Honeyd untuk Mendeteksi Serangan Jaringan di Universitas Muhammadiyah Purwokerto
Abstract
Computer network technology is a necessity that must be applied by any organization at this time. But the connection of computers to each other can be exploited by certain parties to carry out the attack in order to obtain personal gain. This research aimed to detect attacks in the network of Muhammadiyah University of Purwokerto using Honeyd. Honeyd is placed on the internal network segment, with the configuration to mimic the four host operating systems and different services. A number of attacks to Honeyd originated from several host with private IP address of the internal network. Attacks are detected done automatically by malware
Keywords
Computer network; attack; Honeyd; Malware
References
Canavan, John E. 2001. Fundamental of Network Security. Artech House. London.
Rahardjo, B. 2005. Keamanan Sistem Informasi berbasis Internet, PT. Insan Indonesia. Bandung.
Provos, N. 2004. A Virtual Honeypot Framework. Google Inc.
Harjono dan Pinandita, T. 2012. Deteksi Malware di Jaringan Lokal Universitas Muhammadiyah Purwokerto Menggunakan Dionaea. Laporan Penelitian. FT-UMP. Purwokerto.
DOI: 10.30595/juita.v2i4.825
Refbacks
- There are currently no refbacks.
ISSN: 2579-8901
- Accreditation Status
-
Notification of Scientific Journal Accreditation Status No. 1469/E5/DT.05.00/2024
- Visitor Stats
View JUITA Stats
About The Authors
Article Tools
Email this article (Login required)
Email the author (Login required)
Keywords
Android
Aplikasi
Bi-clustering
CNN
Classification
Clustering
Forward Chaining
Fuzzy Quantification Theory I
Mamdani
Rekayasa Perangkat Lunak
SMS Gateway
Web Service
backpropagation
backward chaining
decision support system
expert system
interest in learning
learning achievement
learning motivation
motivasi belajar
support vector machine