Cloud Storage untuk Embedded Intrusion Detection System

Agus Reza Aristiadi Nurwa, Dimas Febriyan Priambodo, Fahdel Achmad

Abstract


The Corona Virus (COVID-19) pandemic has had a major social and economic impact on the world. Along with the potential challenges of sharing domains, brings with it many cybersecurity challenges that need to be addressed in a timely manner for critical infrastructure. The increase in the use of internet technology during this pandemic is directly proportional to the increase in the development of Information and Communication Technology (ICT) and cybercrime. Therefore, it is necessary to elaborate the existing ICTs to reduce the impact caused by attacks on the network according to the needs and capabilities of the users. This study applies a Network Intrusion Detection System (NIDS) based on the Raspberry Pi 4 Model B using Snort IDS with log storage media on cloud storage by visualizing the alerts generated to facilitate the analysis of anomalies that occur on the network. The result of this research is that there are attack signatures that are not available in the default rules so that further configuration is needed on Snort. The performance of the IDS sensor does not reduce the capability of the IDS sensor which acts as a hotspot when an attack occurs. 

 


Keywords


IDS; cloud storage; Embedded system; VPN; Snort

Full Text:

PDF

References


M. Hijji and G. Alam, “A Multivocal Literature Review on Growing Social Engineering Based Cyber-Attacks/Threats during the COVID-19 Pandemic: Challenges and Prospective Solutions,” IEEE Access, vol. 9, pp. 7152–7169, 2021, doi: 10.1109/ACCESS.2020.3048839.

Kominfo, “Penggunaan Internet Naik 40% Akibat Physical Distancing,” Kementerian Komunikasi dan Informatika Republik Indonesia. pp. 1–2, 2020, [Online]. Available: file:///D:/Fahdel/Kuliah/Bismillah Tugas Akhir/Latar belakang/Penggunaan Internet Naik 40%25 akibat Physical Distancing – Ditjen Aptika.html.

A. B. M. Kamrul Riad, H. Shahriar, M. Valero, and M. Hossain, “Cybersecurity risks and mitigation techniques during covid-19,” Proc. - 2021 IEEE 45th Annu. Comput. Software, Appl. Conf. COMPSAC 2021, pp. 1351–1356, 2021, doi: 10.1109/COMPSAC51774.2021.00190.

TrendMicro, “A Look Into the Most Noteworthy Home Network Security Threats of 2017,” 2017. https://www.trendmicro.com/vinfo/us/security/research-and-analysis/threat-reports/roundup/a-look-into-the-most-noteworthy-home-network-security-threats-of-2017.

A. K. Kyaw, Y. Chen, and J. Joseph, “Pi-IDS: Evaluation of open-source intrusion detection systems on Raspberry Pi 2,” 2015 2nd Int. Conf. Inf. Secur. Cyber Forensics, InfoSec 2015, pp. 165–170, 2016, doi: 10.1109/InfoSec.2015.7435523.

N. Oliveira, I. Praça, E. Maia, and O. Sousa, “Intelligent cyber attack detection and classification for network-based intrusion detection systems,” Appl. Sci., vol. 11, no. 4, pp. 1–21, 2021, doi: 10.3390/app11041674.

S. Tripathi and R. Kumar, “Raspberry Pi as an Intrusion Detection System, a Honeypot and a Packet Analyzer,” Proc. Int. Conf. Comput. Tech. Electron. Mech. Syst. CTEMS 2018, pp. 80–85, 2018, doi: 10.1109/CTEMS.2018.8769135.

“How to Install Snort NIDS on Ubuntu Linux.” [Online]. Available: https://blog.rapid7.com/2017/01/11/how-to-install-snort-nids-on-ubuntu-linux/.

J. W. Jolles, “Broad-scale applications of the Raspberry Pi: A review and guide for biologists,” Methods Ecol. Evol., vol. 12, no. 9, pp. 1562–1579, 2021, doi: 10.1111/2041-210X.13652.

R. Pi, “Raspberry Pi 4 Model B specifications – Raspberry Pi,” Raspberry Pi Foundation. p. 5, 2020, [Online]. Available: https://www.raspberrypi.org/products/raspberry-pi-4-model-b/specifications/.

