z-logo
open-access-imgOpen Access
Analysis Performance Intrusion Detection System in Detecting Cyber-Attack on Apache Web Server
Author(s) -
Doddy Teguh Yuwono
Publication year - 2022
Publication title -
it journal research and development
Language(s) - English
Resource type - Journals
eISSN - 2528-4061
pISSN - 2528-4053
DOI - 10.25299/itjrd.2022.7853
Subject(s) - computer science , denial of service attack , computer security , web server , network packet , intrusion detection system , computer network , network security , flooding (psychology) , application layer ddos attack , operating system , the internet , psychology , psychotherapist
Network security on the webserver is the most important part to ensure integrity and service for users. Web servers are often the target of attacks that result in data corruption. One of them is the SYN Flood attack, which is a type of Denial of Service (DOS) attack that provides massive SYN requests to the webserver. This research is to analyze attack indications and maintain system security from the threat of data flooding. One way to maintain a computer network security system is to use Snort as an IDS (Intrusion Detection System). Snort is software that functions to detect intrusions. Data packets passing through network traffic will be analyzed first. Data packets detected as intrusions will trigger an alert which is then stored in a log file. That way, network administrators can find out intrusions that occur on computer networks. The method of testing flood attack data is using the penetration testing method. The three test samples are data flooding attacks against ICMP, UDP, and TCP protocols. The results obtained when testing flooding attack data where detection sensors can detect all attacks and all attack samples, while the warnings generated by Snort are shown in a web form which can be seen in the detail of each attack that occurred.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here