p-Index From 2017 - 2022
0.408
P-Index
This Author published in this journals
All Journal Jurnal Mantik
Claim Missing Document
Check
Articles

Found 2 Documents
Search

IMPLEMENTASI WIRESHARK DALAM MELAKUKAN PEMANTAUAN PROTOCOL JARINGAN: Studi Kasus : Intranet Jurusan Teknologi Informasi Universitas Udayana I Putu Agus Eka Pratama; Putu Adhika Dharmesta
Jurnal Mantik Vol. 3 No. 1 (2019): May: Manajemen dan Informatika
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (392.431 KB)

Abstract

Wireshark is a leading open source tool that is widely used to analyze and troubleshoot network problems, allowing us to find out about network problems. The development of Wireshark evolved thanks to the contribution of volunteer network experts around the world and is a continuation of the project started by Gerald Combs in 1998. This monitoring covers the flow of protocol that is being used by networks and computers. This test will implement Wireshark as an application to monitor computer communication networks to see and process the results of network monitoring with case studies on the intranet of the Information Technology Department of the Faculty of Engineering, Udayana University
IMPLEMENTASI IDS MENGGUNAKAN SNORT PADA SISTEM OPERASI UBUNTU: Implementasi IDS Menggunakan Snort Pada Sistem Operasi Ubuntu I Putu Agus Eka Pratama; NI Kade Mega Handayani
Jurnal Mantik Vol. 3 No. 1 (2019): May: Manajemen dan Informatika
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (863.392 KB)

Abstract

Network security can be improved by implementing the Intrusion Detection System (IDS). Snort is an Intrusion Detection System program, which is a program that can detect an intrusion attempt on a computer network system. Implementation of an Open Source intrusion based Snort detection system is a cost advantage with reliable performance in detecting attacks. Snort can be implemented on various operating systems including Ubuntu Linux. An attack can be detected or not by Snort IDS, depending on the rules / rules in Snort. Snort testing is done with several attack patterns such as Ping, Port Scanning, Ping of Deatch with several tools such as NMAP, SQLMAP and others. Based on the results of testing Snort can detect and provide warnings about attacks that threaten a computer network of a server. The test results are expected to be used as a alternative in server network security.