Implementasi Honeypot Menggunakan Dionaea Dan Kippo Sebagai Penunjang Keamanan Jaringan Komunikasi Komputer
DOI:
https://doi.org/10.31479/jtek.v9i1.119Keywords:
Network Security System, Kippo, Dionaea, Honeypot, Demilitarized ZoneAbstract
Today, the internet has become the most used tool for delivering information. Through the internet, people can search for information by freely accessing a web page. This freedom of access often raises security issues in the website provider's internal network. These security issues can be in the form of misuse of information, threats, and other attacks on the provider's internal network. Based on these conditions, a technique is needed to protect important data on the website owner's server from various attacks. In this research, a Honeypot security system has been implemented using Dionaea and Kippo in the Demilitarized Zone to increase the security of a network. The methodology of this research is Waterfall Model for software engineering. The system that has been built is able to detect, take action, record attack logs and display them in the form of a website in real time.Downloads
References
Sukirmanto, “Rancang Bangun dan Implementasi Keamanan Jaringan Komputer Menggunakan Metode Intrusion Detection System pada SMP Islam Terpadu PAPB”, Skripsi, Universitas Semarang, Semarang, 2013.
D. Stiawan, A. H. Abdullah, and M. Y. Idris, “Characterizing Network Intrusion Prevention System”, International Journal of Computer Applications, Vol.14 No.1 pp. 11–18, 2011.
R. Alder et al, Snort 2.1 Intrusion Detection, Second Edition, Rockland, Syngress Publishing, 2004.
T. A. Cahyanto, H. Oktavianto, and A.W. Royan, “Analisis Dan Implementasi Honeypot Menggunakan Donaea Sebagai Penunjang Keamanan Jaringan”, Jurnal Sistem dan Teknologi Informasi Indonesia, Vol.1 No.2 pp. 86–92, 2016.
D. P. Agustino, Y. Priyoatmojo, and N. W. W. Safitri, “Implementasi Honeypot Sebagai Pendeteksi Serangan dan Melindungi Layanan Cloud Computing”, in E-Proceedings KNS&I STIKOM Bali, pp. 196–201, 2017.
M. H. Asadullah, “Sistem Keamanan Server Dengan Honeypot Dan Instrusion Detection System (IDS) (Studi Kasus Perusahaan Printing SOMATEX)”, Skripsi, Universitas Sebelas Maret, Surakarta, 2019.
A. A. Nugroho, “Analisa dan Implementasi Honeypot pada Sistem Keamanan Jaringan Komunikasi Komputer”, Skripsi, Sekolah Tinggi Meteorologi Klimatologi dan Geofisika, Tangerang Selatan, 2020.
M. A. Abdillah, “Implementasi Dan Analisa Jaringan Perimeter Menggunakan Demilitarized Zone (DMZ) Dan Hybrid Intrusion Detection And Prevention System (IDPS) Untuk Keamanan LAN”, Skripsi, Sekolah Tinggi Meteorologi Klimatologi dan Geofisika, Tangerang Selatan, 2020.
I. Anugrah and R. H. Rahmanto, “Sistem Keamanan Jaringan Local Area Network Menggunakan Teknik Demilitarized Zone”, Jurnal Penelitian Ilmu Komputer, Sistem Embedded & Logic, Vol.5, pp. 91–106, 2017.
A. F. Nurrahman, “Implementasi Virtual Low-Interaction Honeypot Dengan Dionaea Untuk Mendukung Keamanan Jaringan”, Diponegoro Journal of Informatics and Technology, Vol.2 No.4 pp. 28–37, 2013.
A. Amirullah, “Rancang Bangun Sistem Pengidentifikasi Serangan Pada Jaringan Komputer Universitas Hasanuddin”, Skripsi, Universitas Hasanuddin, Makassar, 2010.
M. M. Mustofa and E. Aribowo, “Penerapan Sistem Keamanan Honeypot dan IDS Pada Jaringan Nirkabel (Hotspot)”, Jurnal Sarjana Teknik Informatika, Vol.1 No.1 pp. 111–118, 2013.
R. S. Pressman and B. R. Maxim, Software Engineering: A Practitioner’s Approach, New York, McGraw-Hill Education, 2020.
S. Khadafi, S. Nurmuslimah, and F. K. Anggakusuma, “Implementasi Firewall Dan Port Knocking Sebagai Keamanan Data Transfer Pada Ftp Server Berbasiskan Linux Ubuntu Server”, Network Engineering Research Operation, Vol.4 No.3, pp. 181–188, 2019.
R. Pangalila, N. Agustinus, and A. Justinus, “Penetration Testing Server Sistem Informasi Manajemen dan Website Universitas Kristen Petra”, Jurnal Infra, Vol.3 No.2, 2015.
Downloads
Published
Issue
Section
License
The rights of publication and use of intellectual works in this journal are the full property of the publisher, while the moral rights belong to the author.
The formal legal aspects of access and utilization of each Journal of Technology articles are subjected to the Creative Commons Attribution-Share Alike (CC BY-SA) license, which means that journal content can be used freely and fairly (fair use) in a similar form even for commercial purposes.
To avoid malpractice and plagiarism in publication of article publishing, the author is asked to fill out and sign a copyright statement on the Declaration of Authenticity of the Manuscript and Copyright Transfer.