Design and Implement of Intrusion Prevention System Based on Snort and IP Tables

Design and Implement of Intrusion Prevention System Based on Snort and IP Tables

Authors

  • Lutfi Dwi Naldi Informatics Department Faculty of Engineering Universitas Islam Riau, Pekanbaru, Indonesia
  • Apro Siswanto Informatics Department Faculty of Engineering Universitas Islam Riau, Pekanbaru, Indonesia

DOI:

https://doi.org/10.24191/jcrinn.v10i1.498

Keywords:

Network Security, Intrusion Detection System, Intrusion Prevention System, Snort, Wireless Security

Abstract

In the era of rapid advancement in communication and computer technology, network security has become a crucial issue, especially in wireless networks. Unlimited internet access can cause security threats such as Distributed Denial of Service (DDoS) attacks, spoofing, and port scanning. This study aims to design and implement a Snort-based Intrusion Prevention System (IPS) combined with IP Tables to improve the security of wireless local area networks (WLANs). The proposed system not only detects but also prevents attacks in real-time by blocking malicious network traffic. Testing was carried out using penetration testing with various attack scenarios, including ARP spoofing and DDoS, which showed that this system successfully identified and blocked attacker access. The results of this study were measured based on the system's ability to reduce wireless network threats, which showed a significant increase in threat mitigation. This system provides a more optimal security solution compared to traditional intrusion detection systems that are only detection. Overall, the implementation of this system is able to increase the efficiency of attack prevention and show success in reducing the risk of illegal network access on WLANs.

Downloads

Download data is not yet available.

References

Alamsyah, H., Riska, A. A. A., & Al Akbar, A. (2020). Analisa Keamanan Jaringan Menggunakan Network Intrusion Detection and Prevention System. JOINTECS (Journal of Information Technology and Computer Science), 5(1), 17.

Asian, J., & Erlangga, D. (2023). Data exfiltration anomaly detection on enterprise networks using deep packet inspection. MATRIK: Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer, 22(3), 665-672. https://doi.org/10.30812/matrik.v22i3.3089

Dao, Q. D. (2024). Research and deploy a network attack detection and warning system using snort [Doctoral dissertation, Vietnam-Korea University of Information and Communication Technology].

Evizal, A. K., Apri, S., & Abdul, S. (2016). Performance analysis of wireless LAN 802.11 n standard for e-Learning. In the Fourth International Conference on Information and Communication Technologies (ICoICT) (pp 1-6). IEEE Xplore. https://doi.org/10.1109/ICoICT.2016.7571948

Garlinska, M., Osial, M., Proniewska, K., & Pregowska, A. (2023). The influence of emerging technologies on distance education. Electronics, 12(7), 1550. https://doi.org/10.3390/electronics12071550

Green, J. J. (2019). The effects of today's technology on student learning in higher education. Baker College (Michigan).

Hwang, H., Jung, G., Sohn, K., & Park, S. (2008). A study on MITM (Man in the Middle) vulnerability in wireless network using 802.1 X and EAP. In the 2008 International Conference on Information Science and Security (ICISS 2008) (pp. 164-170). https://doi.org/10.1109/ICISS.2008.10

Kizza, J. M. (2024). System intrusion detection and prevention guide to computer network security. In Guide to Computer Network Security (pp. 295-323). Springer. https://doi.org/10.1007/978-3-031-47549-8_13

Nathasia, N. D. (2018). Implementasi metode intrusion detection systems (IDS) dan intrusion prevention systems (IPS) berbasis snort server untuk keamanan jaringan LAN. Jurnal Informatika, 18(1), 71-84.

Palamà, I., Amici, A., Bellicini, G., Gringoli, F., Pedretti, F., & Bianchi, G. (2023). Attacks and vulnerabilities of Wi-Fi Enterprise networks: User security awareness assessment through credential stealing attack experiments. Computer Communications, 212, 129-140. https://doi.org/10.1016/j.comcom.2023.09.031

Pandey, A., & Saini, J. R. (2014). Attacks & defense mechanisms for TCP/IP based protocols. International Journal of Engineering Innovations and Research, 3(1), 17-23.

Pour, M. S., Nader, C., Friday, K., & Bou-Harb, E. (2023). A comprehensive survey of recent internet measurement techniques for cyber security. Computers & Security, 128, 103123. https://doi.org/10.1016/j.cose.2023.103123

Radhakrishna, K. S., Lee, Y., You, K., Thiruvarasu, K., & Ng, S. (2023). Study of obstacles effect on mobile network and WLAN signal strength. International Journal of Electronics and Telecommunications, 69(1), 155-161. https://doi.org/10.24425/ijet.2023.144345

Rangaraju, S. (2023). AI sentry: Reinventing cybersecurity through intelligent threat detection. EPH-International Journal of Science and Engineering, 9(3), 30-35. https://doi.org/10.53555/ephijse.v9i3.211

Siswanto, A., Evizal, E., & Kusmeli, K. (2019). Analisa dan perancangan jaringan wireless Local Area Network pada SMK Negeri 1 Rengat Barat. IT Journal Research and Development, 3(2), 1-8. https://doi.org/10.25299/itjrd.2019.vol3(2).2096

Thankappan, M., Rifà-Pous, H., & Garrigues, C. (2024). A signature-based wireless intrusion detection system framework for multi-channel man-in-the-middle attacks against protected Wi-Fi networks. IEEE Access, 12, 23096-23121. https://doi.org/10.1109/ACCESS.2024.3362803

Tyagi, A. K., Dananjayan, S., Agarwal, D., & Thariq Ahmed, H. F. (2023). Blockchain—Internet of Things applications: Opportunities and challenges for industry 4.0 and society 5.0. Sensors, 23(2), 947. https://doi.org/10.3390/s23020947

Vamshi Krishna, K., & Ganesh Reddy, K. (2023). Classification of distributed denial of service attacks in VANET: A survey. Wireless Personal Communications, 132(2), 933-964. https://doi.org/10.1007/s11277-023-10643-6

Widiyanto, W. W. (2022). SIMRS Network Security Simulation Using Snort IDS and IPS Methods. Indonesian of Health Information Management Journal (INOHIM), 10(1), 10-17. https://doi.org/10.47007/inohim.v10i1.396

Widodo, R., & Riadi, I. (2021). Intruder detection systems on computer networks using host based intrusion detection system techniques. Buletin Ilmiah Sarjana Teknik Elektro, 3(1), 21-30. https://doi.org/10.12928/biste.v3i1.1752

Zhou, Z., Chen, Z., Zhou, T., & Guan, X. (2010). The study on network intrusion detection system of Snort. In the 2010 International Conference on Networking and Digital Society (pp. 194-196). IEEE Xplore. http://doi.org/10.1109/ICNDS.2010.5479341

Downloads

Published

2025-03-01

How to Cite

Lutfi Dwi Naldi, & Apro Siswanto. (2025). Design and Implement of Intrusion Prevention System Based on Snort and IP Tables. Journal of Computing Research and Innovation, 10(1), 89–97. https://doi.org/10.24191/jcrinn.v10i1.498

Issue

Section

General Computing

Similar Articles

You may also start an advanced similarity search for this article.

Loading...