{"title":"检测网络中可疑活动的预警系统设计","authors":"Fajar Ratnawati, Agus Tedyyana","doi":"10.1109/iCAST51016.2020.9557704","DOIUrl":null,"url":null,"abstract":"The use of network Internet today is increasingly widespread. It is not just used for individuals but also takes well to the organization, institution, or company to convenience the mutual exchange of data and information. A security network should be considered in developing a network computer to avoid attacks from the party's detriment. When this many emerging methods and techniques that made the intruder enter into a network of computers. Intrusion Detection System is one way of prevention by making the detection of attacks early to minimize the risk and then make prevention a right. Intrusion Detection Systems in detecting the presence of a suspicious or an intruder with a way to take a packet of data available on the network computer and then do a pen detection of a with Snort Rules-Based, which will give it a warning and store data in a MySQL database.","PeriodicalId":334854,"journal":{"name":"2020 International Conference on Applied Science and Technology (iCAST)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Warning System Design to Detect Suspicious Activities in a Network\",\"authors\":\"Fajar Ratnawati, Agus Tedyyana\",\"doi\":\"10.1109/iCAST51016.2020.9557704\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The use of network Internet today is increasingly widespread. It is not just used for individuals but also takes well to the organization, institution, or company to convenience the mutual exchange of data and information. A security network should be considered in developing a network computer to avoid attacks from the party's detriment. When this many emerging methods and techniques that made the intruder enter into a network of computers. Intrusion Detection System is one way of prevention by making the detection of attacks early to minimize the risk and then make prevention a right. Intrusion Detection Systems in detecting the presence of a suspicious or an intruder with a way to take a packet of data available on the network computer and then do a pen detection of a with Snort Rules-Based, which will give it a warning and store data in a MySQL database.\",\"PeriodicalId\":334854,\"journal\":{\"name\":\"2020 International Conference on Applied Science and Technology (iCAST)\",\"volume\":\"17 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-10-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 International Conference on Applied Science and Technology (iCAST)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/iCAST51016.2020.9557704\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 International Conference on Applied Science and Technology (iCAST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/iCAST51016.2020.9557704","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Warning System Design to Detect Suspicious Activities in a Network
The use of network Internet today is increasingly widespread. It is not just used for individuals but also takes well to the organization, institution, or company to convenience the mutual exchange of data and information. A security network should be considered in developing a network computer to avoid attacks from the party's detriment. When this many emerging methods and techniques that made the intruder enter into a network of computers. Intrusion Detection System is one way of prevention by making the detection of attacks early to minimize the risk and then make prevention a right. Intrusion Detection Systems in detecting the presence of a suspicious or an intruder with a way to take a packet of data available on the network computer and then do a pen detection of a with Snort Rules-Based, which will give it a warning and store data in a MySQL database.