Perancangan Sistem Bot Alert Telegram Sebagai Notifikasi Deteksi Serangan Ping of Death Berbasis Snort
DOI:
https://doi.org/10.30865/resolusi.v5i1.2168Keywords:
Ping of Death; Internet Control Message Protocol (ICMP); Server; Snort; TelegramAbstract
The Ping of Death attack is a type of denial of service (DoS) attack that exploits a vulnerability in the Internet Control Message Protocol (ICMP). This attack is carried out by sending a large number of pings that exceed the maximum limit allowed by the network, causing the server or network device to become slow or even unresponsive. This attack can have a severe impact on server and network performance, especially for services that require high availability such as the Sinanan Lubuklinggau server. This research aims to design a Telegram Bot alert system as an automatic notification tool to detect Ping of Death attacks on the Sinanan Lubuklinggau server, using Snort, a detection system software that is infiltrating the "NIDS" network. Snort is used to detect attacks by examining data packets passing through the network. If Snort detects suspicious activity such as a Ping of Death attack, the system will immediately send an alert via the Telegram bot. The alert contains detailed information about the attack, including the IP address, attacker, timestamp, and location of the affected network. This system has also been proven to work well in high-traffic network environments without disrupting server performance. By implementing this system, network administrators can act more quickly to prevent and manage the threat of Ping of Death attacks, thereby maintaining the stability and security of the Sinanan Lubuklinggau server.
Downloads
References
P. Zuriati Ardila Safitri1, Elin Haerani, Rometdo Muzawi, Muhammad Affandes, “Intrusion Detection System (IDS) Pada Snort Dengan Bot Telegram Sebagai Sistem Notifikasi Terhadap Serangan Syn Flood dan Ping Of Death,” SATIN - Sains dan Teknol. Inf., vol. 10, no. 1, pp. 157–168, 2024, doi: 10.33372/stn.v9i2.1000..
M. R. Ramadhan et al., “Implementasi Intrusion Detection System (Ids) Menggunakan Jejaring Sosial Sebagai Media Notifikasi Dengan Menggunakan Snort,” BHATARA J. Multidisiplin, vol. 1, no. 1, pp. 31–40, 2024, [Online]. Available: https://doi.org/........IJCCS
S. Khadafi, B. D. Meilani, and S. Arifin, “Sistem Keamanan Open Cloud Computing Menggunakan Ids (Intrusion Detection System) Dan Ips (Intrusion Prevention System),” J. IPTEK, vol. 21, no. 2, p. 67, 2017, doi: 10.31284/j.iptek.2017.v21i2.207.
Z. Dwi Alfaeni, N. Fahriani, J. Raya Sutorejo No, D. Sutorejo, K. Mulyorejo, and J. Timur, “Deteksi Serangan Ddos Pada Jaringan Rt/Rw-Net Desa Ketanen Dengan Metode Intrusion Detection System (IDS) Menggunakan Snort,” Semin. Nas. Teknol. Inf. Ilmu Komput., vol. 2, no. 1, pp. 28–34, 2023.
B. Fachri and F. H. Harahap, “Simulasi Penggunaan Intrusion Detection System (IDS) Sebagai Keamanan Jaringan dan Komputer,” J. Media Inform. Budidarma, vol. 4, no. 2, p. 413, 2020, doi: 10.30865/mib.v4i2.2037.
A. Fergina, S. Alif, N. Ikhsan, and Z. Alamsyah, “Penggunaan Snort Sebagai Sistem Pendeteksi Serangan Pada Jaringan Menggunakan Notifikasi Telegram ( Kasus Dinas Komunikasi Informatika Dan Persandian Kabupaten Sukabumi ),” vol. 5, no. 3, pp. 901–912, 2024.
I. P. G. A. Sudiatmika, I. P. Y. A. Ariwanta, and I. G. A. S. Melati, “Mengoptimalkan Keamanan Jaringan Komputer Menggunakan Snort dan Telegram Bot yang Terintegrasi dengan Mikrotik,” J. Comput. Syst. Informatics, vol. 3, no. 4, pp. 247–256, 2022, doi: 10.47065/josyc.v3i4.2037.
Sutarti, A. P. Pancaro, and F. I. Saputra, “Implementasi IDS (Intrusion Detection System) Pada Sistem Keamanan Jaringan SMAN 1 Cikeusal,” J. PROSISKO, vol. 5, no. 1, pp. 1–8, 2018.
B. Wijaya and A. Pratama, “Deteksi Penyusupan Pada Server Menggunakan Metode Intrusion Detection System (Ids) Berbasis Snort,” J. Sisfokom (Sistem Inf. dan Komputer), vol. 9, no. 1, pp. 97–101, 2020, doi: 10.32736/sisfokom.v9i1.770.
