickly, efficiently and safely. Network security serves to avoid damage or even data loss caused by attacker activities during the communication process. Security aspects that need to be maintained in data information are Confidentiality, Integrity and Availability. Intrusion Prevention System is a solution that can maintain network security from various attacks. The Intrusion Prevention System will act as a protector on the network by detecting and preventing suspicious traffic on nodes in a network. The Intrusion Prevention System in its implementation has several tools which are used in this study, namely Snort and IPTables. Testing is done by performing attacks on the Web Server. The attacks carried out are Port Scanning, DDoS attacks and Brute Force. The results of this study are based on the CIA Triad with the three attacks having different characteristics in terms of cause and effect. On the defense side, Port Scanning and Brute Force can be easily prevented by IPS, but in DDoS attacks there are differences in results between drop and reject rule. In a DDoS attack with an action drop rule, it can recover the web server in 160 seconds while the action reject rule can be restored at 145 seconds which normally can be recovered in a DDoS attack in 165 seconds. The IPS server can also reduce resources when there is a DDoS attack by 9.2% .","PeriodicalId":30672,"journal":{"name":"Jurnal Infotel","volume":" ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Jurnal Infotel","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.20895/infotel.v14i4.813","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Computer networks are built to achieve the main goal of communicating with each other . During the transmission process, it is expected that information can be conveyed quickly, efficiently and safely. Network security serves to avoid damage or even data loss caused by attacker activities during the communication process. Security aspects that need to be maintained in data information are Confidentiality, Integrity and Availability. Intrusion Prevention System is a solution that can maintain network security from various attacks. The Intrusion Prevention System will act as a protector on the network by detecting and preventing suspicious traffic on nodes in a network. The Intrusion Prevention System in its implementation has several tools which are used in this study, namely Snort and IPTables. Testing is done by performing attacks on the Web Server. The attacks carried out are Port Scanning, DDoS attacks and Brute Force. The results of this study are based on the CIA Triad with the three attacks having different characteristics in terms of cause and effect. On the defense side, Port Scanning and Brute Force can be easily prevented by IPS, but in DDoS attacks there are differences in results between drop and reject rule. In a DDoS attack with an action drop rule, it can recover the web server in 160 seconds while the action reject rule can be restored at 145 seconds which normally can be recovered in a DDoS attack in 165 seconds. The IPS server can also reduce resources when there is a DDoS attack by 9.2% .
入侵防御系统(IPS)的实现分析网络服务器网络安全攻击中的黑社会cia
计算机网络的建立是为了实现相互通信的主要目标。在传输过程中,人们期望信息能够快速、高效、安全地传递。网络安全是为了避免在通信过程中攻击者的活动造成的破坏甚至数据丢失。数据信息中需要维护的安全方面是机密性、完整性和可用性。入侵防御系统是一种保护网络安全免受各种攻击的解决方案。入侵防御系统通过检测和阻止网络节点上的可疑流量,在网络中起到保护器的作用。入侵防御系统在其实现中使用了几个工具,即Snort和IPTables。测试是通过对Web服务器执行攻击来完成的。攻击手段包括端口扫描、DDoS攻击和暴力破解。本研究的结果是基于CIA的三位一体,三次攻击在因果关系方面具有不同的特点。在防御方面,端口扫描和暴力破解可以很容易地被IPS阻止,但在DDoS攻击中,丢弃规则和拒绝规则的结果是不同的。在配置了动作丢弃规则的DDoS攻击中,可以在160秒内恢复web服务器,在145秒内恢复动作拒绝规则,而在DDoS攻击中通常需要165秒才能恢复。当存在DDoS攻击时,IPS服务器也可以减少9.2%的资源。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
47
审稿时长
6 weeks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信