Main Article Content

Abstract

The application of honeypot as a  linux-based  server security system  can help secure servers, can help detect attacks that occur on computer networks, and display the results of attacks that occur in  logs  stored on cowrie honeypots. With the existence of a honeypot, it can be used as a distraction from the attacker and is able to take information about the attack that occurred and the information of the attacker. Honeypot is implemented into a system that becomes a dummy system with the aim of attracting attention, detecting, and examining attacks that occur and are carried out by attackers. Based on the tests that have been carried out, it can be concluded that the application of honeypot in the linux-based server security system  at SMK Negeri 3 Bengkulu is able to manipulate ports such as ports 22 and 23, so that it can avoid and secure ports from attacks such as ping of death which was tested using the LOIC, SSH, Telnet applications, port scanners which were tested using the advanced port scanner application, which is stored in  the Cowrie Honeypot logs.

Keywords

Honeypot Security Sistem Linux

Article Details

How to Cite
Maharani, F., Kalsum, T. U., & Alamsyah, H. (2024). Penerapan Honeypot Sebagai Sistem Keamanan Server Berbasis Linux. JURNAL AMPLIFIER : JURNAL ILMIAH BIDANG TEKNIK ELEKTRO DAN KOMPUTER, 14(2), 174–183. https://doi.org/10.33369/jamplifier.v14i2.38240

References

  1. E. Mustofa, Masrusi, Muh ; Aribowo, “Penerapan Sistem Keamanan Honeypot Dan Ids Pada Jaringan Nirkabel (Hotspot),” Sist. Keamanan Honeypot dan IDS, vol. 1, no. 1, pp. 111–118, 2013.
  2. I. A. Romadhan, S. Syaifudin, and D. R. Akbi, “Implementasi Multiple Honeypot pada Raspberry Pi dan Visualisasi Log Honeypot Menggunakan ELK Stack,” J. Repos., vol. 2, no. 4, pp. 475–484, 2020, doi: 10.22219/repositor.v2i4.114.
  3. D. P. Agustino, Y. Priyoatmojo, and N. W. W. Safitri, “Implementasi Honeypot Sebagai Pendeteksi Serangan dan Melindungi Layanan Cloud Computing,” in E-Proceedings KNS&I STIKOM Bali, 2017, pp. 196–201, [Online]. Available: https://knsi.stikom-bali.ac.id/index.php/eproceedings/article/view/37.
  4. T. A. Cahyanto, H. Oktavianto, and A. W. Royan, “Analisis Dan Implementasi Honeypot Menggunakan Donaea Sebagai Penunjang Keamanan Jaringan,” J. Sist. Teknol. Inf. Indones., vol. 1, no. 2, pp. 86–92, 2016.
  5. N. Arkaan and D. V. S. Y. Sakti, “Implementasi Low Interaction Honeypot Untuk Analisa Serangan Pada Protokol SSH,” J. Nas. Teknol. dan Sist. Inf., vol. 5, no. 2, pp. 112–120, 2019, doi: 10.25077/teknosi.v5i2.2019.112-120.
  6. R. Dermawati and M. H. Siregar, “Implementasi Honeypot Pada Jaringan Internet Labor,” J. Ilm. Edutic, vol. 7, no. 1, pp. 20–30, 2020.
  7. S. H. Wibowo et al., Cyber Crime di Era Digital. 2023.
  8. A. F. Nurrahman, “Low-Interaction Honeypot Dengan Dionaea Untuk Mendukung Keamanan Jaringan,” J. Informatics Technol., vol. 2, no. 4, pp. 28–37, 2019.
  9. R. Purwoko, D. P. Febriyan, G. P. Adhe, W. S. Y. Laksito, S. Siswanti, and M. Hasbi, “JEPIN (Jurnal Edukasi dan Penelitian Informatika) Honeypot-as-a-Service dengan Kubernetes Cluster,” Jepin, vol. 9, no. 2, pp. 204–2017, 2023.
  10. Arkaan, N. & Sakti, D. V. S. Y., “Implementasi Low Interaction Honeypot Untuk Peningkatan Keamanan Server dan Analisa Serangan Pada Protokol SSH,” J. Nas. Teknol. dan Sist. Inf., vol. 5, no. 2, 2019.