Pemanfaatan Telegram Sebagai Notifikasi Serangan untuk Keperluan Forensik Jaringan

Main Author: Fahana, Rusydi Umar, Faizin Ridho, Jefree; Magister Teknik Informatika Universitas Ahmad Dahlan Yogyakarta, Indonesia
Format: Article info application/pdf eJournal
Bahasa: eng
Terbitan: Program Studi Sistem Informasi , 2017
Online Access: http://jurnal.uinsu.ac.id/index.php/query/article/view/1036
http://jurnal.uinsu.ac.id/index.php/query/article/view/1036/814
http://jurnal.uinsu.ac.id/index.php/query/article/downloadSuppFile/1036/35
ctrlnum article-1036
fullrecord <?xml version="1.0"?> <dc schemaLocation="http://www.openarchives.org/OAI/2.0/oai_dc/ http://www.openarchives.org/OAI/2.0/oai_dc.xsd"><title lang="en-US">Pemanfaatan Telegram Sebagai Notifikasi Serangan untuk Keperluan Forensik Jaringan</title><creator>Fahana, Rusydi Umar, Faizin Ridho, Jefree; Magister Teknik Informatika Universitas Ahmad Dahlan Yogyakarta, Indonesia</creator><description lang="en-US">Cyber attacks are a serious threat to network security, especially in routers that result in termination of connections, missing configurations that affect all communications and transactions between networks become impeded by the loss of many parties. The first step to do is to design and build an attack detection system that is Intrusion Detection System (IDS). The use of snort is useful for recording Distributed Danial of Services (DDoS) attacks as well as traffic data stored on the router stored in the log and forwarded to the instant messaging telegram application as a notification to alert the administrator. A telegram can be used not only as a notification but can also be used as a network forensic stage to strengthen evidence of an attack as a process of data collection for the purposes of the trial. The results showed that by utilizing Instant Messaging Telegram by designing wake Application (App) notification using PHP programming language able to detect attacks by using existing rules on snort and can serve as the basis of evidence of an attack.&#xA0;Keywords: Telegram, Intrusion Detection System (IDS), Snort, Network Forensics, DDoS.&#xA0;</description><publisher lang="en-US">Program Studi Sistem Informasi</publisher><contributor lang="en-US"/><date>2017-10-05</date><type>Journal:Article</type><type>Other:info:eu-repo/semantics/publishedVersion</type><type>Other:</type><type>File:application/pdf</type><identifier>http://jurnal.uinsu.ac.id/index.php/query/article/view/1036</identifier><source lang="en-US">Query: Journal of Information Systems; Volume: 01, Number: 02, October 2017</source><source>2579-5341</source><language>eng</language><relation>http://jurnal.uinsu.ac.id/index.php/query/article/view/1036/814</relation><relation>http://jurnal.uinsu.ac.id/index.php/query/article/downloadSuppFile/1036/35</relation><rights lang="en-US">Copyright (c) 2017 Query: Journal of Information System</rights><rights lang="en-US">http://creativecommons.org/licenses/by/4.0</rights><recordID>article-1036</recordID></dc>
language eng
format Journal:Article
Journal
Other:info:eu-repo/semantics/publishedVersion
Other
Other:
File:application/pdf
File
Journal:eJournal
author Fahana, Rusydi Umar, Faizin Ridho, Jefree; Magister Teknik Informatika Universitas Ahmad Dahlan Yogyakarta, Indonesia
title Pemanfaatan Telegram Sebagai Notifikasi Serangan untuk Keperluan Forensik Jaringan
publisher Program Studi Sistem Informasi
publishDate 2017
url http://jurnal.uinsu.ac.id/index.php/query/article/view/1036
http://jurnal.uinsu.ac.id/index.php/query/article/view/1036/814
http://jurnal.uinsu.ac.id/index.php/query/article/downloadSuppFile/1036/35
contents Cyber attacks are a serious threat to network security, especially in routers that result in termination of connections, missing configurations that affect all communications and transactions between networks become impeded by the loss of many parties. The first step to do is to design and build an attack detection system that is Intrusion Detection System (IDS). The use of snort is useful for recording Distributed Danial of Services (DDoS) attacks as well as traffic data stored on the router stored in the log and forwarded to the instant messaging telegram application as a notification to alert the administrator. A telegram can be used not only as a notification but can also be used as a network forensic stage to strengthen evidence of an attack as a process of data collection for the purposes of the trial. The results showed that by utilizing Instant Messaging Telegram by designing wake Application (App) notification using PHP programming language able to detect attacks by using existing rules on snort and can serve as the basis of evidence of an attack. Keywords: Telegram, Intrusion Detection System (IDS), Snort, Network Forensics, DDoS.
id IOS4124.article-1036
institution Universitas Islam Negeri Sumatera Utara Medan
affiliation ptki.onesearch.id
institution_id 503
institution_type library:university
library
library Perpustakaan Universitas Islam Negeri Sumatera Utara Medan
library_id 508
collection QUERY - Jurnal Sistem Informasi
repository_id 4124
subject_area Data Processing, Computer Science/Pemrosesan Data, Ilmu Komputer, Teknik Informatika
Computer Management/Manajemen Komputer
Systems Analysis and Computer Design/Sistem Analis dan Desain Komputer
Software System Analysis and Design/Sistem Analisa dan Desain Perangkat Lunak
city KOTA MEDAN
province SUMATERA UTARA
shared_to_ipusnas_str 1
repoId IOS4124
first_indexed 2017-10-20T01:36:33Z
last_indexed 2017-10-20T01:36:33Z
recordtype dc
merged_child_boolean 1
_version_ 1686450096104800256
score 17.538404