Repositori Institusi

Politeknik Siber dan Sandi Negara

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
Image of Analisis penggunaan hasil deteksi IDS Snort pada tools Real Intelligence Threat Analytics (RITA) dalam mendeteksi aktivitas beacon
Bookmark Share

Teks

Analisis penggunaan hasil deteksi IDS Snort pada tools Real Intelligence Threat Analytics (RITA) dalam mendeteksi aktivitas beacon

Sepha Siswantyo - Personal Name; We Muftihaturrahmah Tenri Sau - Personal Name;

Indonesia
Meningkatnya berbagai macam ancaman dan serangan, mengharuskan sistem keamanan informasi juga lebih ditingkatkan. Intrusion Detection System (IDS) sebagai salah satu sistem untuk melakukan deteksi dan pencegahan, juga harus ditingkatkan kemampuannya dalam mengamankan jaringan. Saat ini, jenis IDS yang berbasis signature masih memiliki kekurangan, yaitu tidak mampu mendeteksi ancaman atau serangan yang belum diketahui, seperti serangan aktivitas beacon yang biasanya dilakukan oleh malware berjenis ransomware atau trojan. Oleh karena itu, diperlukan pendetekatan atau tools lain untuk melengkapi kekurangan dari IDS jenis ini. Real Intelligence Threat Analytics (RITA) adalah tools berbasis anomali yang melakukan deteksi melalui analisis statistik dan algoritma K-means clustering untuk mendeteksi adanya aktivitas beacon didalam sebuah lalu lintas jaringan.

Pada penelitian ini akan dilakukan analisis terhadap penggunaan IDS Snort pada tools RITA dalam mendeteksi aktivitas beacon. Penelitian ini menggunakan metode eksperimen yang diperinci dalam tujuh tahap penelitian. Pengujian terhadap deteksi aktivitas beacon dilakukan terhadap 3 buah PCAP dan skenario aktivitas beacon (live beaconing) yang dilakukan selama 1 jam. Setelah melakukan pengujian dilakukan analisis terhadap hasil pengujian. Hasil dari penelitian menunjukkan bahwa IDS Snort dapat digunakan sebagai data input RITA dimana terlebih dahulu format log IDS Snort harus diubah menjadi format log IDS Bro/Zeek yang berbentuk TSV/JSON. Sehingga tools RITA dapat dijadikan sebagai solusi alternatif untuk mendeteksi aktivitas beacon pada IDS Snort.

English
Increased various types of threat and attacks, requires an information security system that also increases. The Intrusion Detection System (IDS) as one of the systems for detection and prevention, must also be enhanced in its ability to secure networks. Currently, the signature-based type of IDS still has a weakness, such as not being able to detect threats or attacks that are not yet known, like beaconing attacks that are usually carried out by malware like ransomware or trojan. Therefore, approaching or other tools are needed to complement the shortcomings of this type of IDS. Real Intelligence Threat Analytics (RITA) is an anomaly based tool that detects through statistical analysis and K-means clustering algorithm to detect the presence of beaconing in a network traffic.

In this research, will be analyze the use of IDS Snort on the RITA tools for detecting beaconing. This research was conducted using an experimental method detailed in seven stages of research. Testing of beaconing detection was carried out on 3 PCAP and live beaconing scenarios performed for 1 hour. After testing, the process of analyzing the test results is carried out. The results of the research indicate that the Snort IDS can be used as RITA input data by first the IDS Snort log format must be changed to the Bro/Zeek log format in the form of TSV/JSON. So the RITA tools can be used as an alternative solution to detect beaconing on IDS Snort.


Availability

No copy data

Detail Information
Series Title
--
Call Number
2020 WE a
Publisher
Bogor : Poltek SSN., 2020
Collation
xiv, 46 halaman
Language
Indonesia
ISBN/ISSN
--
Classification
--
Content Type
-
Media Type
-
Carrier Type
-
Edition
--
Subject(s)
--
Specific Detail Info
-
Statement of Responsibility
We Muftihaturrahmah Tenri Sau
Other version/related

No other version available

File Attachment
No Data
Comments

You must be logged in to post a comment

Repositori Institusi
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?