Flooding attack is one of the serious threats of network security on Web servers that resulted in the loss of bandwidth and overload for the user and the service provider web server. The first step to recognizing the network flooding attack is by applying the detection system Intrusion Detection System (IDS) like Snort. Snort is an open source system that can be used to detect flooding attacks using special rules owned by Snort. All activities are recorded on Snort are stored in a log file that records all activity on network traffic. Log files are used at this stage of the investigation to the forensic process model method to find evidence. The results of this research scenario analysis obtained 15 IP Address recorded perform illegal actions on web server. This research has successfully detected flooding attack on the network by performing forensics on web server.

Network_Forensics_For_Detecting_Flooding.1
Load More Related Articles
Load More In Science

Leave a Reply

Your email address will not be published. Required fields are marked *