G. Yandiputra Sunardi, A. Kania Ningsih, and S. Anggoro Universitas Jenderal Achmad Yani, “Sistem Monitoring Serangan Jaringan Menggunakan Intrusion Detection System (Ids) Dengan Notifikasi Telegram,” J. Ilm. Sain dan Teknol., vol. 2, no. 3, pp. 218–238, 2024, [Online]. Available: https://github.com/gperftools/gperftools/releases/download/gperftools-
B. Sudradjat, “Sistem Pendeteksian dan Pencegahan Penyusup Pada Jaringan Komputer Dengan Menggunakan Snort dan Firewall,” JISAMAR (Journal Inf. Syst. Applied, Manag. Account. Res., vol. 1, no. 1, pp. 10–24, 2017.
D. D. Mahendra and F. S. Mukti, “Sistem Deteksi dan Pengendalian Serangan Denial of Service pada Server Berbasis Snort dan Telegram-API,” Techno.Com, vol. 21, no. 3, pp. 511–522, 2022, doi: 10.33633/tc.v21i3.6466.
M. A. S. Arifin, “RANCANG BANGUN PROTOTYPE ROBOT LENGAN MENGGUNAKAN FLEX SENSOR DAN ACCELEROMETER SENSOR PADA LAB MIKROKONTROLER STMIK MUSIRAWAS,” vol. 9, pp. 255–261, 2017.
S. Esabella and Y. Bella Fitriana, “KLIK: Kajian Ilmiah Informatika dan Komputer Analisis Keamanan Jaringan Menggunakan Metode Security Policy Development Life Cycle (SPDLC),” Media Online, vol. 4, no. 1, pp. 634–641, 2023, doi: 10.30865/klik.v4i1.1157.
M. Mukmin, P. Purnawansyah, and M. Hasnawi, “Notifikasi Bot Telegram Untuk Monitoring Jaringan Pada Kementrian Kelautan Dan Perikanan Untia,” Bul. Sist. Inf. dan Teknol. Islam, vol. 3, no. 2, pp. 127–133, 2022, doi: 10.33096/busiti.v3i2.1162.
D. Yuliandari, W. Walim, B. K. Raja, R. Ningsih, and A. J. Wahidin, “Simulasi Penerapan Sistem Monitoring Jaringan Snort NIDS Pada Web Server Menggunakan Metode SPDLC,” J. Infortech, vol. 5, no. 2, pp. 133–138, 2023, doi: 10.31294/infortech.v5i2.17338.
F. Nuraeni and I. Nurfajri, “Notifikasi Network Intrusion Detection System Menggunakan Media Aplikasi Telegram (Studi Kasus: Kantor Imigrasi Tasikmalaya),” J. Sist. Inf. dan Teknol. Inf. STMIK Dipanegara, vol. 6, no. 1, pp. 1–5, 2017, [Online]. Available: www.snort.org.
R. K. Abdullah, M. T. Fudhail, S. Mujahidin, P. Studi, I. Jurusan, and T. Informasi, “Penggunaan Snort dan Fail2ban sebagai IDS untuk Mengatasi Brute Force Attack dengan Notifikasi Telegram?: Studi Kasus pada Institusi XYZ The use of Snort and Fail2ban as IDS to overcome Brute Force Attack with Telegram notification?: Case study at XYZ Institute,” vol. 12, no. 3, pp. 530–542, 2024, doi: 10.26418/justin.v12i3.79617.
E. Risyad, M. Data, and E. S. Pramukantoro, “Perbandingan Performa Intrusion Detection System ( IDS ) Snort Dan Suricata Dalam Mendeteksi Serangan TCP SYN Flood,” J. Pengemb. Teknol. Inf. dan Ilmu Komput., vol. 2, no. 9, pp. 2615–2624, 2018.
T. Purnama, Y. Muhyidin, and D. Singasatia, “Implementasi Intrusion Detection System (Ids) Snort Sebagai Sistem Keamanan Menggunakan Whatsapp Dan Telegram Sebagai Media Notifikasi,” J. Teknol. Inf. Dan Komun., vol. 14, no. 2, pp. 358–369, 2023, doi: 10.51903/jtikp.v14i2.726.
A. Syaimi, P. Utami, L. Lidyawati, and Z. Ramadhan, “Perancangan dan Analisis Kinerja Sistem Pencegahan Penyusupan Jaringan Menggunakan Snort IDS dan Honeyd,” J. Reka Elkomika ©TeknikElektro | Itenas J. Online Inst. Teknol. Nas. J. Reka Elkomika, vol. 1, no. 4, pp. 2337–439, 2013.
A. Muhaimi, I. P. Hariyadi, and A. Juliansyah, “Analisa Penerapan Intrusion Prevention System (IPS) Berbasis Snort Sebagai Pengaman Server Internet Yang Terintegrasi Dengan Telegram,” J. Bumigora Inf. Technol., vol. 1, no. 2, pp. 167–176, 2019, doi: 10.30812/bite.v1i2.611.
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Perancangan Sistem Bot Alert Telegram Sebagai Notifikasi Deteksi Serangan Ping of Death Berbasis Snort
ARTICLE HISTORY
Issue
Section
Copyright (c) 2024 Dicky Rachman Juliandi, Joni Karman, Rusdiyanto
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).