12
Analisa Performa Intrusion Detection System (IDS) Snort Dan Suricata Terhadap Serangan TCP SYN Flood Tugas Akhir Diajukan Untuk Memenuhi Persyaratan Guna Meraih Gelar Sarjana Informatika Universitas Muhammadiyah Malang Edi H. Kalabo 201410370311270 Jaringan Komputer PROGRAM STUDI INFORMATIKA FAKULTAS TEKNIK UNIVERSITAS MUHAMMADIYAH MALANG 2021

Analisa Performa Intrusion Detection System (IDS) Snort

  • Upload
    others

  • View
    10

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Analisa Performa Intrusion Detection System (IDS) Snort

Analisa Performa Intrusion Detection System (IDS) Snort Dan Suricata

Terhadap Serangan TCP SYN Flood

Tugas Akhir

Diajukan Untuk Memenuhi

Persyaratan Guna Meraih Gelar Sarjana

Informatika Universitas Muhammadiyah Malang

Edi H. Kalabo

201410370311270

Jaringan Komputer

PROGRAM STUDI INFORMATIKA

FAKULTAS TEKNIK

UNIVERSITAS MUHAMMADIYAH MALANG

2021

Page 2: Analisa Performa Intrusion Detection System (IDS) Snort

LEMBAR PERSETUJUAN

Analisa Performa Intrusion Detection System (IDS) Snort Dan

Suricata Terhadap Serangan TCP SYN Flood

TUGAS AKHIR

Sebagai Persyaratan Guna Meraih Gelar Sarjana Strata 1

Teknik Informatika Universitas Muhammadiyah Malang

Disusun oleh:

EDI H. KALABO

201410370311270

Menyetujui,

Pembimbing I

Syaifuddin, S.Kom, M.Kom.

NIP. 108.16120590

Pembimbing II

Fuazi Dwi Setiawan S.,S.Kom., M.Kom.

NIP. 180.307061992

Page 3: Analisa Performa Intrusion Detection System (IDS) Snort
Page 4: Analisa Performa Intrusion Detection System (IDS) Snort
Page 5: Analisa Performa Intrusion Detection System (IDS) Snort

KATA PENGANTAR

حمن الل بســــــــــــــــــم حيم الر الر

Puji Syukur yang teramat dalam saya panjatkan ke hadirat Tuhan Yang Maha Segala, atas

percikan kasih, hidayat, dan taufiq-Nya sehingga Skripsi dengan judul “Analisa Performa

Intrusion Detection System (IDS) Snort Dan Suricata Terhadap Serangan TCP SYN Flood ”

ini dapat terselesaikan pada waktu yang telah direncanakan. Teriring do’a sholawat serta

salam semoga senantiasa selalu melimpah ke haribaan Nabi Muhammad Saallahu ‘Alaihi Wa

Sallam., Rasul akhir zaman, penutup para Nabi yang membawa kesempurnaan ajaran Tauhid

dan keutamaan budi pekerti. Dan semoga tumpahan do’a sholawat menetes kepada segenap

keluarga dan sahabatnya, para syuhada, para mushonifin, para ulama, dan seluruh umatnya

yang dengan tulus ikhlas mencintai dan menjunjung sunnahnya.

Page 6: Analisa Performa Intrusion Detection System (IDS) Snort

DAFTAR ISI

LEMBAR PERSETUJUAN ................................................................................................... i

LEMBAR PENGESAHAN .................................................................................................. iii

LEMBAR PERNYATAAN .................................................................................................. iv

Abstrak ................................................................................................................................... v

Abstract ................................................................................................................................. vi

LEMBAR PERSEMBAHAN .............................................................................................. vii

KATA PENGANTAR .......................................................................................................... ix

DAFTAR ISI.......................................................................................................................... x

DAFTAR GAMBAR ........................................................................................................... xii

DAFTAR TABEL............................................................................................................... xiii

BAB I PENDAHULUAN ...................................................................................................... 1

1.1 Latar Belakang ........................................................................................................ 1

1.2 Rumusan Masalah ................................................................................................... 3

1.3 Tujuan Penelitian..................................................................................................... 3

1.4 Cakupan Masalah .................................................................................................... 4

1.5 Sistematika Laporan Tugas Akhir ........................................................................... 4

BAB II KAJIAN TEORI........................................................................................................ 6

2.1 SYN Flood.Attack ................................................................................................... 8

2.2 IntrusionlDetection System.(IDS) ......................................................................... 10

2.3 Rule ....................................................................................................................... 11

2.4 Snort ...................................................................................................................... 12

2.5 Suricata. ................................................................................................................. 13

2.6 Scapy. .................................................................................................................... 14

2.7 Tcpreplay............................................................................................................... 14

BAB III METODOLOGI ..................................................................................................... 16

3.1 Analisa................................................................................................................... 16

