<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://onnocenter.or.id/wiki/index.php?action=history&amp;feed=atom&amp;title=KI%3A_PRAKTEK_5%3A_Intrusion_Detection_Dasar</id>
	<title>KI: PRAKTEK 5: Intrusion Detection Dasar - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://onnocenter.or.id/wiki/index.php?action=history&amp;feed=atom&amp;title=KI%3A_PRAKTEK_5%3A_Intrusion_Detection_Dasar"/>
	<link rel="alternate" type="text/html" href="https://onnocenter.or.id/wiki/index.php?title=KI:_PRAKTEK_5:_Intrusion_Detection_Dasar&amp;action=history"/>
	<updated>2026-05-04T09:39:58Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.4</generator>
	<entry>
		<id>https://onnocenter.or.id/wiki/index.php?title=KI:_PRAKTEK_5:_Intrusion_Detection_Dasar&amp;diff=73171&amp;oldid=prev</id>
		<title>Onnowpurbo at 01:15, 23 January 2026</title>
		<link rel="alternate" type="text/html" href="https://onnocenter.or.id/wiki/index.php?title=KI:_PRAKTEK_5:_Intrusion_Detection_Dasar&amp;diff=73171&amp;oldid=prev"/>
		<updated>2026-01-23T01:15:53Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;a href=&quot;https://onnocenter.or.id/wiki/index.php?title=KI:_PRAKTEK_5:_Intrusion_Detection_Dasar&amp;amp;diff=73171&amp;amp;oldid=73170&quot;&gt;Show changes&lt;/a&gt;</summary>
		<author><name>Onnowpurbo</name></author>
	</entry>
	<entry>
		<id>https://onnocenter.or.id/wiki/index.php?title=KI:_PRAKTEK_5:_Intrusion_Detection_Dasar&amp;diff=73170&amp;oldid=prev</id>
		<title>Onnowpurbo at 00:48, 23 January 2026</title>
		<link rel="alternate" type="text/html" href="https://onnocenter.or.id/wiki/index.php?title=KI:_PRAKTEK_5:_Intrusion_Detection_Dasar&amp;diff=73170&amp;oldid=prev"/>
		<updated>2026-01-23T00:48:35Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left diff-editfont-monospace&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 00:48, 23 January 2026&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l1&quot; &gt;Line 1:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;PRAKTEK 5: Intrusion Detection Dasar&lt;/del&gt;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt; &lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Tujuan&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;==&lt;/ins&gt;Tujuan&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;==&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Setelah praktikum ini, mahasiswa mampu mendeteksi serangan sederhana di jaringan, memahami jenis alert IDS, dan menafsirkan makna teknis di balik alert, bukan hanya membaca log secara pasif.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Setelah praktikum ini, mahasiswa mampu mendeteksi serangan sederhana di jaringan, memahami jenis alert IDS, dan menafsirkan makna teknis di balik alert, bukan hanya membaca log secara pasif.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Yang dilatih bukan hanya “menjalankan tool”, tetapi cara berpikir security analyst:&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Yang dilatih bukan hanya “menjalankan tool”, tetapi cara berpikir security analyst:&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Apa yang normal?&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;* &lt;/ins&gt;Apa yang normal?&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Apa yang mencurigakan?