DETECTION OF PING FLOOD ATTACKS ON CCTV SERVERS

Nelly Khairani Daulay, Dani Raisman Raisman, Refdi Andri Andri

Abstract

The development of information technology, especially computer networks, allows the exchange of information that is easy, fast, and increasingly complex. Computer network security must be considered in order to maintain the validity and integrity of data and information residing in the computer network. The problem that arises in the CCTV control center is that there is no security against the detection of attacks that can occur at any time, for example a ping flood attack. Ping flood itself can be interpreted as a simple denial of service attack in which the attacker floods the victim with "echo request" (ping) packets in the ICMP protocol. To overcome the problems faced by the Lubuklinggau City Police control center in carrying out CCTV server security, the solution offered is to build an Intrusion Detection Server (IDS). IDS itself can read incoming and outgoing data packets automatically which will provide a report (log) to the network administrator. One of the most widely used IDS tools is Snort. Snort has several advantages compared to other IDS software, including source code that is small in size, compatible with many operating systems, fast in detecting network attacks, easy to configure and is open source.

Keywords

Network security, IDS, Snort

Full Text:

PDF

References

A. H. Hambali and S. Nurmiati, “Implementasi Intrusion Detection System (IDS) Pada Keamanan PC Server Terhadap Serangan Flooding Data,” Sainstech J. Penelit. dan Pengkaj. Sains dan Teknol., vol. 28, no. 1, pp. 35–43, 2018, doi: 10.37277/stch.v28i1.267.

P. Panggabean, “Analisis Network Security Snort Metode Intrusion Detection System Untuk Optimasi Keamanan Jaringan Komputer,” Jursima, vol. 6, no. 1, p. 1, 2018, doi: 10.47024/js.v6i1.107.

S. M. Othman, F. Mutaher Ba-Alwi, N. T. Alsohybe, and A. T. Zahary, “Survey on Intrusion Detection System Types,” Int. J. Cyber-Security Digit. Forensics, vol. 7, no. 4, pp. 444–462, 2018, [Online]. Available: https://www.researchgate.net/publication/329363322

B. Wijaya and A. Pratama, “Deteksi Penyusupan Pada Server Menggunakan Metode Intrusion Detection System (Ids) Berbasis Snort,” J. Sisfokom (Sistem Inf. dan Komputer), vol. 9, no. 1, pp. 97–101, 2020, doi: 10.32736/sisfokom.v9i1.770.

I. P. A. E. Pratama and N. K. M. Handayani, “Implementasi IDS Menggunakan Snort Pada Sistem Operasi Ubuntu,” J. Mantik Penusa, vol. 3, no. 1, pp. 176–181, 2019.

S. Khadafi, Y. D. Pratiwi, and E. Alfianto, “Keamanan Ftp Server Berbasiskan Ids Dan Ips Menggunakan Sistem Operasi Linux Ubuntu,” Netw. Eng. Res. Oper., vol. 6, no. 1, p. 11, 2021, doi: 10.21107/nero.v6i1.190.

I. G. N. W. Arsa, “Arsitektur Konsolidasi Server dengan Virtualisasi untuk Penyedia Layanan Infrastruktur Cloud,” J. Sist. dan Inform., vol. 14, no. 1, pp. 35–40, 2019, doi: 10.30864/jsi.v14i1.240.

O. A. Astra and Y. Mardiana, “Rancang Bangun dan Analisa Pengendali CCTV Berbasis Arduino Menggunakan Smartphone Android,” J. Media Infotama, vol. 14, no. 1, 2018, doi: 10.37676/jmi.v14i1.470.

D. V. Sandi and M. Arrofiq, “Implementasi Analisis NIDS Berbasis Snort Dengan Metode Fuzy Untuk Mengatasi Serangan LoRaWAN,” J. RESTI (Rekayasa Sist. dan Teknol. Informasi), vol. 2, no. 3, pp. 685–696, 2018, doi: 10.29207/resti.v2i3.504.

F. Antony and R. Gustriansyah, “Deteksi Serangan Denial of Service pada Internet of Things Menggunakan Finite-State Automata,” MATRIK J. Manajemen, Tek. Inform. dan Rekayasa Komput., vol. 21, no. 1, pp. 43–52, 2021, doi: 10.30812/matrik.v21i1.1078.

I. Zuhriyanto, A. Yudhana, and I. Riadi, “Perancangan Digital Forensik pada Aplikasi Twitter Menggunakan Metode Live Forensics,” Semin. Nas. Inform. 2008 (semnasIF 2008), vol. 2018, no. November, pp. 86–91, 2018.

D. Santoso, A. Noertjahyana, and J. Andjarwirawan, “Implementasi dan Analisa Snort dan Suricata Sebagai IDS dan IPS Untuk Mencegah Serangan DOS dan DDOS,” J. Infra, vol. 10, no. 1, pp. 1–6, 2022, [Online]. Available: https://publication.petra.ac.id/index.php/teknik-informatika/article/view/12033

I. Riadi, S. Sunardi, and M. E. Rauli, “Identifikasi Bukti Digital WhatsApp pada Sistem Operasi Proprietary Menggunakan Live Forensics,” J. Tek. Elektro, vol. 10, no. 1, pp. 18–22, 2018, doi: 10.15294/jte.v10i1.14070.

R. Suwanto, I. Ruslianto, and M. Diponegoro, “Implementasi Intrusion Prevention System (IPS) Menggunakan Snort Dan IPTable Pada Monitoring Jaringan Lokal Berbasis Website,” J. Komput. dan Apl., vol. 07, no. 1, pp. 97–107, 2019.

I. K. K. A. Marta, I. N. B. Hartawan, and I. K. S. Satwika, “Analisis Sistem Monitoring Keamanan Server Dengan Sms Alert Berbasis Snort,” Inser. Inf. Syst. Emerg. Technol. J., vol. 1, no. 1, p. 25, 2020, doi: 10.23887/insert.v1i1.25874.

W. W. Purba and R. Efendi, “Perancangan dan analisis sistem keamanan jaringan komputer menggunakan SNORT,” Aiti, vol. 17, no. 2, pp. 143–158, 2021, doi: 10.24246/aiti.v17i2.143-158.

Soni, Y. Prayudi, and B. Sugiantoro, “Teknik Akuisisi Virtualisasi Server Menggunakan Metode Live Forensic,” Teknomatika, vol. 9, no. 2, 2017.