“Raspberry Pi Industrial Reliability for 24/7,” 2018. https://forums.raspberrypi.com/viewtopic.php?t=211764.

M. S. Kavitha and P. Damodharan, “Software as a Service in Cloud Computing,” Int. J. Recent Adv. Eng. Technol., vol. 08, no. 04, pp. 1–4, 2020, doi: 10.46564/ijraet.2020.v08i04.001.

F. Khalil-Ur-Rehman, “Raspberry Pi Personal Cloud Storage,” pp. 1–67, 2015, [Online]. Available: https://www.researchgate.net/publication/331975048_Raspberry_Pi_Personal_Cloud_Storage.

A. C. Territory, “Guideline for Records Management Number 7 – Physical Storage of Records,” no. 7, [Online]. Available: file:///D:/Fahdel/Kuliah/Bismillah Tugas Akhir/Latar belakang/Guideline-No-7-Physical-Storage-August-2008.pdf.

L. O. Akingbade, “Cloud Storage problems , benefits and solutions provided by Data De-duplication,” vol. 5, no. 6, pp. 70–77, 2016, [Online]. Available: file:///D:/Fahdel/Kuliah/Bismillah Tugas Akhir/Referens/Cloud Storage problems, benefits and solutions provided by Data De-duplication..pdf.

N. A. Premathilaka, A. C. Aponso, and N. Krishnarajah, “Review on state of art intrusion detection systems designed for the cloud computing paradigm,” Proc. - Int. Carnahan Conf. Secur. Technol., pp. 1–6, 2013, doi: 10.1109/CCST.2013.6922049.

A. Garg and P. Maheshwari, “Performance analysis of Snort-based Intrusion Detection System,” ICACCS 2016 - 3rd Int. Conf. Adv. Comput. Commun. Syst. Bringing to Table, Futur. Technol. from Arround Globe, pp. 0–4, 2016, doi: 10.1109/ICACCS.2016.7586351.

Z. Zhou, Z. Chen, T. Zhou, and X. Guan, “The study on network intrusion detection system of snort,” 2010 Int. Conf. Netw. Digit. Soc. ICNDS 2010, vol. 2, pp. 194–196, 2010, doi: 10.1109/ICNDS.2010.5479341.

Q. He, Z. Li, and X. Zhang, “Analysis of the key technology on cloud storage,” 2010 Int. Conf. Futur. Inf. Technol. Manag. Eng. FITME 2010, vol. 1, pp. 426–429, 2010, doi: 10.1109/FITME.2010.5656540.

W. Ke, Y. Wang, and M. Ye, “GRSA: Service-aware flow scheduling for cloud storage datacenter networks,” China Commun., vol. 17, no. 6, pp. 164–179, 2020, doi: 10.23919/JCC.2020.06.014.

C. M. M. T. Fancy, “An Evaluation of Alternative Protocols-Based Virtual Private LAN Service (VPLS),” MPLS-Enabled Appl., pp. 373–420, 2011, doi: 10.1002/9780470976173.ch13.

A. Alshalan, S. Pisharody, and D. Huang, “A Survey of Mobile VPN Technologies,” IEEE Commun. Surv. Tutorials, vol. 18, no. 2, pp. 1177–1196, 2016, doi: 10.1109/COMST.2015.2496624.

L. Caldas-Calle, J. Jara, M. Huerta, and P. Gallegos, “QoS evaluation of VPN in a Raspberry Pi devices over wireless network,” 2017 Int. Caribb. Conf. Devices, Circuits Syst. ICCDCS 2017, pp. 125–128, 2017, doi: 10.1109/ICCDCS.2017.7959718.

M. Ridwan, E. Safrianti, and L. Oktaviana, “Perancangan dan Analisis Performansi Private Cloud Computing untuk Penyimpanan Data di SMPN 1 Karimun,” Jom FTEKNIK Vol., vol. 6, 2019, [Online]. Available: file:///D:/Fahdel/Kuliah/Bismillah Tugas Akhir/Referens/Perancangan dan Analisis Performansi Private Cloud Computing untuk Penyimpanan.pdf.

