PACKET INSPECTION DAN LOGGING SYSTEM ON OPENFLOW NETWORK WITH RYU, SNORT, AND ELASTIC STACK

Problems arise in the network such as capacity and attack frequently can be solved by analyzing the data from the network itself. The information gathered from the network can serve as a basis or support for solving problems in the network and making design or business decisions. The action taken ba...

Full description

Saved in:
Bibliographic Details
Main Author: Purwa Sentika, Bagas
Format: Final Project
Language:Indonesia
Online Access:https://digilib.itb.ac.id/gdl/view/48008
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Institut Teknologi Bandung
Language: Indonesia
id id-itb.:48008
spelling id-itb.:480082020-06-25T12:32:57ZPACKET INSPECTION DAN LOGGING SYSTEM ON OPENFLOW NETWORK WITH RYU, SNORT, AND ELASTIC STACK Purwa Sentika, Bagas Indonesia Final Project OpenFlow, Ryu, packet inspection and logging, snort, Elastic stack. INSTITUT TEKNOLOGI BANDUNG https://digilib.itb.ac.id/gdl/view/48008 Problems arise in the network such as capacity and attack frequently can be solved by analyzing the data from the network itself. The information gathered from the network can serve as a basis or support for solving problems in the network and making design or business decisions. The action taken based on the information is expected to be more effective and efficient in technical and cost aspects. Network data is extracted by inspecting and collecting traffic in the network to a centralized logging system. The gathered data can be analyzed in the future to extract relevant information to the network administrator. The final project has the objective of implementing a packet inspection and logging system in OpenFlow network integrating Ryu, Snort, and Elastic stack. The approach in this project is iterative design, implementation, and testing to meet the objective and predefined specifications. Three scenarios are adopted to test the capabilities of the system: packet logging, malware, and Denial-of-Service attack. Based on the first scenario, the system is able to decode packets to inspect the information in the packet data unit and store the information in the data store. In the malware scenario, the system can detect malware traffic traversing in the network using signature detection. And in DDoS testing scenario, the system is able to visualize distributions of traffic volume thus the administrator could identify possible DDoS attack attempts. Based on the testing, it is concluded that the objectives are met and the system is functioning as intended. By opening the final project to contributions, the project is expected to solve other problems related to the network in other scenarios. text
institution Institut Teknologi Bandung
building Institut Teknologi Bandung Library
continent Asia
country Indonesia
Indonesia
content_provider Institut Teknologi Bandung
collection Digital ITB
language Indonesia
description Problems arise in the network such as capacity and attack frequently can be solved by analyzing the data from the network itself. The information gathered from the network can serve as a basis or support for solving problems in the network and making design or business decisions. The action taken based on the information is expected to be more effective and efficient in technical and cost aspects. Network data is extracted by inspecting and collecting traffic in the network to a centralized logging system. The gathered data can be analyzed in the future to extract relevant information to the network administrator. The final project has the objective of implementing a packet inspection and logging system in OpenFlow network integrating Ryu, Snort, and Elastic stack. The approach in this project is iterative design, implementation, and testing to meet the objective and predefined specifications. Three scenarios are adopted to test the capabilities of the system: packet logging, malware, and Denial-of-Service attack. Based on the first scenario, the system is able to decode packets to inspect the information in the packet data unit and store the information in the data store. In the malware scenario, the system can detect malware traffic traversing in the network using signature detection. And in DDoS testing scenario, the system is able to visualize distributions of traffic volume thus the administrator could identify possible DDoS attack attempts. Based on the testing, it is concluded that the objectives are met and the system is functioning as intended. By opening the final project to contributions, the project is expected to solve other problems related to the network in other scenarios.
format Final Project
author Purwa Sentika, Bagas
spellingShingle Purwa Sentika, Bagas
PACKET INSPECTION DAN LOGGING SYSTEM ON OPENFLOW NETWORK WITH RYU, SNORT, AND ELASTIC STACK
author_facet Purwa Sentika, Bagas
author_sort Purwa Sentika, Bagas
title PACKET INSPECTION DAN LOGGING SYSTEM ON OPENFLOW NETWORK WITH RYU, SNORT, AND ELASTIC STACK
title_short PACKET INSPECTION DAN LOGGING SYSTEM ON OPENFLOW NETWORK WITH RYU, SNORT, AND ELASTIC STACK
title_full PACKET INSPECTION DAN LOGGING SYSTEM ON OPENFLOW NETWORK WITH RYU, SNORT, AND ELASTIC STACK
title_fullStr PACKET INSPECTION DAN LOGGING SYSTEM ON OPENFLOW NETWORK WITH RYU, SNORT, AND ELASTIC STACK
title_full_unstemmed PACKET INSPECTION DAN LOGGING SYSTEM ON OPENFLOW NETWORK WITH RYU, SNORT, AND ELASTIC STACK
title_sort packet inspection dan logging system on openflow network with ryu, snort, and elastic stack
url https://digilib.itb.ac.id/gdl/view/48008
_version_ 1822927798571892736