&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;* &lt;/ins&gt;Apa yang mencurigakan?&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Kenapa ini dianggap serangan?&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;* &lt;/ins&gt;Kenapa ini dianggap serangan?&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Konsep Inti (Wajib Dipahami)&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt; &lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;1. Apa itu Intrusion Detection System (IDS)&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;==&lt;/ins&gt;Konsep Inti (Wajib Dipahami)&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;==&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;===&lt;/ins&gt;1. Apa itu Intrusion Detection System (IDS)&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;===&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;IDS adalah sistem yang mengamati trafik atau log, lalu memberi peringatan (alert) ketika menemukan pola yang dianggap berbahaya.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;IDS adalah sistem yang mengamati trafik atau log, lalu memberi peringatan (alert) ketika menemukan pola yang dianggap berbahaya.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;IDS ≠ Firewall&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt; &lt;/ins&gt;IDS ≠ Firewall&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Firewall mencegah, IDS mendeteksi.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt; &lt;/ins&gt;Firewall mencegah, IDS mendeteksi.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;2. Signature-based vs Anomaly-based Detection&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt; &lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;===&lt;/ins&gt;2. Signature-based vs Anomaly-based Detection&lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;===&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Signature-based Detection&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Signature-based Detection&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Mencocokkan trafik dengan pola serangan yang sudah dikenal.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Mencocokkan trafik dengan pola serangan yang sudah dikenal.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Onnowpurbo</name></author>
	</entry>
	<entry>
		<id>https://onnocenter.or.id/wiki/index.php?title=KI:_PRAKTEK_5:_Intrusion_Detection_Dasar&amp;diff=73164&amp;oldid=prev</id>
		<title>Onnowpurbo: Created page with &quot;PRAKTEK 5: Intrusion Detection Dasar Tujuan Setelah praktikum ini, mahasiswa mampu mendeteksi serangan sederhana di jaringan, memahami jenis alert IDS, dan menafsirkan makna t...&quot;</title>
		<link rel="alternate" type="text/html" href="https://onnocenter.or.id/wiki/index.php?title=KI:_PRAKTEK_5:_Intrusion_Detection_Dasar&amp;diff=73164&amp;oldid=prev"/>
		<updated>2026-01-22T22:46:35Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;PRAKTEK 5: Intrusion Detection Dasar Tujuan Setelah praktikum ini, mahasiswa mampu mendeteksi serangan sederhana di jaringan, memahami jenis alert IDS, dan menafsirkan makna t...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;PRAKTEK 5: Intrusion Detection Dasar&lt;br /&gt;
Tujuan&lt;br /&gt;
