PENERAPAN METODE RULE BASED DALAM MENDETEKSI SERANGAN MULTI ATTACK PADA NETWORK ATTACHED STORAGE

dc.contributor.authorPutra, Halimansyah
dc.date.accessioned2024-06-26
dc.date.available2024-06-26
dc.date.issued2023
dc.identifier.uri https://ejurnal.lkpkaryaprima.id/index.php/juktisi/article/view/138
dc.description.abstract Network Attached Storage (NAS) is a server with an operating system that is specific to serving the needs of data files. NAS is the best solution as a storage medium and data sharing. However, the aspect of data security is also a major concern in the use of NAS storage media. The NAS server manager cannot guarantee data security on the NAS server they manage. In protecting and detecting attacks on NAS, the use of a firewall as security is highly recommended as an initial stronghold. The Rule Base method is implemented in the firewall to test the accuracy of the NAS server's security, if the NAS is attacked by a multi- attack (multiple attacks). Multi-attack attacks are divided into two, namely brute-force attacks and a denial-of-service (DDoS). Forensic analysis is also needed to find out whether there is an intruder carrying out the attack, wireshark is also needed as packet capturing and snort as packet sniffing based on the Intrusion Detection System (IDS) in testing attacks. The test was carried out using a rule-based method against the iptables firewall on the NAS which is very effective at blocking the initial attack on the NAS. Of the 8 times of testing, the rule-based accuracy against multi-attack attacks on NAS was 84% successfully blocking attacks and 16% failing to block attacks. The time given is in the form of incoming bandwidth limits and limit-burst which are applied to icmp, udp, tcp ssh and ftp ports. Rule-based managed to block multi-attack attacks aimed at NAS. The result of applying the rule-based method to the firewall is expected to be able to block multiple attacks on the NAS. In the rule base brute-force attack it succeeded in dropping active port connections on the NAS, and in the rule base DDoS attack it also succeeded in dropping socket flooding on the NAS. Keywords : Network Attached Storage (NAS) , Multi-attack, Rule Based Method en_US
dc.language.isoenen_US
dc.publisherUniversitas Harapan Medanen_US
dc.subjectNETWORK ATTACHED STORAGEen_US
dc.titlePENERAPAN METODE RULE BASED DALAM MENDETEKSI SERANGAN MULTI ATTACK PADA NETWORK ATTACHED STORAGEen_US
dc.typeSkripsien_US


File In This Item

No Thumbnail
Name f866d7d590b9765989f13aee7843d139HALIMANSYAH PUTRA.docx
Size 2356260 Mb
Format application/vnd.openxmlformats-officedocument.wordprocessingml.document
Description peer_review
Peer Review

This item appears in the following Collection(s)

Skripsi [1121]

Show Simple Item Record