GIMNASTIAR, AHMAD and Heryanto, Ahmad (2025) IMPLEMENTASI INTRUSION DETECTION SYSTEM MENGGUNAKAN SNORT BERBASIS PARALLEL COMPUTING DENGAN METODE LOG DISTRIBUTION. Undergraduate thesis, Sriwijaya University.
| ![[thumbnail of RAMA_56201_09011282126050_cover.jpg]](https://repository.unsri.ac.id/184058/1.hassmallThumbnailVersion/RAMA_56201_09011282126050_cover.jpg)  Preview | Image RAMA_56201_09011282126050_cover.jpg Download (133kB) | Preview | 
| ![[thumbnail of RAMA_56201_09011282126050.pdf]](http://repository.unsri.ac.id/style/images/fileicons/text.png) | Text RAMA_56201_09011282126050.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (3MB) | Request a copy | 
| ![[thumbnail of RAMA_56201_09011282126050_TURNITIN.pdf]](http://repository.unsri.ac.id/style/images/fileicons/text.png) | Text RAMA_56201_09011282126050_TURNITIN.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (8MB) | Request a copy | 
| ![[thumbnail of RAMA_56201_09011282126050_0022018703_01_front_ref.pdf]](http://repository.unsri.ac.id/style/images/fileicons/text.png) | Text RAMA_56201_09011282126050_0022018703_01_front_ref.pdf - Accepted Version Available under License Creative Commons Public Domain Dedication. Download (589kB) | 
| ![[thumbnail of RAMA_56201_09011282126050_0022018703_02.pdf]](http://repository.unsri.ac.id/style/images/fileicons/text.png) | Text RAMA_56201_09011282126050_0022018703_02.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (585kB) | Request a copy | 
| ![[thumbnail of RAMA_56201_09011282126050_0022018703_03.pdf]](http://repository.unsri.ac.id/style/images/fileicons/text.png) | Text RAMA_56201_09011282126050_0022018703_03.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (1MB) | Request a copy | 
| ![[thumbnail of RAMA_56201_09011282126050_0022018703_04.pdf]](http://repository.unsri.ac.id/style/images/fileicons/text.png) | Text RAMA_56201_09011282126050_0022018703_04.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (1MB) | Request a copy | 
| ![[thumbnail of RAMA_56201_09011282126050_0022018703_05.pdf]](http://repository.unsri.ac.id/style/images/fileicons/text.png) | Text RAMA_56201_09011282126050_0022018703_05.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (282kB) | Request a copy | 
| ![[thumbnail of RAMA_56201_09011282126050_0022018703_06_ref.pdf]](http://repository.unsri.ac.id/style/images/fileicons/text.png) | Text RAMA_56201_09011282126050_0022018703_06_ref.pdf - Bibliography Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (259kB) | Request a copy | 
| ![[thumbnail of RAMA_56201_09011282126050_0022018703_07_lamp.pdf]](http://repository.unsri.ac.id/style/images/fileicons/text.png) | Text RAMA_56201_09011282126050_0022018703_07_lamp.pdf - Accepted Version Restricted to Repository staff only Available under License Creative Commons Public Domain Dedication. Download (868kB) | Request a copy | 
Abstract
This research develops an Intrusion Detection System (IDS) based on Snort, optimized using parallel computing with the Message Passing Interface (MPI). The system is built with an architecture consisting of one master and two workers running Snort in parallel to detect ICMP traffic. Detection logs are collected through a shared folder and monitored by the master using a Python script, which also sends automatic email notifications when critical threats are detected. Testing was carried out in four scenarios: without a worker, with 1 worker, 2 workers, and 1 worker with configuration tuning. The results show significant improvements in CPU, memory, and energy efficiency. The 2-worker configuration delivered the best performance, while tuning on the 1-worker setup resulted in the lowest energy consumption. These findings demonstrate that the parallel computing approach can effectively improve IDS performance and is suitable for deployment in small to medium-scale networks.
| Item Type: | Thesis (Undergraduate) | 
|---|---|
| Uncontrolled Keywords: | Intrusion Detection System, Snort, MPI, Parallel Computing, ICMP. | 
| Subjects: | T Technology > T Technology (General) > T10.5-11.9 Communication of technical information > T10.5 General works Information centers T Technology > T Technology (General) > T10.5-11.9 Communication of technical information > T10.7 Technical literature | 
| Divisions: | 09-Faculty of Computer Science > 56201-Computer Systems (S1) | 
| Depositing User: | Ahmad Gimnastiar | 
| Date Deposited: | 17 Sep 2025 01:37 | 
| Last Modified: | 17 Sep 2025 01:37 | 
| URI: | http://repository.unsri.ac.id/id/eprint/184058 | 
Actions (login required)
|  | View Item | 
