Analisis Perbandingan Intrustion Detection System Snort dan Suricata

The Growth of the Internet and computer networks that happen in this day and age provide benefits and services to computer users to be able to share resources and information. Behind the ease of accessing information provided by the internet there is a great danger that is lurking, namely the variou...

Full description

Saved in:
Bibliographic Details
Main Authors: HAKIM, LUTFI NUR (Author), , Prof. Dr. Budi Murtiyasa, M.Kom (Author), , Dr. Ir. Bana Handaga, M.T (Author)
Format: Book
Published: 2015.
Subjects:
Online Access:Connect to this object online
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000 am a22000003u 4500
001 repoums_36750
042 |a dc 
100 1 0 |a HAKIM, LUTFI NUR  |e author 
700 1 0 |a , Prof. Dr. Budi Murtiyasa, M.Kom  |e author 
700 1 0 |a , Dr. Ir. Bana Handaga, M.T.  |e author 
245 0 0 |a Analisis Perbandingan Intrustion Detection System Snort dan Suricata 
260 |c 2015. 
500 |a https://eprints.ums.ac.id/36750/2/HALAMAN%20DEPAN2.pdf 
500 |a https://eprints.ums.ac.id/36750/6/BAB%20I.pdf 
500 |a https://eprints.ums.ac.id/36750/9/BAB%20II.pdf 
500 |a https://eprints.ums.ac.id/36750/10/BAB%20III.pdf 
500 |a https://eprints.ums.ac.id/36750/14/BAB%20IV.pdf 
500 |a https://eprints.ums.ac.id/36750/15/BAB%20V.pdf 
500 |a https://eprints.ums.ac.id/36750/19/DAFTAR%20PUSTAKA.pdf 
500 |a https://eprints.ums.ac.id/36750/22/LAMPIRAN.pdf 
500 |a https://eprints.ums.ac.id/36750/25/SCAN%20SURAT%20PERNYATAAN%20PUBLIKASI.pdf 
500 |a https://eprints.ums.ac.id/36750/26/PUBLIKASI%20ILMIAH.pdf 
520 |a The Growth of the Internet and computer networks that happen in this day and age provide benefits and services to computer users to be able to share resources and information. Behind the ease of accessing information provided by the internet there is a great danger that is lurking, namely the various kinds of attacks that tried to find a gap of computer network security system being used. Attacks that could cause data loss and even damage to hardware. Application of IDS proposed as one solution that can be used to assist network managers in monitoring and analyzing network conditions dangerous packets contained in the network. However, an application IDS is certainly has advantages and disadvantages, so the authors were interested in conducting research to analyze and compare the performance of both the IDS. Analysis and comparison of IDS Snort and Suricata to measure the level of accuracy, speed detection and use of resources. Measurements carried out in a virtual machine, simulating the port scanning attacks, brute force and dos. Using Snorby as the font-end IDS. Suricata is superior research results in terms of detection accuracy will attack, however, the speed and the use of resources on the measurement results Snort always superior. 
546 |a en 
546 |a en 
546 |a en 
546 |a en 
546 |a en 
546 |a en 
546 |a en 
546 |a en 
546 |a en 
546 |a en 
690 |a QA76 Computer software 
655 7 |a Thesis  |2 local 
655 7 |a NonPeerReviewed  |2 local 
787 0 |n https://eprints.ums.ac.id/36750/ 
787 0 |n L200100094 
856 \ \ |u https://eprints.ums.ac.id/36750/  |z Connect to this object online