IMPLEMENTASI INTRUSION PREVENTION SYSTEMMENGGUNAKAN SURICATA UNTUK MODUL PRAKTIKUMKEAMANAN JARINGAN LABORATORIUM D3 ELEKTRONIKA UNIVERSITAS MUHAMMADIYAHMALANGSebagai Persyaratan Guna Meraih Gelar Ahli MadyaD3 Teknik Elektronika Universitas Muhammadiyah MalangMOCH. RIZAL ARISTYAWAN(201510150511015)FAKULTAS TEKNIKJURUSAN D3-ELEKTRONIKAUNIVERSITAS MUHAMMADIYAH MALANG2018i
iii
KATA PENGANTARDengan mengucapkan syukur ke hadirat Allah Subhanahu Wa Ta ’alahyaitu pemilik alam semesta dan dengan segala isinya. Atas rahmat-Nya danhidayah-Nya yang telah dicurahkan sehingga penelitian ini dapat terselesaikan yangberjudul:“IMPLEMENTASI INTRUSION PREVENTION SYSTEMMENGGUNAKAN SURICATA UNTUK MODUL PRAKTIKUMKEAMANAN JARINGAN LABORATORIUM D3 ELEKTRONIKA UNIVERSITAS MUHAMMADIYAHMALANG”Di dalam penelitian ini menyajikan bahasan – bahasan yang meliputi tentang proseskonfigurasi sistem suricata dan iptables. Dalam kesempatan ini izinkan penulismenyampaikan terima kasih dan penghargaan yang sebesar-besarnya kepada:1. Ibu Ir. Nur Alif Mardiyah, MT selaku ketua Jurusan Teknik ElektroUniversitas Muhammadiyah Malang.2. Bapak M.Nasar, ST., MS dan Bapak Khaerudin, ST.selaku dosenpembimbing Tugas Akhir, terima kasih atas keluangan waktu, tenaga sertakesabaran dalam membimbing penulis untuk menyelesaikan penelitian ini.3. Seluruh Dosen dan Staf pengajar jurusan Teknik Elektro UniversitasMuhammadiyah Malang, terima kasih atas waktu dan ilmu yang telahdiberikan kepada penulis selama ini.4. Seluruh teman – teman jurusan Teknik Elektro di UniversitasMuhammadiyah Malang yang telah berkontribusi dalam memberikandukungan dalam menyelesaikan Tugas Akhir ini.5. Kepada ayahanda tercinta Sulistiyono dan ibunda yang tersayang Nurhayatiyang selalu memberikan dukungan secara moral dan moril.Penulis menyadari dengan sepenuhnya dalam penyusunan Tugas Akhir inimasih memiliki banyak kekurangan dan keterbatasan. Maka penulis memerlukanvii
saran yang dapat membangun agar penelitian serta tulisan ini dapat bermanfaat kedepanya dalam perkembangan ilmu dan pengetahuan.Malang, 27 September 2018PenulisMOCH RIZALARISTYAWANviii
Daftar IsiLEMBAR PERSETUJUAN . iiLEMBAR PENGESAHAN . iiiLEMBAR PERNYATAAN . ivABSTRAK . vABSTRACT . viKATA PENGANTAR . viiDaftar Gambar . xiBAB I PENDAHULUAN . 11.1Latar Belakang .11.2Rumusan Masalah .21.3Batasan Masalah .21.4Tujuan .21.5Manfaat .31.6Sistematika Penulisan .3BAB II DASAR TEORI . 42.1Keamanan Jaringan .42.2IPS (INTRUSION PREVENTION SYSTEM) .42.3IDS (INTRUSION DETECTION SYSTEM) .52.4Suricata .52.5IPTables .52.6Port Scanning .62.7NMAP .62.8Ping Of Death .62.9SSH (Secure Shell) .6BAB III METODE PENILITIAN . 73.1Metodologi .73.2Instalasi Paket Pendukung Suricata .113.3Instalasi Sistem Suricata .123.4Konfigurasi Suricata .133.5Konfigurasi IPTABLES .153.6Konfigurasi Sendmail .15BAB IV HASIL DAN PEMBAHASAN. 18ix
4.1Percobaan Serangan .18BAB V PENUTUP . 215.1Kesimpulan .215.2Saran .21DAFTAR PUSTAKA . 22x
DAFTAR PUSTAKA[1] D. Kuswanto, "Unjuk Kerja Intrusion Prevention System (IPS) BerbasisSuricata Pada Jaringan Local Area Network Laboratorium TIA UniversitasTrunojoyo," Jurnal Ilmiah NERO, vol. 1, p. 74, 2014.[2] F. I. Hanafi, "Rancang Bangun Prototype Keamanan Jaringan KomputerDengan Metode IPS," 2017.[3] Y. W. Pradipta and Asmunin, "Implementasi Intrusion Prevention SystemDengan Snort Dan Iptables Berbasis Linux".[4] D. A. Nugroho, "Perancangan Dan Implementasi Intrusion Detection SystemDi Jaringan Universitas Diponegoro," April 2015.