Implementasi Proxy dan Snort Sebagai Gateway Antivirus
2021, MEANS (Media Informasi Analisa dan Sistem)
https://doi.org/10.54367/MEANS.V6I1.1232Abstract
Technology and internet networks are two things that are always related, because in today's era the internet has become a much-needed medium for learning, communicating, exchanging data, and even playing. With the activity of using the internet network, a problem will arise, namely network security. Network security is a very important aspect as a defense in a network, to minimize the risk of data theft and unwanted access in an internet network. The purpose of this study is to implement the control and security of internet use in an agency with minimal costs. namely using the Linux operating system Ubuntu Server 18.04, Proxy Server, and Snort. The result of the system that has been created has a function to perform caching so that it can save bandwidth and can function as filtering content to minimize unwanted things on the network. In addition, the system created is very helpful for network admins to monitor the network in real-time, even can also enforce rules to protect the ...
References (15)
- A. P. Wicaksono, "Sistem Deteksi Intrusi dengan Snort," p. 4, 2014.
- W. Wahyudi, "Membangun Proxy Server Cv Global Max Menggunakan Sistem Operasi Linux Blankon 6.0 Ombilin Sebagai Manajemen Akses Jaringan," Edik Inform., vol. 1, no.
- pp. 63-71, Feb. 2017, doi: 10.22202/ei.2014.v1i1.1441.
- P. Panggabean, S. Kom, and M. Kom, "ANALISIS NETWORK SECURITY SNORT MENGGUNAKAN METODE INTRUSION DETECTION SYSTEM (IDS) UNTUK OPTIMASI KEAMANAN JARINGAN KOMPUTER," vol.
- no. 1, p. 12, 2018. [4] E. R. Nainggolan, "IMPLEMENTASI PENGATURAN PROXY SERVER MENGGUNAKAN SERVICE SQUID PADA SISTEM OPERASI LINUX," no. 2, p. 6, 2015. [5] R. Mentang, A. A. E. Sinsuw, and X. B. N. Najoan, "Perancangan Dan Analisis Keamanan Jaringan Nirkabel Menggunakan Wireless Intrusion Detection System," vol. 5, no. 7, p. 10, 2015.
- M. Ulfa, "IMPLEMENTASI INTRUSION DETECTION SYSTEM (IDS) DI JARINGAN UNIVERSITAS BINA DARMA," p. 14. [7] P. P. Putra, "Pengembangan Sistem Keamanan Jaringan Menggunakan Rumusan Snort Rule (Hids) untuk Mendeteksi Serangan Nmap," vol. 2, no. 1, p. 7, 2016.
- D. T.
- Atmaja, E. B. Prasetya, and P. E. Kresnha, "NOTIFIKASI ADANYA SERANGAN PADA JARINGAN KOMPUTER DENGAN MENGIRIM PESAN MELALUI APLIKASI TELEGRAM DAN KONTROL SERVER," p. 8.
- S. Suhartono and Abd. R. Patta, "SISTEM PENGAMANAN JARINGAN ADMIN SERVER DENGAN METODE INTRUSION DETECTION SYSTEM (IDS) SNORT MENGGUNAKAN SISTEM OPERASI CLEAROS," J. Teknol.
- Elekterika, vol. 14, no. 2, p. 145, Nov. 2017, doi: 10.31963/elekterika.v14i2.1220.
- R. F. Olanrewaju et al., "Snort-based Smart and Swift Intrusion Detection System," Indian J. Sci. Technol., vol. 11, no. 4, pp. 1-9, Jan. 2018, doi: 10.17485/ijst/2018/v11i4/120917. INTERNET SOURCES: ------------------------------------------------------------------------------------------- 1% - https://repository.uksw.edu/bitstream/123456789/17875/2/T1_132014005_Full%20text.p df <1% -https://www.upwork.com/resources/understanding-it-security-network-security <1% - https://www.researchgate.net/publication/221786540_Application_Service_Providers_AS
- P_Adoption_in_Core_and_Non-Core_Functions <1% -https://www.dnsstuff.com/network-vulnerability-scanner 1% -https://ejournal.stmikgici.ac.id/index.php/jursima/article/download/107/55 <1% - https://www.antaranews.com/berita/2194082/bssn-masih-selidiki-dugaan-bocornya-dat a-bpjs-kesehatan <1% - https://www.beritasatu.com/nasional/602771/bssn-serangan-siber-di-indonesia-mening kat-drastis <1% - https://live-look-no.icu/2016/10/pengertian-squid-proxy-server-pada-linuxkprg-12785- 5w4wu.html <1% -http://eprints.walisongo.ac.id/4182/6/103711019_bab3.pdf <1% -http://repository.stei.ac.id/4334/5/BAB%20III.pdf <1% - https://www.biem.co/read/2021/03/01/75054/kemenkominfo-pantau-isp-di-pemkab-se rang/ <1% -http://jtdjurnal.polinema.ac.id/index.php/jtd/article/download/36/30/ <1% -https://journal.iain-samarinda.ac.id/index.php/DiJITAC/article/view/2576 <1% - https://123dok.com/document/1y90nddy-implementasi-vpn-menggunakan-mikrotik-pa da-jaringan-xyz-mart.html 1% - https://repository.uksw.edu/bitstream/123456789/11300/1/T1_672010181_Full%20text.p df <1% - https://bogieganilaga.home.blog/2020/01/04/membangun-intrusion-detection-system- dengan-snort/ <1% -https://tugasdenny.wordpress.com/page/5/ <1% -https://keamanan-informasi.stei.itb.ac.id/category/uncategorized/page/6/ <1% - https://123dok.com/document/yd7lpvey-membandingkan-kemampuan-deteksi-intrusio n-detection-suricata-berbasis-pengembang.html 1% -https://lms.onnocenter.or.id/wiki/index.php/SNORT:_sniffer_mode <1% -https://eric1878.wordpress.com/2016/04/ <1% - https://npratiwilbs.wordpress.com/2017/02/24/pengaruh-globalisasi-terhadap-budaya- bangsa/ 1% - http://www.jurnalteknik.unisla.ac.id/index.php/informatika/article/download/401/pdf <1% -https://herza.id/blog/author/cyberdaeng/ <1% -https://picklinik.id/ <1% -https://issuu.com/izzuddinmahai/docs/uny_525_2017_tkj_v5.1_full <1% -http://jurnalnasional.ump.ac.id/index.php/JUITA/article/view/850/790
- <1% -https://ojs.ustj.ac.id/jti/article/download/733/547/ <1% - https://www.researchgate.net/publication/328803353_ANIMASI_INTERAKTIF_PENGENAL AN_HEWAN_UNTUK_PENDIDIKAN_ANAK_USIA_DINI <1% -https://garuda.ristekbrin.go.id/author/view/381433
- <1% -https://ejurnal.undana.ac.id/jicon/article/view/3606
- <1% -https://www.scribd.com/document/333611484/Laporan-Pengabdian-Ganjil-2016 1% - https://www.researchgate.net/publication/235527935_Komunikasi_Data_dan_Jaringan_K omputer <1% - https://www.researchgate.net/publication/327201905_A_Survey_on_MANETs_Architectur e_Evolution_Applications_Security_Issues_and_Solutions