{"title":"利用蜜罐实现网络服务器安全系统","authors":"Faldi Faldi, Dinamita Romadoni, M. T. Sumadi","doi":"10.33387/jiko.v6i2.6385","DOIUrl":null,"url":null,"abstract":"Network Server security is an important aspect of ensuring the integrity and availability of information systems. This research aims to implement network Server security at Muhammadiyah University of East Kalimantan using Honeypot technology. Honeypots are used to attract the attention of attacks and monitor suspicious activities on the network. The research method used is NDLC (Network Development Life Cycle), which includes the design and implementation of Honeypots, as well as the collection and analysis of detected attack data. The research results show that by using three attack techniques, namely Slowloris attack with a Honeypot processing time of 2 seconds and Snort processing time of 180 seconds, GoldenEye attack with a Honeypot processing time of 2 seconds and Snort processing time of 180 seconds, and LOIC tools with a Snort processing time of 180 seconds. Honeypots cannot identify DDoS attacks because they focus more on attacks such as penetration attempts or other suspicious activities.","PeriodicalId":243297,"journal":{"name":"JIKO (Jurnal Informatika dan Komputer)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"THE IMPLEMENTATION OF NETWORK SERVER SECURITY SYSTEM USING HONEYPOT\",\"authors\":\"Faldi Faldi, Dinamita Romadoni, M. T. Sumadi\",\"doi\":\"10.33387/jiko.v6i2.6385\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Network Server security is an important aspect of ensuring the integrity and availability of information systems. This research aims to implement network Server security at Muhammadiyah University of East Kalimantan using Honeypot technology. Honeypots are used to attract the attention of attacks and monitor suspicious activities on the network. The research method used is NDLC (Network Development Life Cycle), which includes the design and implementation of Honeypots, as well as the collection and analysis of detected attack data. The research results show that by using three attack techniques, namely Slowloris attack with a Honeypot processing time of 2 seconds and Snort processing time of 180 seconds, GoldenEye attack with a Honeypot processing time of 2 seconds and Snort processing time of 180 seconds, and LOIC tools with a Snort processing time of 180 seconds. Honeypots cannot identify DDoS attacks because they focus more on attacks such as penetration attempts or other suspicious activities.\",\"PeriodicalId\":243297,\"journal\":{\"name\":\"JIKO (Jurnal Informatika dan Komputer)\",\"volume\":\"58 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-08-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"JIKO (Jurnal Informatika dan Komputer)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.33387/jiko.v6i2.6385\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"JIKO (Jurnal Informatika dan Komputer)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.33387/jiko.v6i2.6385","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
摘要
网络服务器安全是保证信息系统完整性和可用性的重要方面。本研究旨在利用Honeypot技术在东加里曼丹的Muhammadiyah大学实现网络服务器安全。蜜罐用于吸引攻击者的注意力,监控网络中的可疑活动。本文采用NDLC (Network Development Life Cycle,网络开发生命周期)研究方法,包括honeypot的设计与实现,以及检测到的攻击数据的收集与分析。研究结果表明,通过使用三种攻击技术,即Honeypot处理时间为2秒、Snort处理时间为180秒的Slowloris攻击、Honeypot处理时间为2秒、Snort处理时间为180秒的GoldenEye攻击和Snort处理时间为180秒的LOIC工具。蜜罐无法识别DDoS攻击,因为它们更多地关注渗透企图或其他可疑活动等攻击。
THE IMPLEMENTATION OF NETWORK SERVER SECURITY SYSTEM USING HONEYPOT
Network Server security is an important aspect of ensuring the integrity and availability of information systems. This research aims to implement network Server security at Muhammadiyah University of East Kalimantan using Honeypot technology. Honeypots are used to attract the attention of attacks and monitor suspicious activities on the network. The research method used is NDLC (Network Development Life Cycle), which includes the design and implementation of Honeypots, as well as the collection and analysis of detected attack data. The research results show that by using three attack techniques, namely Slowloris attack with a Honeypot processing time of 2 seconds and Snort processing time of 180 seconds, GoldenEye attack with a Honeypot processing time of 2 seconds and Snort processing time of 180 seconds, and LOIC tools with a Snort processing time of 180 seconds. Honeypots cannot identify DDoS attacks because they focus more on attacks such as penetration attempts or other suspicious activities.