3.2 Desain Perancangan Sistem .................................................................................. 17

3.2.1 Tesbed ujicoba penelitian............................................................................... 17

3.3 Implementasi ......................................................................................................... 19

3.3.1 rule pada IDS Snort dan IDS Suricata ........................................................... 19

3.3.2 Komponen Sistem .......................................................................................... 20

3.4 Hasil dan Analisa .................................................................................................. 22

BAB IV HASIL DAN ANALISA ....................................................................................... 24

Page 7: Analisa Performa Intrusion Detection System (IDS) Snort

4.1 Parameter dari Pengujian ...................................................................................... 24

4.2 Perhitungan Persentase Akurasi dan Rata-rata...................................................... 24

4.3 Implementasi Sistem ............................................................................................. 25

4.4 Akurasi.Deteksi ..................................................................................................... 30

4.4.1 Hasil.Pengujian Akurasi.Deteksi Snort. ......................................................... 30

4.4.2 Hasil Pengujian Akurasi Deteksi Suricata ..................................................... 30

4.4.3 Menghitung Persentase Akurasi Deteksi ....................................................... 31

4.5 Keecepatan Deteksi. .............................................................................................. 32

4.5.1 Hasil Pengujian kecepatan Deteksi ................................................................ 32

4.5.2 Menghitung rata-rata kecepatan Deteksi........................................................ 33

4.6 Penggunaan Sumber Daya (RAM)......................................................................... 35

BAB V PENUTUP............................................................................................................... 38

5.1 Kesimpulan............................................................................................................ 38

5.2 Saran ...................................................................................................................... 39

DAFTAR PUSTAKA .......................................................................................................... 40

Page 8: Analisa Performa Intrusion Detection System (IDS) Snort

DAFTAR GAMBAR

Gambar 2.1 three-why-handshake.......................................................................................... 9

Gambar 2.3 Alur TCP SYN ................................................................................................. 10

Gambar 2.3 TCP Syn Flood Attack...................................................................................... 10

Gambar 2.4 Intrusion Detection Sytem (IDS) ...................................................................... 10

Gambar 2.5 Snort Arsitektur Beralur singlethread............................................................... 12

Gambar 2.6 Suricata Arsitektur Beralur multi- threads ........................................................ 13

Gambar 3.1 Flowchart Metode Penelitian............................................................................ 16

Gambar 3.2 Topologi IDS Snort .......................................................................................... 18

Gambar 3.3 Topologi IDS Suricata ...................................................................................... 19

Gambar 3.4 Rules IDS Snort dan Suricata ........................................................................... 19

Gambar 3.5 Source Code Tcp Syn from Scapy.................................................................... 22

Gambar 3.6 Flowchart Pengujian Serangan Tcp Syn........................................................... 23

Gambar 4.1 Hasil Pembuatan Paket Dengan Scapy ............................................................. 25

Gambar 4.2 Running Tcpreplay ........................................................................................... 25

Gambar 4.3 Running Snort Mode IDS ................................................................................. 26

Gambar 4.4 Running Suricata .............................................................................................. 28

Gambar 4.5 Output Snort ..................................................................................................... 28

Gambar 4.6 Output stats.log Suricata................................................................................... 29

Gambar 4.7 Perbandingan Akurasi deteksi IDS Snort dan Suricata .................................... 31

Gambar 4.8 Perbandingan kecepatan detekti IDS Snort dan Suricata ................................. 34

Gambar 4.9 Perbandingan Penggunaan Sumber Daya RAM IDS Snort dan Suricata 36

Page 9: Analisa Performa Intrusion Detection System (IDS) Snort

DAFTAR TABEL

Table 2.1 Perbandingan penelitian penulis dengan penelitian sebelumnya ............7

Table 3.1 Spesifikasi Laptop .................................................................................21

Table 3.2 Spesifikasi Software yang diimplementasikan......................................21

Table 3.3 Jumlah Aktivitas dan Paket yang diuji ..................................................22

Table 4.1 Deteksi Akurasi Snort ...........................................................................30

Table 4.2 Akurasi Deteksi Suricata .......................................................................30

Table 4.3 Persentase Akurasi Deteksi Snort dan Suricata ....................................31

Table 4.4 Kecepatan Deteksi Snort dalam satuan detik ........................................32

Table 4.5 Kecepatan Deteksi Suricata dalam satuan detik ....................................33

Table 4.6 Hasil rata-rata kecepatan deteksi Snort dan Suricata ............................34

Table 4.7 Penggunaan sumber daya (RAM) pada Snort .......................................35

Table 4.8 Penggunaan Sumber daya (RAM) pada Suricata ..................................35

Page 10: Analisa Performa Intrusion Detection System (IDS) Snort

DAFTAR PUSTAKA

[1] L.Xiaoming, “Denial of Service (DoS)attackwith UDPFlood.”

