Repositori Institusi

Politeknik Siber dan Sandi Negara

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
Image of Implementasi Otomatisasi Rule SHAring pada Intrusion Detection System (IDS)
Bookmark Share

Text

Implementasi Otomatisasi Rule SHAring pada Intrusion Detection System (IDS)

Rahmat Purwoko - Personal Name; Septia Ulfa Sunaringtyas - Personal Name; Dimas Febriyan Priambodo - Personal Name; Guntur Satria Ajie - Personal Name;

Abstrak:
Berdasarkan data yang telah dirilis oleh Pusat Operasi Keamanan Siber Nasional (Pusopkamsinas) Badan Siber dan Sandi Negara (BSSN), ditemukan bahwa tingkat kejahatan siber di Indonesia semakin meningkat per tahunnya. Dengan tingginya tingkat kejahatan siber yang terjadi di negara Indonesia, terdapat kemungkinan adanya anomali trafik yang belum terdeteksi karena terbatasnya ruang lingkup pendeteksian instrusi oleh IDS jika hanya menggunakan aturan deteksi yang berasal dari vendor dan ketidakefektifan konfigurasi rule pada multi IDS di ekosistem privat yang telah dikustomisasikan guna menyesuaikan kebu-tuhan dari ekosistem privat yang dimiliki. Oleh karena itu, perlu menerapkan otomatisasi knowledge sharing berupa rule sharing untuk meningkatkan efektivi-tas dan efisiensi konfigurasi rule antar IDS pada ekosistem privat untuk penerapan rule yang telah dikustomisasi sebagai upaya dalam meningkatkan ruang lingkup deteksi. Peneliti mengembangkan dan mengimplementasikan mekanisme rule shar-ing dengan menggunakan union algorithm dalam melakukan parsing serta distri-busi rule IDS. Hasil penelitian menunjukkan bahwa mekanisme rule sharing pada instrusion detection system (IDS) dapat diimplementasikan dengan baik. Pada pengujian static analysis didapatkan data bahwa mekanisme rule sharing dapat mendistribusikan rule ke semua IDS dengan baik, hal tersebut dapat dilihat dari nilai hash yang dimiliki oleh file local.rules masing-masing IDS identik dan sama. Selanjutnya pada pengujian attack analysis didapatkan data bahwa setiap IDS yang awalnya hanya bisa mendeteksi masing-masing serangan sesuai rule awal yang diterapkan, setelah menjalankan mekanisme rule sharing yang telah diotoma-tisasikan, setiap IDS mampu mendeteksi semua jenis serangan berdasarkan pen-galaman yang telah didapatkan oleh IDS lain.
Abstract:
Based on data released by the National Cyber Security Operations Center (Pusopkamsinas) of the National Cyber and Crypto Agency (BSSN), it was found that the level of cyber crime in Indonesia is increasing every year. With the high level of cybercrime occurring in Indonesia, there is a possibility of undetected traffic anomalies due to the limited scope of intrusion detection by IDS if only using vendor-derived detection rules and the ineffectiveness of rule configuration on Multi IDS in private ecosystems that have been customized to suit the needs of their private ecosystems. Therefore, it is necessary to implement knowledge sharing automation in the form of rule sharing to increase the effectiveness and efficiency of rule configuration between IDSs in a private environment for customized rules as an effort to increase the scope of detection. The researcher developed and implemented a rule sharing mechanism using union algorithm in parsing and distributing IDS rules. The results showed that the rule sharing mechanism for the intrusion detection system (IDS) can be implemented well. In static analysis testing, it is found that the rule sharing mechanism can distribute rules to all IDSs properly, it can be seen from the hash value owned by the local.rules file of each IDS is identical and the same. Furthermore, the attack analysis test obtained data that each IDS can initially only detect each attack according to the initial rules applied, after running the rule sharing mechanism that has been atomized, each IDS is able to detect all types of attacks based on the experience that has been obtained by other IDSs.


Availability

No copy data

Detail Information
Series Title
--
Call Number
2023 GUN i
Publisher
Bogor : Politeknik Siber dan Sandi Negara., 2023
Collation
xv, 70 halaman
Language
Indonesia
ISBN/ISSN
--
Classification
Rekayasa Keamanan Siber
Content Type
-
Media Type
-
Carrier Type
-
Edition
--
Subject(s)
IDS
Snort
Suricata
Otomatisasi
Rule Sharing
Specific Detail Info
-
Statement of Responsibility
Guntur Satria Ajie
Other version/related

No other version available

File Attachment
No Data
Comments

You must be logged in to post a comment

Repositori Institusi
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?