• Tidak ada hasil yang ditemukan

Institutional Repository | Satya Wacana Christian University: Analisa Traceback menggunakan Metode Packet Marking IPTraceback pada IDS (Intrusion Detection System) dengan Teknik Visualisasi

N/A
N/A
Protected

Academic year: 2017

Membagikan "Institutional Repository | Satya Wacana Christian University: Analisa Traceback menggunakan Metode Packet Marking IPTraceback pada IDS (Intrusion Detection System) dengan Teknik Visualisasi"

Copied!
1
0
0

Teks penuh

(1)

1)

Mahasiswa Fakultas Teknologi Informasi Jurusan Teknik Informatika, Universitas Kristen Satya Wacana Salatiga.

2) Staff Pengajar Fakultas Teknologi Informasi, Universitas Kristen Satya Wacana Salatiga.

3)

Staff Pengajar Fakultas Teknologi Informasi, Universitas Kristen Satya Wacana Salatiga.

Analisa

Traceback

menggunakan Metode

Packet

Marking IP Traceback

pada

IDS

(Intrusion

Detection System

)

dengan Teknik Visualisasi

1)

Falentino Sigit Pramono, 2) Irwan Sembiring, 3) Sri Yulianto Joko

Prasetyo

Fakultas Teknologi informasi Universitas Kristen Satya Wacana Jl. Diponegoro 52-60, Salatiga 50771, Indonesia

Email : 1) maz.sigitpramono@yahoo.com , 2) irwan@staff.uksw.edu ,

3)

sriyulianto@gmail.com

Abstract

With the increasing number of the benefits gained through the use of the internet network, many users of a computer that connects with the internet at this moment. The issue of security became a little more complicated in

handling.IDS used to to detect unwanted manipulation by an intruder. The

main purpose of intrusion system is for alarm. Which will provide a memorial if there is penetration in the security parameters. The result of

detection by alert.ids will analysis using the mechanism traceback,

according to packet marking on network. This technique allow victims identify lines ( path ) traffic an attack that is stretched across the network. Furthermore, traceback technique can be conducted in post mortem after an offensive happen. Visualization not only its working methods used to analyze security, but information is a process of transformation into a visual form that enables it to observed and understood by the user. By using IP packet marking traceback method, allowing the user to be able to trace the attacks with marking packages, either in probalistik or deterministic. Then use this information to search for an attack to the source.

Referensi

Dokumen terkait

Based on financial performance variables used in this study, it was 4 (four) of variables, including: Current Ratio, Return on Asets, Return on Equity and Debt Ratio To Asets

Sehubungan dengan penawaran yang masuk kurang dari 3 (tiga) pada pelaksanaan pengadaan pekerjaan Pembangunan Pembangkit Listrik Tenaga (PLT) Hybrid Surya dan Angin Di

[r]

Adapun frekuensi kemunculan pada kategori jenis kegiatan dengan frekuensi kemunculan terbanyak terdapat pada sub kategori pelatihan sebanyak 19 paragraf dengan prosentase 31,14%..

[r]

Kehutanan pengamanan Hutan Terpadu Pengadaan Sarpras pengamanan hutan terpadu Belanja Modal Barang 56,000,000 1 Paket Kab. Kehutanan pengamanan Hutan Terpadu Pengadaan Sarpras

[r]

Nutrien/zat gizi: substansi kimia dalam makanan yg digunakan tubuh utk menghasilkan energi dan utk menyokong pertumb, mempertahankan & memperbaiki jaringan yg rusak.. Zat