Fitri Nova
Unknown Affiliation

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

Implementasi dan Analisa Keamanan Jaringan IDS (Intrusion Detection System) Menggunakan Suricata Pada Web Server Stephani, Elsa; Fitri Nova; Ervan Asri
JITSI : Jurnal Ilmiah Teknologi Sistem Informasi Vol 1 No 2 (2020)
Publisher : Jurusan Teknologi Informasi - Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (2272.112 KB) | DOI: 10.30630/jitsi.1.2.10

Abstract

The defense system against servers is generally still done manually by administrators. To overcome this, we need a system that functions to inform threats that occur optimally and be resolved quickly. The IDS network security system was developed using Suricata. Suricata itself will be built using OPNsense. With the Suricata system using OPNsense, it can detect or prevent incoming attacks.
Wazuh sebagai Log Event Management dan Deteksi Celah Keamanan pada Server dari Serangan Dos Fitri Nova; Pratama, Muhammad Dehan; Prayama, Deddy
JITSI : Jurnal Ilmiah Teknologi Sistem Informasi Vol 3 No 1 (2022): Computer Engineering
Publisher : Jurusan Teknologi Informasi - Politeknik Negeri Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30630/jitsi.3.1.59

Abstract

Server monitoring is the process of monitoring server system resources such as monitoring server performance also helps identify other performance-related problems such as resource utilization, application downtime, and response time to a service. File Integrity Monitoring (FIM) is the activity of monitoring the integrity of a file to maintain the integrity of a file from unauthorized changes, by utilizing Wazuh as one of the open source applications to monitor has various features to perform monitoring. Computer network security becomes something that needs to be considered as technology develops rapidly. It is the responsibility of a network administrator to monitor system security at any time. Given the various threats that can enter the system at any time, an application is needed that can detect and prevent the threat in real time. The problem raises the idea for the author to utilize one of the applications, namely Suricata in which there is an IDS (Intruction Detection System) method that will serve as an attacker detection. Suricata will display an alert when there is a suspicious package. The resulting alert will be stored in the file log. Then the log will be displayed on the Wazuh web interface. Alerts that appear on Wazuh will be sent to network administrators via e-mail