Dandy Kalma Rahmatullah, S. M. Nasution, Fairuz Azmi
{"title":"Implementation of low interaction web server honeypot using cubieboard","authors":"Dandy Kalma Rahmatullah, S. M. Nasution, Fairuz Azmi","doi":"10.1109/ICCEREC.2016.7814970","DOIUrl":null,"url":null,"abstract":"Internet technology today is not free from many problems or security holes. This security holes could be exploited by an unauthorized person to steal important data. The case of the attacks occurred because the party that was attacked also did not realize the importance of network security to be applied to the system. Honeypot is a system that is designed to resemble the original production system and is made with the intention to be attacked or compromised. In this research, Cubieboard implemented using low interaction honeypot as a decoy to attract attackers. The result of this research is a low interaction honeypot implemented on embedded system with the form of Cubieboard that can emulates security vulnerabilities such as directory buster brute force, LFI, and RFI with 100% success rate, but still could not emulates SQL Injection vulnerability. One of the result of stress test with 773 samples, obtained average time of 5275 ms, deviation 2067 ms, sample throughput 367.012 per minute, and with median 5381 ms. The stress test is conducted with 50 threads and 10 ramp-ups per second.","PeriodicalId":431878,"journal":{"name":"2016 International Conference on Control, Electronics, Renewable Energy and Communications (ICCEREC)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"23","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 International Conference on Control, Electronics, Renewable Energy and Communications (ICCEREC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCEREC.2016.7814970","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 23
Abstract
Internet technology today is not free from many problems or security holes. This security holes could be exploited by an unauthorized person to steal important data. The case of the attacks occurred because the party that was attacked also did not realize the importance of network security to be applied to the system. Honeypot is a system that is designed to resemble the original production system and is made with the intention to be attacked or compromised. In this research, Cubieboard implemented using low interaction honeypot as a decoy to attract attackers. The result of this research is a low interaction honeypot implemented on embedded system with the form of Cubieboard that can emulates security vulnerabilities such as directory buster brute force, LFI, and RFI with 100% success rate, but still could not emulates SQL Injection vulnerability. One of the result of stress test with 773 samples, obtained average time of 5275 ms, deviation 2067 ms, sample throughput 367.012 per minute, and with median 5381 ms. The stress test is conducted with 50 threads and 10 ramp-ups per second.