A. Charisma, A. D. Setiawan, G. Megiyanto Rahmatullah, and M. R. Hidayat, “Analysis Quality of Service (QoS) on 4G Telkomsel Networks in Soreang,” TSSA 2019 - 13th Int. Conf. Telecommun. Syst. Serv. Appl. Proc., no. October, pp. 145–148, 2019, doi: 10.1109/TSSA48701.2019.8985489.

W. Stallings, M. Bauer, and E. M. Hirsch, COMPUTER SECURITY Second Edition. 2013.

L. Arshadi and A. H. Jahangir, “Entropy based SYN flooding detection,” Proc. - Conf. Local Comput. Networks, LCN, no. April, pp. 139–142, 2011, doi: 10.1109/LCN.2011.6115171.

R. M. Bani-hani and Z. Al-ali, “SYN Flooding Attacks and Countermeasures : A Survey SYN Flooding Attacks and Countermeasures : A Survey,” no. April 2013, 2017, [Online]. Available: file:///D:/Fahdel/Kuliah/Bismillah Tugas Akhir/Referens/SYNFloodingAttacksandCountermeasures.pdf.

M. Data, “The Defense Against ARP Spoofing Attack Using Semi-Static ARP Cache Table,” 3rd Int. Conf. Sustain. Inf. Eng. Technol. SIET 2018 - Proc., pp. 206–210, 2018, doi: 10.1109/SIET.2018.8693155.

J. Gadge and A. A. Patil, “Port scan detection,” Proc. 2008 16th Int. Conf. Networks, ICON 2008, 2008, doi: 10.1109/ICON.2008.4772622.

BPPT, “Panduan Penanganan Insiden Malware,” Insid. malware, pp. 1–39, 2018, [Online]. Available: file:///D:/Fahdel/Kuliah/Bismillah Tugas Akhir/Referens/Panduan-malware.pdf.

G. Halfacree, Raspberry Pi Beginners Guide. 2020.

H. Riahi et al., “Integration of end-user Cloud storage for CMS analysis,” Futur. Gener. Comput. Syst., vol. 78, pp. 1079–1082, 2018, doi: https://doi.org/10.1016/j.future.2017.04.021.

I. Chahid and A. Marzouk, “A Secure IoT Data Integration in Cloud Storage Systems using ABAC Access Control Policy,” Int. J. Adv. Eng. Res. Sci., vol. 4, no. 8, pp. 34–37, 2017, doi: 10.22161/ijaers.4.8.6.

Y. Zhang, C. Dragga, A. C. Arpaci-Dusseau, and R. H. Arpaci-Dusseau, “Viewbox: Integrating local file systems with cloud storage services,” Proc. 12th USENIX Conf. File Storage Technol. FAST 2014, pp. 119–132, 2014.

P. Kaur and M. Mahajan, “Integration of Heterogeneous Cloud Storages through an Intermediate WCF Service,” Int. J. Inf. Eng. Electron. Bus., vol. 7, no. 3, pp. 45–51, 2015, doi: 10.5815/ijieeb.2015.03.07.

A. Hafiz, T. Kurniawan, N. A. Sivi, F. K. Ikhsan, and P. Andhika, “Analisis Celah Keamanan Jaringan Dan Server Menggunakan Snort Intrusion Detection System,” J. Inf. dan Komput., vol. 8, no. 2, pp. 59–66, 2020, doi: 10.35959/jik.v8i2.185.

C. Y. and J. J. K. Kyaw, “Pi-IDS: Evaluation of Open-Source Intrusion Detection Systems on Raspberry Pi 2,” Ieee, pp. 165–170, 2015.




DOI: http://dx.doi.org/10.30646/tikomsin.v10i2.641

Refbacks

  • There are currently no refbacks.



Editorial Office :
TIKomSiN : Jurnal Teknologi Informasi dan Komunikasi Sinar Nusantara
Published by STMIK Sinar Nusantara Surakarta
Address KH Samanhudi 84 - 86 Street, Laweyan Surakarta, Central Java, Indonesia
Postal Code: 57142, Phone & Fax: +62 271 716 500
Website: https://p3m.sinus.ac.id/jurnal/index.php/TIKomSiN
Email: tikomsin @ sinus.ac.id

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

Stats of tikomsin