Setelah praktikum ini, mahasiswa mampu mendeteksi serangan sederhana di jaringan, memahami jenis alert IDS, dan menafsirkan makna teknis di balik alert, bukan hanya membaca log secara pasif.&lt;br /&gt;
Yang dilatih bukan hanya “menjalankan tool”, tetapi cara berpikir security analyst:&lt;br /&gt;
Apa yang normal?&lt;br /&gt;
Apa yang mencurigakan?&lt;br /&gt;
Kenapa ini dianggap serangan?&lt;br /&gt;
Konsep Inti (Wajib Dipahami)&lt;br /&gt;
1. Apa itu Intrusion Detection System (IDS)&lt;br /&gt;
IDS adalah sistem yang mengamati trafik atau log, lalu memberi peringatan (alert) ketika menemukan pola yang dianggap berbahaya.&lt;br /&gt;
IDS ≠ Firewall&lt;br /&gt;
Firewall mencegah, IDS mendeteksi.&lt;br /&gt;
2. Signature-based vs Anomaly-based Detection&lt;br /&gt;
Signature-based Detection&lt;br /&gt;
Mencocokkan trafik dengan pola serangan yang sudah dikenal.&lt;br /&gt;
Contoh:&lt;br /&gt;
Request HTTP mengandung /etc/passwd&lt;br /&gt;
Scan port berurutan&lt;br /&gt;
Payload mengandung shellcode&lt;br /&gt;
Kelebihan&lt;br /&gt;
Akurat&lt;br /&gt;
Sedikit false positive&lt;br /&gt;
Kekurangan&lt;br /&gt;
Tidak bisa mendeteksi serangan baru (zero-day)&lt;br /&gt;
Anomaly-based Detection&lt;br /&gt;
Mencari perilaku yang menyimpang dari kebiasaan normal.&lt;br /&gt;
Contoh:&lt;br /&gt;
1000 request dalam 1 detik&lt;br /&gt;
Login gagal berulang&lt;br /&gt;
Pola waktu akses tidak wajar&lt;br /&gt;
Kelebihan&lt;br /&gt;
Bisa mendeteksi serangan baru&lt;br /&gt;
Cocok untuk unknown attack&lt;br /&gt;
Kekurangan&lt;br /&gt;
Banyak false positive&lt;br /&gt;
Perlu baseline yang baik&lt;br /&gt;
Di dunia nyata, IDS modern menggabungkan dua pendekatan ini.&lt;br /&gt;
Tools yang Digunakan (Open Source)&lt;br /&gt;
Kita akan menggunakan dua pendekatan nyata:&lt;br /&gt;
Snort → contoh signature-based IDS&lt;br /&gt;
Python Log Parser → simulasi anomaly-based IDS&lt;br /&gt;
Semua dijalankan di:&lt;br /&gt;
Ubuntu Linux 24.04&lt;br /&gt;
Tanpa software proprietary&lt;br /&gt;
BAGIAN A — IDS Signature-Based dengan Snort&lt;br /&gt;
Step 1 — Instalasi Snort (Ubuntu 24.04)&lt;br /&gt;
&lt;br /&gt;
sudo apt update&lt;br /&gt;
sudo apt install -y snort&lt;br /&gt;
Saat instalasi:&lt;br /&gt;
Pilih interface jaringan (misalnya eth0 atau ens33)&lt;br /&gt;
HOME_NET → isi dengan jaringan lokal, contoh:&lt;br /&gt;
192.168.1.0/24&lt;br /&gt;
Verifikasi:&lt;br /&gt;
snort -V&lt;br /&gt;
Step 2 — Menjalankan Snort dalam Mode IDS&lt;br /&gt;
Gunakan mode console agar alert langsung terlihat:&lt;br /&gt;
sudo snort -A console -q -c /etc/snort/snort.conf -i eth0&lt;br /&gt;
Keterangan:&lt;br /&gt;
-A console → tampilkan alert di terminal&lt;br /&gt;
-q → quiet mode&lt;br /&gt;
-c → file konfigurasi&lt;br /&gt;
-i → interface jaringan&lt;br /&gt;
Step 3 — Membuat Rule IDS Sederhana (Signature)&lt;br /&gt;
Buka file rule lokal:&lt;br /&gt;
sudo nano /etc/snort/rules/local.rules&lt;br /&gt;
Tambahkan rule berikut:&lt;br /&gt;
alert icmp any any -&amp;gt; any any (msg:&amp;quot;ICMP Ping Detected&amp;quot;; sid:1000001; rev:1;)&lt;br /&gt;
Reload Snort:&lt;br /&gt;
sudo systemctl restart snort&lt;br /&gt;
Step 4 — Simulasi Serangan Sederhana (Ping Flood)&lt;br /&gt;
Dari mesin lain (atau VM kedua):&lt;br /&gt;
ping -c 5 IP_TARGET&lt;br /&gt;
Hasil yang Diharapkan&lt;br /&gt;
Snort akan menampilkan alert:&lt;br /&gt;
[**] ICMP Ping Detected [**]&lt;br /&gt;
&lt;br /&gt;
