Implementation of a Security System using Snort and Honeypot for Network Attack Detection and Prevention
DOI:
https://doi.org/10.30871/jaic.v10i2.12386Keywords:
snort, honeypot, network security, Intrusion detection systemAbstract
This research is based on the increasing incidence of cyberattacks on network infrastructure, especially in the telecommunications sector, which demands an effective and sustainable network security system. The purpose of this study is to implement Snort as an Intrusion Detection System (IDS) and Honeypot as a decoy system to improve the ability to detect, monitor, and mitigate attacks on server networks. The research method used is action research, which includes the stage of diagnosis, action planning, implementation of actions, and reflection. The system implementation was carried out in a simulation environment using Kali Linux and VirtualBox as the virtualization platform. The test was carried out through attack simulations in the form of port scanning using Nmap, brute force attack using Hydra, and Denial of Service (DoS) simulations. The results showed that Snort was able to detect all attacks tested with a recall rate of 100% while Honeypot managed to redirect attacks and record attacker activity in detail. The integration of Snort and Honeypot has been proven to increase threat visibility and provide additional protection to the main server, making it effective as an open-source-based network security solution.
Downloads
References
[1] Achmad, R., Manullang, E. V., & Sanmas, E. R. (2020). Rancang Bangun Aplikasi Deteksi Dan Penanganan Serangan Ddos Dan Port Scanning Memanfaatkan Snort Pada Jaringan Komputer. Jurnal Teknologi Informasi, 8(1), 44–53.
[2] Azizah Zakiah., Ardhian Ekawijaya., & Eka Angga Laksana. (2019). Implementasi Metode Action Research Untuk Peningkatan Daya Saing UMKM Melalui E-Commerce. Jurnal Penelitian Komunikasi dan Opini Publik, 23(1), 54-62.
[3] Fadhil Raditya., & Jeckson Sidabutar. (2022). Analisis Rules Intrusion Detection Prevention System (IDPS) Suricata untuk Mendeteksi dan Menangkal Aktivitas Crypto Mining pada Jaringan. Jurnal Edukasi dan Penelitian Informatika, 8(2), 348-355.
[4] Februariyanti, H. (2006). Standar dan Manajemen Keamanan Komputer. Jurnal Teknologi Informasi Dinamik, XI(2), 134–142.
[5] Lanskap Keamanan Siber Indonesia. (n.d.).
[6] Laode Ikhwanul Uzlah., Rizal Adi Saputra., & Isnawaty. (2024). Deteksi Serangan Siber Pada Jaringan Komputer Menggunakan Metode Random Forest. Jurnal Mahasiswa Teknik Informatika, 8(3), 2787-2793.
[7] Maulana, A. N., Data, M., & Bakhtiar, F. A. (2025). Perancangan dan Implementasi Snort Rule Set untuk Deteksi Serangan SQL Injection. Jurnal Pengembangan Teknologi Informasi Dan Ilmu Komputer, 9(9).
[8] Meilia Intan Sabila., Muhlis Tahir., Saskia Dwi Mardania., & Rizky Ilham Arifin. (2025). Implementasi Snort Sebagai IDS Dalam Mendeteksi Serangan Port Scanning NMAP Pada Simulasi Jaringan Virtual. Jurnal Mahasiswa Teknik Informatika, 9(2), 6944-6948.
[9] Nugraha, A., & Gustian, D. A. (2021). Deteksi Malware Dridex Menggunakan Signature-based Snort.
[10] Pratama, M. A., Setiawan, H., & Mair, Z. R. (2023). Implementasi Honeypot Sebagai Pendeteksi Serangan Pada Virtual Private Server (VPS). Jurnal Software Engineering and Computational Intelligence, 1(1), 26–39.
[11] Revanza Hafiz Erianto., Wahyu Adi Prabowo., & Trihastuti Yuniati. (2025). Analisis Sistem Keamanan Pada Software-Defined Network Dengan Hybrid
[12] Honeypot Menggunakan Quality Of Service, e-Proceeding of engineering, 12(2), 3350-3358.
[13] Toriyansa Natanegara., Yusuf Muhyidin., & Dayan Singasatia. (2023). Implementasi Honeypot Cowrie dan Snort Sebagai Alat Deteksi Serangan Pada Server. Jurnal Mahasiswa Teknik Informatika, 7(3), 1871-1877.
[14] V.Mohan Patro., & Manas Ranjan Patra. (2014). Augmenting Weighted Average with Confusion Matrix to Enhance Classification Accuracy. Transactions on Machine Learning and Artificial I nt elligence, 2(4), 77-91.
[15] Wijaya, B., & Pratama, A. (2020). Deteksi Penyusupan Pada Server Menggunakan Metode Intrusion Detection System (Ids) Berbasis Snort. Jurnal Sisfokom (Sistem Informasi Dan Komputer), 9(1), 97–101.
[16] Suci Sekar Sari., & Agus Teddyana. (2024). Analisis Efektifitas Rule Snort dalam Mendeteksi Serangan Jaringan. Publikasi Teknik Informatika dan Jaringan, 2(4), 01-15.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2026 Muhammad Dimas, Agus Wijayanto, Dicky Satrio Ikhsan Utomo, Djumhadi Djumhadi

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (Attribution-ShareAlike 4.0 International (CC BY-SA 4.0) ) that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).








