Implementation of a Security System using Snort and Honeypot for Network Attack Detection and Prevention

Authors

  • Muhammad Dimas Teknologi Informasi, Fakultas Ilmu Komputer, Universitas Mulia
  • Agus Wijayanto Teknologi Informasi, Fakultas Ilmu Komputer, Universitas Mulia
  • Dicky Satrio Ikhsan Utomo Teknologi Informasi, Fakultas Ilmu Komputer, Universitas Mulia
  • Djumhadi Djumhadi Teknologi Informasi, Fakultas Ilmu Komputer, Universitas Mulia

DOI:

https://doi.org/10.30871/jaic.v10i2.12386

Keywords:

snort, honeypot, network security, Intrusion detection system

Abstract

This research is based on the increasing incidence of cyberattacks on network infrastructure, especially in the telecommunications sector, which demands an effective and sustainable network security system. The purpose of this study is to implement Snort as an Intrusion Detection System (IDS) and Honeypot as a decoy system to improve the ability to detect, monitor, and mitigate attacks on server networks. The research method used is action research, which includes the stage of diagnosis, action planning, implementation of actions, and reflection. The system implementation was carried out in a simulation environment using Kali Linux and VirtualBox as the virtualization platform. The test was carried out through attack simulations in the form of port scanning using Nmap, brute force attack using Hydra, and Denial of Service (DoS) simulations. The results showed that Snort was able to detect all attacks tested with a recall rate of 100% while Honeypot managed to redirect attacks and record attacker activity in detail. The integration of Snort and Honeypot has been proven to increase threat visibility and provide additional protection to the main server, making it effective as an open-source-based network security solution.

Downloads

Download data is not yet available.

References

[1] Achmad, R., Manullang, E. V., & Sanmas, E. R. (2020). Rancang Bangun Aplikasi Deteksi Dan Penanganan Serangan Ddos Dan Port Scanning Memanfaatkan Snort Pada Jaringan Komputer. Jurnal Teknologi Informasi, 8(1), 44–53.

[2] Azizah Zakiah., Ardhian Ekawijaya., & Eka Angga Laksana. (2019). Implementasi Metode Action Research Untuk Peningkatan Daya Saing UMKM Melalui E-Commerce. Jurnal Penelitian Komunikasi dan Opini Publik, 23(1), 54-62.

[3] Fadhil Raditya., & Jeckson Sidabutar. (2022). Analisis Rules Intrusion Detection Prevention System (IDPS) Suricata untuk Mendeteksi dan Menangkal Aktivitas Crypto Mining pada Jaringan. Jurnal Edukasi dan Penelitian Informatika, 8(2), 348-355.

[4] Februariyanti, H. (2006). Standar dan Manajemen Keamanan Komputer. Jurnal Teknologi Informasi Dinamik, XI(2), 134–142.

[5] Lanskap Keamanan Siber Indonesia. (n.d.).

[6] Laode Ikhwanul Uzlah., Rizal Adi Saputra., & Isnawaty. (2024). Deteksi Serangan Siber Pada Jaringan Komputer Menggunakan Metode Random Forest. Jurnal Mahasiswa Teknik Informatika, 8(3), 2787-2793.

[7] Maulana, A. N., Data, M., & Bakhtiar, F. A. (2025). Perancangan dan Implementasi Snort Rule Set untuk Deteksi Serangan SQL Injection. Jurnal Pengembangan Teknologi Informasi Dan Ilmu Komputer, 9(9).

[8] Meilia Intan Sabila., Muhlis Tahir., Saskia Dwi Mardania., & Rizky Ilham Arifin. (2025). Implementasi Snort Sebagai IDS Dalam Mendeteksi Serangan Port Scanning NMAP Pada Simulasi Jaringan Virtual. Jurnal Mahasiswa Teknik Informatika, 9(2), 6944-6948.

[9] Nugraha, A., & Gustian, D. A. (2021). Deteksi Malware Dridex Menggunakan Signature-based Snort.

[10] Pratama, M. A., Setiawan, H., & Mair, Z. R. (2023). Implementasi Honeypot Sebagai Pendeteksi Serangan Pada Virtual Private Server (VPS). Jurnal Software Engineering and Computational Intelligence, 1(1), 26–39.

[11] Revanza Hafiz Erianto., Wahyu Adi Prabowo., & Trihastuti Yuniati. (2025). Analisis Sistem Keamanan Pada Software-Defined Network Dengan Hybrid

[12] Honeypot Menggunakan Quality Of Service, e-Proceeding of engineering, 12(2), 3350-3358.

[13] Toriyansa Natanegara., Yusuf Muhyidin., & Dayan Singasatia. (2023). Implementasi Honeypot Cowrie dan Snort Sebagai Alat Deteksi Serangan Pada Server. Jurnal Mahasiswa Teknik Informatika, 7(3), 1871-1877.

[14] V.Mohan Patro., & Manas Ranjan Patra. (2014). Augmenting Weighted Average with Confusion Matrix to Enhance Classification Accuracy. Transactions on Machine Learning and Artificial I nt elligence, 2(4), 77-91.

[15] Wijaya, B., & Pratama, A. (2020). Deteksi Penyusupan Pada Server Menggunakan Metode Intrusion Detection System (Ids) Berbasis Snort. Jurnal Sisfokom (Sistem Informasi Dan Komputer), 9(1), 97–101.

[16] Suci Sekar Sari., & Agus Teddyana. (2024). Analisis Efektifitas Rule Snort dalam Mendeteksi Serangan Jaringan. Publikasi Teknik Informatika dan Jaringan, 2(4), 01-15.

Downloads

Published

2026-04-23

How to Cite

[1]
M. Dimas, A. Wijayanto, D. S. Ikhsan Utomo, and D. Djumhadi, “Implementation of a Security System using Snort and Honeypot for Network Attack Detection and Prevention”, JAIC, vol. 10, no. 2, pp. 1872–1877, Apr. 2026.

Issue

Section

Articles

Similar Articles

<< < 3 4 5 6 7 > >> 

You may also start an advanced similarity search for this article.