Implementasi Intrusion Detection System (IDS) untuk Mendeteksi serangan Metasploit Exploit Menggunakan Snort dan Wireshark
DOI:
https://doi.org/10.37792/jukanti.v6i1.861Keywords:
Intrusion Detection System, Snort, Wireshark, Metasploit ExploitAbstract
Abstrak
Keamanan jaringan pada saat ini memang sangat diperlukan. Seiring dengan perkembangannya serangan siber, banyak kejahatan siber yang bekerja melalui jaringan dan mengeksploitasi celah keamanan tanpa adanya akses terlebih dahulu seperti serangan Remote Exploit. Serangan Remote Exploit ini dilakukan dengan cara memanfaatkan celah pada port dan protokol yang terbuka sehingga dapat mengexploitasi sistem operasi komputer target secara jarak jauh dan dapat mencuri data-data pada komputer target. Untuk melakukan Remote Exploit membutuhkan tools Metasploit Framework dengan menggunakan exploit/multi/handler dan menggunakan payload linux/x64/meterpreter/reverse_tcp sehingga dapat mengakses sistem operasi komputer target. IDS (Intrusion Detection System) Snort adalah sebuah sistem yang digunakan untuk memantau trafik jaringan dan mendeteksi intrusi mencurigakan kemudian akan melaporkannya dalam bentuk peringatan atau alert. Dengan menggunakan Intrusion Detection System Snort bertujuan agar dapat melakukan scaning terhadap setiap serangan yang masuk ke dalam jaringan komputer dan sangat membantu dalam minimalisir kerusakan sistem yang dilakukan oleh penyerang. untuk menganalisis lalu lintas jaringan dari paket Remote Exploit digunakan Wireshark sebagai pendeteksi serangan, dan dilakukan pembuktian apakah paket tersebut merupakan virus atau bukan dengan menggunakan Virus Total.
Kata kunci : Intrusion Detection System, Snort, Wireshark, Metasploit Exploit
Abstract
Network security at this time is indeed indispensable. As cyberattacks evolve, many cyberattacks work through networks and exploit security loopholes without prior access such as Remote Exploit attacks. This Remote Exploit attack is carried out by taking advantage of loopholes in open ports so that it can exploit the targer computer operating system remotely and can steal data on the target computer. To do Remote Exploit requires Metasploit Framework tools using exploit/multi/handler and using linux/x64/meterpreter/reverse_tcp payload so that it can access the target computer's operating system. IDS (Intrusion Detection System) Snort is a system used to monitor network traffic and detect suspicious intrusions and then report it in the form of alerts. By using the Intrusion Detection System Snort aims to be able to scan every attack that enters the computer network and is very helpful in minimizing system damage done by attackers. to multiply network traffic from Remote Exploit packets, Wireshark is used as an attack detector, and proof is carried out whether the packet is a virus or not by using Virus Total.
Keywords : Intrusion Detection System, Snort, Wireshark, Metasploit Exploit/
Downloads
Downloads
Published
Issue
Section
License
Copyright (c) 2023 Jurnal Pendidikan Teknologi Informasi (JUKANTI)

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
JUKANTI Journal License
JUKANTI (Jurnal Pendidikan Teknologi Informasi) is committed to supporting open access and the dissemination of scholarly knowledge. All articles published in JUKANTI are distributed under the Creative Commons Attribution 4.0 International License (CC BY 4.0).
Creative Commons Attribution 4.0 International License (CC BY 4.0)
Under this license, users are permitted to read, download, copy, distribute, print, search, link to, remix, transform, adapt, and build upon the published work for any lawful purpose, including commercial purposes, provided that appropriate credit is given to the original author(s) and the original publication in JUKANTI, a link to the license is provided, and any changes made are indicated.
Author Rights
Authors retain the copyright of their articles and grant JUKANTI the right of first publication. Authors are also permitted to deposit and share the published version of their articles in institutional repositories, subject repositories, personal websites, and academic networks, provided that the original publication in JUKANTI is properly cited and linked.
Author Obligations
Authors publishing with JUKANTI are responsible for ensuring that their work is original, does not infringe any copyright, and complies with applicable ethical and legal standards. Authors must obtain permission for any third-party material included in their manuscript when required.
License Information
License: Creative Commons Attribution 4.0 International License (CC BY 4.0)
License URL: https://creativecommons.org/licenses/by/4.0/
Commitment to Open Access Standards
JUKANTI is committed to maintaining transparent editorial policies, clear licensing terms, and open access publishing practices in accordance with international scholarly publishing standards.
For further questions or clarifications regarding this license, please contact the JUKANTI editorial office at edu@ucb.ac.id



