Please use this identifier to cite or link to this item: https://repository.uksw.edu//handle/123456789/11391
Title: Implementasi Honeypot untuk Mendeteksi Serangan Distributed Denial of Service (DDoS)
Authors: Prabaningtyas, Angella Puspa Dewi
Keywords: honeypot;honeyd;low-interaction;honeyd-viz;DDoS;distributed denial of service
Issue Date: 2016
Publisher: Program Studi Teknik Informatika FTI-UKSW
Abstract: Mengamankan komunikasi adalah tantangan luas karena meningkatnya ancaman dan serangan yang dilakukan pada keamanan jaringan. Pengetahuan tentang berbagai ancaman dan serangan tersebut diperoleh data yang sangat besar dari jaringan, dengan menggunakan honeypot. Honeypot yang diimplementasikan menggunakan jenis low-interaction yaitu honeyd dan software pendukung lainnya seperti apache2 dan bind9. Berdasarkan hasil penelitian, honeypot berhasil berjalan dengan memberi respon terhadap serangan Distributed Denial of Service (DDoS) dan memberikan informasi palsu seperti sistem operasi serta port-port terbuka yang biasanya dicari oleh attacker. Hasil log yang diberikan oleh honeypot diolah menjadi grafik dan diagram yang ditampilkan melalu web interface menggunakan software honeyd-viz sehingga administrator mudah dalam menganalisis bentuk serangan attacker serta dapat digunakan untuk meningkatkan keamanan pada server.
Securing communication is a comprehensive challenge due to the increasing of threats and attacks to network security. By knowing the various of threats and attacks, we can collect broad data from the network, by using honeypot. Implemented honeypot uses low-interaction type that is honeyd and other supporting software such as apache2 and bind9. Based on the research, honeypot is successfully giving responds to Distributed Denial of Service (DDoS) attacks and giving false information such as operation system and open ports which are usually sought by attackers. Log outcome given by honeypot is processed into chart and diagrams which are shown through the network interface by using honeyd-viz software so that the administrator will find it easy to analyze the form of the attacks from the attackers and it also can be used to increase the security of the server.
URI: http://repository.uksw.edu/handle/123456789/11391
Appears in Collections:T1 - Informatics Engineering

Files in This Item:
File Description SizeFormat 
T1_672011136_Abstract.pdfAbstract123.92 kBAdobe PDFView/Open
T1_672011136_Full text.pdfFull text3.36 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.