IMPLEMENTASI KEAMANAN IDS/IPS DENGAN SNORT DAN IPTABLES PADA SERVER
Abstract
Keywords
Full Text:
PDF (Bahasa Indonesia)References
J. D. Howard, “An Analysis Of Security Incidents Of The Internet,” 1997.
R. U. Rehman, “Introduction to Intrusion Detection and Snort. In Intrusion detection systems with Snort: advanced IDS techniques using Snort, Apache, MySQL, PHP, and ACID,” 2003.
O’brien, “The impact of affect and social exchange on outcomes of psychological contract breach,” 2011.
Gollmann, “Computer Security,” 1999.
Ariyus and Doni, “Sistem Penyusupan pada Jaringan Komputer,” Yogyakarta Andi, 2007.
R. Rafiudin, “IP routing dan firewall dalam linux,” Yogyakarta Andi, 2006.
B. Sadono, “Tinjauan Tentang Buffer Overflow dan denial of Service Attack,” ITB Bandung, pp. 15–16, 2003.
H. Sammir, “Serangan Denial of service,” infokomputer.com, pp. 1–2, 2003.
A. Mutaqin, “Rancang Bangun Sistem Monitoring Keamanan Jaringan Prodi Teknik Informatika Melalui SMS Alert dengan Snort,” Citeseer. Int. J. Res. Comput. Sci., 2016.
S. Rani and V. Singh, “SNORT: an open source network security tool for intrusion detection in campus network environment.,” IJCTEE, 2012.
A. Raven, “Snort 2.1 intrusion detection,” 2004.
A. Anitha, “Network Security using Linux Intrusion Detection System,” Citeseer. Int. J. Res. Comput. Sci., 2011.
J. Thomas, “D-SCIDS: Distributed soft computing intrusion detection system,” Sci. Direct, 2005.
M. Priyono, “Metode penelitian kuantitatif,” Sidoarjo Zifatma Publ., 2016.
R. N. Rapoport, “Three Dilemmas in Action Research: With Special Reference to the Tavistock Experience,” 1970.
Refbacks
- There are currently no refbacks.
Copyright (c) 2020 Senamika
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.