Early Intrusion Detection System (IDS) using Snort and Telegram approach

Aan Erlansari, Funny Farady Coastera, Afief Husamudin


Computer network security is an important factor that must be considered. Guaranteed security can avoid losses caused by attacks on the network security system. The most common prevention against network attacks is to place an administrator, but problems will arise when the administrator is not supervising the network, so to overcome these problems a system called IDS (Intrusion Detection System) can detect suspicious activity on the network through automating the work functions of an administrator. Snort is one of the software that functions to find out the intrusion. Data packets that pass through network traffic will be analyzed. Data packets detected as intrusion will trigger alerts which are then stored in log files. Thus, administrators can find out intrusions that occur on computer networks, and the existence of instant messaging applications can help administrators to get realtime notifications, one of which is using the Telegram application. The results of this study are,  Snort able to detect intrusion of attacks on computer networks and the system can send alerts from snort to administrators via telegram bot in real-time.


IDS (Intrusion Detection System), Monitoring, Network Security, Real-time, Snort, Telegram

Full Text:



N. D. Patel, P. Vrushank, and S. Prof, “An analysis of Network Intrusion Detection System using SNORT,” vol. 1, no. 3, pp. 3–5, 2013.

E. Risyad, M. Data, and E. S. Pramukantoro, “Perbandingan Performa Intrusion Detection System ( IDS ) Snort Dan Suricata Dalam Mendeteksi Serangan TCP SYN Flood,” J. Pengemb. Teknol. Inf. dan Ilmu Komput., vol. 2, no. 9, pp. 2615–2624, 2018.

S. R. Pampattiwar and P. A. Z. Chhangani, “Hybrid Intrusion Detection System Using Snort,” Int. Res. J. Eng. Technol., vol. 4, no. 4, pp. 1–6, 2017, [Online]. Available: https://www.irjet.net/archives/V4/i4/IRJET-V4I4439.pdf.

N. Khamphakdee, N. Benjamas, and S. Saiyod, “Improving intrusion detection system based on snort rules for network probe attacks detection with association rules technique of data mining,” J. ICT Res. Appl., vol. 8, no. 3, pp. 234–250, 2015, doi: 10.5614/itbj.ict.res.appl.2015.8.3.4.

M. H. Kamarudin, C. Maple, and T. Watson, “Hybrid feature selection technique for intrusion detection system,” Int. J. High Perform. Comput. Netw., vol. 13, no. 2, p. 232, 2019, doi: 10.1504/ijhpcn.2019.097503.

A. Kumar and P. Shanmugavadivu, Space of RGB-H-CMYK, vol. 1, no. February. Springer Singapore, 2019.

D. Day and B. Burns, “A Performance Analysis of Snort and Suricata Network Intrusion Detection and Prevention Engines,” ICDS 2011, Fifth Int. Conf. Digit. Soc., no. c, pp. 187–192, 2011, [Online]. Available: http://www.thinkmind.org/index.php?view=article&articleid=icds_2011_7_40_90007.

“Snort_Open_Source_Network_Security.Pdf.” .

library of congress cataloging-in-publication Data, Intrusion Detection Systems with Snort Advanced IDS Techniques Using Snort , Apache , MySQL , PHP , and ACID B RUCE P ERENS ’ O PEN S OURCE S ERIES. 2003.

N. Org, “Port Scanning Techniques,” 2012. http://nmap.org/book/man-port-scanning-techniques.html (accessed Jan. 21, 2020).

J. Detand, R. Bastiaens, B. Grimonprez, and O. Rysman, “The role of prototyping in product development,” Proc. 4th Int. PMI Conf., no. January, p. 8, 2010, [Online]. Available: https://www.researchgate.net/publication/240045178_The_role_of_prototyping_in_product_development.

M. Carr and J. Verner, “Prototyping and Software Development Approaches,” Prototyp. Softw. Dev. Approaches, no. 3, pp. 1–16, 2004, [Online]. Available: https://www.google.com.my/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&uact=8&ved=0CCkQFjAA&url=http://www.cb.cityu.edu.hk/is/getFileWorkingPaper.cfm?id=55&ei=73eDU6aCBo7PlAXNooGQBg&usg=AFQjCNFCEFbDyv9tNk_YuH0VpPfavJPs2A&sig2=wimyHPVpHpp.

R. Ganpatrao Sabale, “Comparative Study of Prototype Model For Software Engineering With System Development Life Cycle,” IOSR J. Eng., vol. 02, no. 07, pp. 21–24, 2012, doi: 10.9790/3021-02722124.

B. Murdoch and A. Lee, “Evaluating the Simulation of Rapid Application Development.”

Y. Yang, X. Li, W. Ke, and Z. Liu, “Automated Prototype Generation From Formal Requirements Model,” IEEE Trans. Reliab., pp. 1–25, 2019, doi: 10.1109/tr.2019.2934348.

M. S. P. Aditama, S. A. Wicaksono, and F. Pradana, “Pembangunan Sistem Informasi Kenaikan Jabatan Fungsional Dosen Universitas Brawijaya,” vol. 2, no. 10, pp. 3538–3544, 2018, [Online]. Available: http://j-ptiik.ub.ac.id/index.php/j-ptiik/article/view/2661/1002.

DOI: https://doi.org/10.24167/sisforma.v7i1.2629


  • There are currently no refbacks.

SISFORMA: Journal of Information Systems | p-ISSN: 2355-8253 | e-ISSN: 2442-7888 | View My Stats

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.