[2] M. Muqorobin, Z. Hisyam, M. Mashuri, H. Hanafi, and Y. Setiyantara, “Implementasi

Network Intrusion Detection System (NIDS) Dalam Sistem Keamanan Open Cloud

Computing,” Maj. Ilm. Bahari Jogja, vol. 17, no. 2, pp. 1–9, 2019, doi:

10.33489/mibj.v17i2.205.

[3] A. H. Hambali and S. Nurmiati, “Implementasi Intrusion Detection System (IDS) Pada

Keamanan PC Server Terhadap Serangan Flooding Data,” Sainstech J. Penelit. dan

Pengkaj. Sains dan Teknol., vol. 28, no. 1, pp. 35–43, 2018, doi:

10.37277/stch.v28i1.267.

[4] Igal Zeifman, “Global DDoS Threat Landscape Q1 2017,” Imperva Incapsula, p. 1,

2017, [Online]. Available: https://www.incapsula.com/ddos-report/ddos-report-q1-

2016.html%0Ahttps://www.incapsula.com/ddos-report/ddos-report-q1-2017.html.

[5] S. Khadafi, B. D. Meilani, and S. Arifin, “Sistem Keamanan Open Cloud Computing

Menggunakan Ids (Intrusion Detection System) Dan Ips (Intrusion Prevention

System),” J. IPTEK, vol. 21, no. 2, p. 67, 2017, doi: 10.31284/j.iptek.2017.v21i2.207.

[6] N.Dietrich, “Snort 2.9.9.xonUbuntu 14and16,” p.3,2015.

[7] E. Risyad, M. Data, and E. S. Pramukantoro, “Perbandingan Performa Intrusion

Detection System ( IDS ) Snort Dan Suricata Dalam Mendeteksi Serangan TCP SYN

Flood,” J. Pengemb. Teknol. Inf. dan Ilmu Komput., vol. 2, no. 9, pp. 2615–2624,

2018.

[8] Lukman and M. Suci, “Analisis Perbandingan Kinerja Snort Dan Suricata Sebagai

Intrusion Detection System Dalam Mendeteksi Serangan Syn Flood Pada Web Server

Page 11: Analisa Performa Intrusion Detection System (IDS) Snort

Apache,” J. Teknol. Inf., vol. XV, no. 2, pp. 6–15, 2020.

[9] P. Biondi, “Scapy Documentation,” vol. 469, no. 4, pp. 155–203, 2017, [Online].

Available: http://dx.doi.org/10.1016/j.physrep.2008.09.003.

[10] S. A. Raza Shah and B. Issac, “Performance Comparison of Intrusion Detection

Systems andApplication of Machine Learning toSnortSystem,” arXiv, 2017.

[11] F. Informatika, U. Telkom, and W. Fathoni, Deteksi Penyusupan Pada Jaringan

Komputer Menggunakan Ids Snort Intrusion Detection in Computer Netwoks Using

Ids Snort. 2015.

[12] A. Alhomoud, R. Munir, J. P. Disso, I. Awan, and A. Al-Dhelaan, “Performance

evaluation study of Intrusion Detection Systems,” Procedia Comput. Sci., vol. 5, pp.

173–180, 2011, doi: 10.1016/j.procs.2011.07.024.

[13] S. Sinha, Beginning Ethical Hacking with Kali Linux . 2018.

[14] P.S. (IAINS.A.S.Ningsih,“Babii kajianteori,” Bab Ii Kaji. Teor., no. 1, pp. 23–35,

2011.

Page 12: Analisa Performa Intrusion Detection System (IDS) Snort

TA-010

UNIVERSITAS MUHAMMADIYAH MALANG

FAKULTAS TEKNIK PROGRAM STUDI TEKNIK INFORMATIKA

Jl. Raya Tlogomas 246 Malang 65144 Telp. 0341 - 464318 Ext. 247, Fax. 0341 - 460782

FORM CEK PLAGIARISME LAPORAN TUGAS AKHIR

Nama Mahasiswa : Edi H. Kalabo

NIM : 201410370311270

Judul TA : Analisa Performa Intrusion Detection System (IDS) Snort Dan

Suricata Terhadap Serangan TCP SYN Flood

Hasil Cek Plagiarisme dengan Turnitin

No. Komponen Pengecekan Nilai Maksimal

Plagiarisme (%)

Hasil Cek Plagiarisme

(%) *

1. Bab 1 – Pendahuluan 10 % 14%

2. Bab 2 – Daftar Pustaka 25 % 10%

3. Bab 3 – Analisis dan Perancangan 25 % 18%

4. Bab 4 – Implementasi dan Pengujian 15 % 12%

5. Bab 5 – Kesimpulan dan Saran 5 % 2%

6. Makalah Tugas Akhir 20% 11%

Mengetahui,

Dosen Pembimbing

(Syaifuddin, S.Kom., M.Kom.)

*) Hasil cek plagiarism bisa diisikkan oleh salah satu pembimbing