Interpretasi&lt;br /&gt;
IDS mendeteksi trafik ICMP&lt;br /&gt;
Bukan serangan fatal, tapi indikasi reconnaissance&lt;br /&gt;
Step 5 — Simulasi Serangan Port Scanning&lt;br /&gt;
Install nmap:&lt;br /&gt;
sudo apt install -y nmap&lt;br /&gt;
Lakukan scan:&lt;br /&gt;
nmap -sS IP_TARGET&lt;br /&gt;
Snort akan memunculkan alert scanning jika rule aktif.&lt;br /&gt;
Output Snort&lt;br /&gt;
Alert di terminal&lt;br /&gt;
Log di /var/log/snort/alert&lt;br /&gt;
Contoh log:&lt;br /&gt;
[1:1000001:1] ICMP Ping Detected&lt;br /&gt;
BAGIAN B — IDS Sederhana dengan Python (Anomaly-Based)&lt;br /&gt;
Sekarang kita tidak pakai signature, tapi analisis perilaku log.&lt;br /&gt;
Tujuan&lt;br /&gt;
Mendeteksi:&lt;br /&gt;
Terlalu banyak request&lt;br /&gt;
Pola akses tidak normal&lt;br /&gt;
Brute-force login&lt;br /&gt;
Step 1 — Contoh Log yang Dianalisis&lt;br /&gt;
Misalnya log web server (access.log):&lt;br /&gt;
192.168.1.10 - - [20/Jan/2026:10:00:01] &amp;quot;GET /login HTTP/1.1&amp;quot; 200&lt;br /&gt;
192.168.1.10 - - [20/Jan/2026:10:00:02] &amp;quot;GET /login HTTP/1.1&amp;quot; 401&lt;br /&gt;
192.168.1.10 - - [20/Jan/2026:10:00:03] &amp;quot;GET /login HTTP/1.1&amp;quot; 401&lt;br /&gt;
192.168.1.10 - - [20/Jan/2026:10:00:04] &amp;quot;GET /login HTTP/1.1&amp;quot; 401&lt;br /&gt;
&lt;br /&gt;
Step 2 — Script Python IDS Sederhana&lt;br /&gt;
Buat file ids_log_parser.py:&lt;br /&gt;
from collections import defaultdict&lt;br /&gt;
&lt;br /&gt;
THRESHOLD = 3&lt;br /&gt;
ip_counter = defaultdict(int)&lt;br /&gt;
&lt;br /&gt;
with open(&amp;quot;access.log&amp;quot;, &amp;quot;r&amp;quot;) as log:&lt;br /&gt;
    for line in log:&lt;br /&gt;
        ip = line.split()[0]&lt;br /&gt;
        ip_counter[ip] += 1&lt;br /&gt;
&lt;br /&gt;
for ip, count in ip_counter.items():&lt;br /&gt;
    if count &amp;gt; THRESHOLD:&lt;br /&gt;
        print(f&amp;quot;[ALERT] Suspicious activity from {ip} ({count} requests)&amp;quot;)&lt;br /&gt;
Jalankan:&lt;br /&gt;
python3 ids_log_parser.py&lt;br /&gt;
Interpretasi Output&lt;br /&gt;
[ALERT] Suspicious activity from 192.168.1.10 (4 requests)&lt;br /&gt;
Maknanya:&lt;br /&gt;
IP melakukan request berulang&lt;br /&gt;
Bisa indikasi brute-force, bot, atau scanner&lt;br /&gt;
Diskusi Keamanan (Penting)&lt;br /&gt;
Apakah ini serangan pasti? → Tidak&lt;br /&gt;
Apakah ini indikasi awal? → Ya&lt;br /&gt;
Apakah perlu investigasi lanjut? → Wajib&lt;br /&gt;
IDS tidak mengambil keputusan, IDS memberi sinyal.&lt;br /&gt;
Manusialah yang memutuskan.&lt;br /&gt;
Output Praktikum (Yang Dikumpulkan)&lt;br /&gt;
Mahasiswa wajib menyerahkan:&lt;br /&gt;
Log alert Snort&lt;br /&gt;
Output script Python&lt;br /&gt;
Interpretasi singkat, menjawab:&lt;br /&gt;
Serangan apa?&lt;br /&gt;
Bukti teknisnya?&lt;br /&gt;
Dampak jika tidak terdeteksi?&lt;br /&gt;
Kesimpulan&lt;br /&gt;
Security bukan tentang tool&lt;br /&gt;
IDS bukan alat ajaib&lt;br /&gt;
Yang penting adalah:&lt;br /&gt;
Visibility&lt;br /&gt;
Log&lt;br /&gt;
Reasoning&lt;br /&gt;
Jika kamu bisa menjelaskan KENAPA sebuah alert muncul,&lt;br /&gt;
berarti kamu sudah berpikir seperti security engineer.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Pranala Menarik==&lt;br /&gt;
&lt;br /&gt;
* [[Keamanan Informasi: Kuliah]]&lt;/div&gt;</summary>
		<author><name>Onnowpurbo</name></author>
	</entry>
</feed>