Intruder Detection Monitoring System in Computer Networks Using Snort Based Sms Alert Sistem Monitoring Deteksi Penyusup Dalam Jaringan Komputer Menggunakan Snort Berbasis Sms Alert

Main Article Content

Heri Yanto
Febri Hadi


Network security is an important factor in guaranteeing data. Guaranteed security can avoid losses caused by attacks that occur in the network. Administrators play an important role in maintaining data or file security, but administrators cannot at all times monitor the security of the network. This problem can be overcome by adding a system for data traffic detection or called IDS. IDS will be linked by SMS Alert so that administrators can receive notifications of interruptions on the network. In this study, researchers conduct analysis and testing of problems that arise so that it will produce a system that is able to detect attacks or disruptions on the network quickly and can provide warnings to network administrators, so that administrators can take steps to anticipate these disruptions. Attacks can be detected from the pattern of attacks that are in the IDS rule so that intruders who try to enter will be detected and the system will send an SMS notification to the administrator


Download data is not yet available.

Article Details

How to Cite
Yanto, H., & Hadi, F. (2020). Intruder Detection Monitoring System in Computer Networks Using Snort Based Sms Alert. Jurnal KomtekInfo, 7(2), 159-170.
Abstract viewed = 36 times
PDF downloaded = 36 times


[1] H. Memon, I. A. Rahman, M. R. Abdullah, and A. A. A. Azis, "Factors Affecting Construction Cost in Mara Large Construction Project: Perspective of Project Management Consultant," International Journal of Sustainable Construction Engineering & Technology, vol. 1, 4053, 2010.
[2] J. Cohen, “Statistical power analysis for the behavioral sciences,” 2nd ed., 1988.
[3] Z. M. Daud, M. H. Ahmad, and F. Yusof, “Elementary Statistics,” Preatice Hall, Pearson (M) SdnBhd, 2009.
[4] T. Herawan, M.M. Deris, and J.H. Abawajy, “A Rough Set Approach for Selecting a Clustering Attribute,” Knowledge Based Systems, Volume 23, Issue 3, 220231, 2010.