International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 183 - Number 42 |
Year of Publication: 2021 |
Authors: Tri Widodo, Adam Sekti Aji |
10.5120/ijca2021921821 |
Tri Widodo, Adam Sekti Aji . Implementation of Intrusion Detection System (IDS) and Snort Community Rules to Detect Types of Network Attacks. International Journal of Computer Applications. 183, 42 ( Dec 2021), 30-35. DOI=10.5120/ijca2021921821
Intrusion detection system (IDS) is a system that monitors network traffic for suspicious activity and alerts when such activity is discovered. Administrators can certainly implement firewalls on managed networks, but not necessarily implement IDS. IDS has a detection function, so administrators will get notifications when there are activities that are prohibited based on IDS rules. IDS rules can be set by the administrator from scratch, one by one, but administrators can also use IDS rules provided by some security sites. In this study, a network topology that is integrated with IDS will be used and implemented various rules on the IDS. The operating system used is Ubuntu and the IDS used is Snort. The IDS rules are taken from the community rules on www.snort.org. Based on the tests and simulations on the IDS, the conclusions are: IDS is effective in detecting the activity of network attacks aimed at the server and Community rules provided by the official Snort website contain rules that can be used to anticipate network attacks. Further research is expected to be able to collaborate on network security applications with artificial intelligence or machine learning applications. Research that combines computer network security applications and artificial intelligence or machine learning can improve computer network security because it is able to analyze computer network attacks or malware based on certain patterns