Main Article Content
Abstract
This research aims to develop a network security system based on the Network Intrusion Detection and Prevention System (NIDPS) that combines Snort and Honeypot, and is integrated with Telegram to provide instant notifications related to network anomalous activity. The research method used is Research and Development (R&D) with the ADDIE model, which includes analysis, design, development, implementation, and evaluation. Snort plays a role in detecting cyber threats through network traffic analysis, while Honeypot serves to trick attackers by mimicking the original server. The fail2ban feature was added to block repeated attack attempts such as brute force. Quality of Service (QoS) testing, which includes throughput, packet loss, delay, and jitter, shows that the system is able to detect a wide range of threats without significantly impacting network performance. The system developed is not only effective in detecting cyberattacks, but also provides real-time alerts through Telegram, thus helping in mitigating potential damage. Further developments are proposed to improve detection against more complex attacks and optimize the system's integration with Telegram for faster notifications.
Keywords
Article Details

This work is licensed under a Creative Commons Attribution 4.0 International License.
References
- Akshay, A. D., Bhushan, A., Anand, N., Khemka, R., & Devi K.A, S. (2020). HONEYPOT: Intrusion Detection System. International Journal of Education, Science, Technology, and Engineering, 3(1), 13–18. https://doi.org/10.36079/lamintang.ijeste-0301.66
- Bellmondo, M. E. (2021). Implementasi monitoring keamanan jaringan menggunakan SNORT dan telegram bot sebagai notification alert.
- Carvalho, M., & Ford, R. (2014). Moving-target defenses for computer networks. IEEE Security and Privacy, 12(2), 73–76. https://doi.org/10.1109/MSP.2014.30
- Febriyanti, P., & Rusmin, S. (2019). Pemanfaatan Notifikasi Telegram Untuk Monitoring Jaringan. Jurnal SIMETRIS, 10(2), 725–732.
- Khadafi, S., Meilani, B. D., & Arifin, S. (2017). Sistem Keamanan Open Cloud Computing Menggunakan Ids (Intrusion Detection System) Dan Ips (Intrusion Prevention System). Jurnal IPTEK, 21(2), 67. https://doi.org/10.31284/j.iptek.2017.v21i2.207
- M.R., A., & P., V. (2022). Review of Cyber Attack Detection: Honeypot System. Webology, 19(1), 5497–5514. https://doi.org/10.14704/web/v19i1/web19370
- Purba, W. W., & Efendi, R. (2021). Perancangan dan analisis sistem keamanan jaringan komputer menggunakan SNORT. Aiti, 17(2), 143–158. https://doi.org/10.24246/aiti.v17i2.143-158
- Utomo, D., Sholeh, M., & Avorizano, A. (2017). Membangun Sistem Mobile Monitoring Keamanan Web Aplikasi Menggunakan Suricata dan Bot Telegram Channel. Seminar Nasional Teknoka, 2(2502), 1–7.