[5] A. Nuryanto, "Analisis Dan Implementasi Suricata, Snorby, Dan Barnyard2Pada VPS Ubuntu," 2015.[6] R. Rinaldi, "Analisa Kinerja FAIL2BAN Dan DENYHOSTS DalamMengamankan Server Dari Serangan Brute Force".[7] L. N. Hakim, "Analisis Perbandingan Intrustion Detection System," 2015.[8] Nazwita, "Analisis Sistem Keamanan Web Server Dan," 2017.[9] I. A. Wijayanti, "Implementasi Intrusion Prevention System (IPS) BerbasisWeb Menggunakan Snort IDS DAN IPtables Firewall," 2011.[10] K. A. Hermawan, "Implementasi Intrusion Prevention System DalamJaringan Menggunakan Suricata Pada OS Ubuntu," pp. 12 - 13, 2012.22
Suricata Pada Jaringan Local Area Network Laboratorium TIA Universitas Trunojoyo," Jurnal Ilmiah NERO, vol. 1, p. 74, 2014. [2] F. I. Hanafi, "Rancang Bangun Prototype Keamanan Jaringan Komputer Dengan Metode IPS," 2017. [3] Y. W. Pradipta and Asmunin, "Implementasi Intrusion Prevention System Dengan Snort Dan Iptables Berbasis Linux".
Intrusion Prevention: Signature Policies 201 Intrusion Prevention: Signature Policies - New 203 Intrusion Prevention: Sensors 204 Intrusion Prevention: Sensor - New 205 Intrusion Prevention: Sensor - Associating Sensor to a Firewall Policy 206 Intrusion Prevention: Alerts and Reports 208 Intrusion Prevention: View Rule File 210
c. Plan, Deploy, Manage, Test, Configure d. Design, Configure, Test, Deploy, Document 15. What are the main types of intrusion detection systems? a. Perimeter Intrusion Detection & Network Intrusion Detection b. Host Intrusion Detection & Network Intrusion Detection c. Host Intrusion Detection & Intrusion Prevention Systems d.
Intrusion Detection System Objectives To know what is Intrusion Detection system and why it is needed. To be familiar with Snort IDS/IPS. What Is Intrusion Detection? Intrusion is defined as “the act of thrusting in, or of entering into a place or state without invitation, right, or welcome.” When we speak of intrusion detection,
This chapter presents the corresponding research work on the intrusion detection and intrusion prevention in large-scale high-speed network environment and is organized as follows: firstly, a distributed extensible intrusion prevention system is provided, then various packet selection models for intrusion detection systems based-on sampling are
threats to your security policies. And intrusion prevention is the process of per - forming intrusion detection and then stopping the detected incidents. These security measures are available as intrusion detection systems (IDS) and intrusion prevention systems (IPS), which become part of your network to detect and stop potential incidents.
called as behaviour-based intrusion detection. Fig. 2: Misuse-based intrusion detection process Misuse-based intrusion detection is also called as knowledge-based intrusion detection because in Figure 2. it depicts that it maintains knowledge base which contains the signature or patterns of well-known attacks. This intrusion
McAfee System Protection Industry-leading intrusion prevention solutions. Product Guide . McAfee Host Intrusion Prevention is a host-based intrusion detection and prevention .
pile resistances or pile resistances calculated from profiles of test results into characteristic resistances. Pile load capacity – calculation methods 85 Case (c) is referred to as the alternative procedure in the Note to EN 1997-1 §7.6.2.3(8), even though it is the most common method in some countries. Characteristic pile resistance from profiles of ground test results Part 2 of EN 1997 .