利用蜜罐实现网络服务器安全系统

Faldi Faldi, Dinamita Romadoni, M. T. Sumadi
{"title":"利用蜜罐实现网络服务器安全系统","authors":"Faldi Faldi, Dinamita Romadoni, M. T. Sumadi","doi":"10.33387/jiko.v6i2.6385","DOIUrl":null,"url":null,"abstract":"Network Server security is an important aspect of ensuring the integrity and availability of information systems. This research aims to implement network Server security at Muhammadiyah University of East Kalimantan using Honeypot technology. Honeypots are used to attract the attention of attacks and monitor suspicious activities on the network. The research method used is NDLC (Network Development Life Cycle), which includes the design and implementation of Honeypots, as well as the collection and analysis of detected attack data. The research results show that by using three attack techniques, namely Slowloris attack with a Honeypot processing time of 2 seconds and Snort processing time of 180 seconds, GoldenEye attack with a Honeypot processing time of 2 seconds and Snort processing time of 180 seconds, and LOIC tools with a Snort processing time of 180 seconds. Honeypots cannot identify DDoS attacks because they focus more on attacks such as penetration attempts or other suspicious activities.","PeriodicalId":243297,"journal":{"name":"JIKO (Jurnal Informatika dan Komputer)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"THE IMPLEMENTATION OF NETWORK SERVER SECURITY SYSTEM USING HONEYPOT\",\"authors\":\"Faldi Faldi, Dinamita Romadoni, M. T. Sumadi\",\"doi\":\"10.33387/jiko.v6i2.6385\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Network Server security is an important aspect of ensuring the integrity and availability of information systems. This research aims to implement network Server security at Muhammadiyah University of East Kalimantan using Honeypot technology. Honeypots are used to attract the attention of attacks and monitor suspicious activities on the network. The research method used is NDLC (Network Development Life Cycle), which includes the design and implementation of Honeypots, as well as the collection and analysis of detected attack data. The research results show that by using three attack techniques, namely Slowloris attack with a Honeypot processing time of 2 seconds and Snort processing time of 180 seconds, GoldenEye attack with a Honeypot processing time of 2 seconds and Snort processing time of 180 seconds, and LOIC tools with a Snort processing time of 180 seconds. Honeypots cannot identify DDoS attacks because they focus more on attacks such as penetration attempts or other suspicious activities.\",\"PeriodicalId\":243297,\"journal\":{\"name\":\"JIKO (Jurnal Informatika dan Komputer)\",\"volume\":\"58 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-08-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"JIKO (Jurnal Informatika dan Komputer)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.33387/jiko.v6i2.6385\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"JIKO (Jurnal Informatika dan Komputer)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.33387/jiko.v6i2.6385","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

网络服务器安全是保证信息系统完整性和可用性的重要方面。本研究旨在利用Honeypot技术在东加里曼丹的Muhammadiyah大学实现网络服务器安全。蜜罐用于吸引攻击者的注意力,监控网络中的可疑活动。本文采用NDLC (Network Development Life Cycle,网络开发生命周期)研究方法,包括honeypot的设计与实现,以及检测到的攻击数据的收集与分析。研究结果表明,通过使用三种攻击技术,即Honeypot处理时间为2秒、Snort处理时间为180秒的Slowloris攻击、Honeypot处理时间为2秒、Snort处理时间为180秒的GoldenEye攻击和Snort处理时间为180秒的LOIC工具。蜜罐无法识别DDoS攻击,因为它们更多地关注渗透企图或其他可疑活动等攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
THE IMPLEMENTATION OF NETWORK SERVER SECURITY SYSTEM USING HONEYPOT
Network Server security is an important aspect of ensuring the integrity and availability of information systems. This research aims to implement network Server security at Muhammadiyah University of East Kalimantan using Honeypot technology. Honeypots are used to attract the attention of attacks and monitor suspicious activities on the network. The research method used is NDLC (Network Development Life Cycle), which includes the design and implementation of Honeypots, as well as the collection and analysis of detected attack data. The research results show that by using three attack techniques, namely Slowloris attack with a Honeypot processing time of 2 seconds and Snort processing time of 180 seconds, GoldenEye attack with a Honeypot processing time of 2 seconds and Snort processing time of 180 seconds, and LOIC tools with a Snort processing time of 180 seconds. Honeypots cannot identify DDoS attacks because they focus more on attacks such as penetration attempts or other suspicious activities.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信