Implementasi Honeypot Menggunakan Dionaea Dan Kippo Sebagai Penunjang Keamanan Jaringan Komunikasi Komputer

Authors

DOI:

https://doi.org/10.31479/jtek.v9i1.119

Keywords:

Network Security System, Kippo, Dionaea, Honeypot, Demilitarized Zone

Abstract

Today, the internet has become the most used tool for delivering information. Through the internet, people can search for information by freely accessing a web page. This freedom of access often raises security issues in the website provider's internal network. These security issues can be in the form of misuse of information, threats, and other attacks on the provider's internal network. Based on these conditions, a technique is needed to protect important data on the website owner's server from various attacks. In this research, a Honeypot security system has been implemented using Dionaea and Kippo in the Demilitarized Zone to increase the security of a network. The methodology of this research is Waterfall Model for software engineering. The system that has been built is able to detect, take action, record attack logs and display them in the form of a website in real time.

Downloads

Download data is not yet available.

References

Sukirmanto, “Rancang Bangun dan Implementasi Keamanan Jaringan Komputer Menggunakan Metode Intrusion Detection System pada SMP Islam Terpadu PAPB”, Skripsi, Universitas Semarang, Semarang, 2013.

D. Stiawan, A. H. Abdullah, and M. Y. Idris, “Characterizing Network Intrusion Prevention System”, International Journal of Computer Applications, Vol.14 No.1 pp. 11–18, 2011.

R. Alder et al, Snort 2.1 Intrusion Detection, Second Edition, Rockland, Syngress Publishing, 2004.

T. A. Cahyanto, H. Oktavianto, and A.W. Royan, “Analisis Dan Implementasi Honeypot Menggunakan Donaea Sebagai Penunjang Keamanan Jaringan”, Jurnal Sistem dan Teknologi Informasi Indonesia, Vol.1 No.2 pp. 86–92, 2016.

D. P. Agustino, Y. Priyoatmojo, and N. W. W. Safitri, “Implementasi Honeypot Sebagai Pendeteksi Serangan dan Melindungi Layanan Cloud Computing”, in E-Proceedings KNS&I STIKOM Bali, pp. 196–201, 2017.

M. H. Asadullah, “Sistem Keamanan Server Dengan Honeypot Dan Instrusion Detection System (IDS) (Studi Kasus Perusahaan Printing SOMATEX)”, Skripsi, Universitas Sebelas Maret, Surakarta, 2019.

A. A. Nugroho, “Analisa dan Implementasi Honeypot pada Sistem Keamanan Jaringan Komunikasi Komputer”, Skripsi, Sekolah Tinggi Meteorologi Klimatologi dan Geofisika, Tangerang Selatan, 2020.

M. A. Abdillah, “Implementasi Dan Analisa Jaringan Perimeter Menggunakan Demilitarized Zone (DMZ) Dan Hybrid Intrusion Detection And Prevention System (IDPS) Untuk Keamanan LAN”, Skripsi, Sekolah Tinggi Meteorologi Klimatologi dan Geofisika, Tangerang Selatan, 2020.

I. Anugrah and R. H. Rahmanto, “Sistem Keamanan Jaringan Local Area Network Menggunakan Teknik Demilitarized Zone”, Jurnal Penelitian Ilmu Komputer, Sistem Embedded & Logic, Vol.5, pp. 91–106, 2017.

A. F. Nurrahman, “Implementasi Virtual Low-Interaction Honeypot Dengan Dionaea Untuk Mendukung Keamanan Jaringan”, Diponegoro Journal of Informatics and Technology, Vol.2 No.4 pp. 28–37, 2013.

A. Amirullah, “Rancang Bangun Sistem Pengidentifikasi Serangan Pada Jaringan Komputer Universitas Hasanuddin”, Skripsi, Universitas Hasanuddin, Makassar, 2010.

M. M. Mustofa and E. Aribowo, “Penerapan Sistem Keamanan Honeypot dan IDS Pada Jaringan Nirkabel (Hotspot)”, Jurnal Sarjana Teknik Informatika, Vol.1 No.1 pp. 111–118, 2013.

R. S. Pressman and B. R. Maxim, Software Engineering: A Practitioner’s Approach, New York, McGraw-Hill Education, 2020.

S. Khadafi, S. Nurmuslimah, and F. K. Anggakusuma, “Implementasi Firewall Dan Port Knocking Sebagai Keamanan Data Transfer Pada Ftp Server Berbasiskan Linux Ubuntu Server”, Network Engineering Research Operation, Vol.4 No.3, pp. 181–188, 2019.

R. Pangalila, N. Agustinus, and A. Justinus, “Penetration Testing Server Sistem Informasi Manajemen dan Website Universitas Kristen Petra”, Jurnal Infra, Vol.3 No.2, 2015.

Downloads

Published

2021-11-30