Main Article Content
Abstract
The application of honeypot as a linux-based server security system can help secure servers, can help detect attacks that occur on computer networks, and display the results of attacks that occur in logs stored on cowrie honeypots. With the existence of a honeypot, it can be used as a distraction from the attacker and is able to take information about the attack that occurred and the information of the attacker. Honeypot is implemented into a system that becomes a dummy system with the aim of attracting attention, detecting, and examining attacks that occur and are carried out by attackers. Based on the tests that have been carried out, it can be concluded that the application of honeypot in the linux-based server security system at SMK Negeri 3 Bengkulu is able to manipulate ports such as ports 22 and 23, so that it can avoid and secure ports from attacks such as ping of death which was tested using the LOIC, SSH, Telnet applications, port scanners which were tested using the advanced port scanner application, which is stored in the Cowrie Honeypot logs.
Keywords
Article Details
Copyright (c) 2024 Feni Maharani, Toibah Umi Kalsum, Hendri Alamsyah

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
- This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
References
- E. Mustofa, Masrusi, Muh ; Aribowo, “Penerapan Sistem Keamanan Honeypot Dan Ids Pada Jaringan Nirkabel (Hotspot),” Sist. Keamanan Honeypot dan IDS, vol. 1, no. 1, pp. 111–118, 2013.
- I. A. Romadhan, S. Syaifudin, and D. R. Akbi, “Implementasi Multiple Honeypot pada Raspberry Pi dan Visualisasi Log Honeypot Menggunakan ELK Stack,” J. Repos., vol. 2, no. 4, pp. 475–484, 2020, doi: 10.22219/repositor.v2i4.114.
- D. P. Agustino, Y. Priyoatmojo, and N. W. W. Safitri, “Implementasi Honeypot Sebagai Pendeteksi Serangan dan Melindungi Layanan Cloud Computing,” in E-Proceedings KNS&I STIKOM Bali, 2017, pp. 196–201, [Online]. Available: https://knsi.stikom-bali.ac.id/index.php/eproceedings/article/view/37.
- T. A. Cahyanto, H. Oktavianto, and A. W. Royan, “Analisis Dan Implementasi Honeypot Menggunakan Donaea Sebagai Penunjang Keamanan Jaringan,” J. Sist. Teknol. Inf. Indones., vol. 1, no. 2, pp. 86–92, 2016.
- N. Arkaan and D. V. S. Y. Sakti, “Implementasi Low Interaction Honeypot Untuk Analisa Serangan Pada Protokol SSH,” J. Nas. Teknol. dan Sist. Inf., vol. 5, no. 2, pp. 112–120, 2019, doi: 10.25077/teknosi.v5i2.2019.112-120.
- R. Dermawati and M. H. Siregar, “Implementasi Honeypot Pada Jaringan Internet Labor,” J. Ilm. Edutic, vol. 7, no. 1, pp. 20–30, 2020.
- S. H. Wibowo et al., Cyber Crime di Era Digital. 2023.
- A. F. Nurrahman, “Low-Interaction Honeypot Dengan Dionaea Untuk Mendukung Keamanan Jaringan,” J. Informatics Technol., vol. 2, no. 4, pp. 28–37, 2019.
- R. Purwoko, D. P. Febriyan, G. P. Adhe, W. S. Y. Laksito, S. Siswanti, and M. Hasbi, “JEPIN (Jurnal Edukasi dan Penelitian Informatika) Honeypot-as-a-Service dengan Kubernetes Cluster,” Jepin, vol. 9, no. 2, pp. 204–2017, 2023.
- Arkaan, N. & Sakti, D. V. S. Y., “Implementasi Low Interaction Honeypot Untuk Peningkatan Keamanan Server dan Analisa Serangan Pada Protokol SSH,” J. Nas. Teknol. dan Sist. Inf., vol. 5, no. 2, 2019.
References
E. Mustofa, Masrusi, Muh ; Aribowo, “Penerapan Sistem Keamanan Honeypot Dan Ids Pada Jaringan Nirkabel (Hotspot),” Sist. Keamanan Honeypot dan IDS, vol. 1, no. 1, pp. 111–118, 2013.
I. A. Romadhan, S. Syaifudin, and D. R. Akbi, “Implementasi Multiple Honeypot pada Raspberry Pi dan Visualisasi Log Honeypot Menggunakan ELK Stack,” J. Repos., vol. 2, no. 4, pp. 475–484, 2020, doi: 10.22219/repositor.v2i4.114.
D. P. Agustino, Y. Priyoatmojo, and N. W. W. Safitri, “Implementasi Honeypot Sebagai Pendeteksi Serangan dan Melindungi Layanan Cloud Computing,” in E-Proceedings KNS&I STIKOM Bali, 2017, pp. 196–201, [Online]. Available: https://knsi.stikom-bali.ac.id/index.php/eproceedings/article/view/37.
T. A. Cahyanto, H. Oktavianto, and A. W. Royan, “Analisis Dan Implementasi Honeypot Menggunakan Donaea Sebagai Penunjang Keamanan Jaringan,” J. Sist. Teknol. Inf. Indones., vol. 1, no. 2, pp. 86–92, 2016.
N. Arkaan and D. V. S. Y. Sakti, “Implementasi Low Interaction Honeypot Untuk Analisa Serangan Pada Protokol SSH,” J. Nas. Teknol. dan Sist. Inf., vol. 5, no. 2, pp. 112–120, 2019, doi: 10.25077/teknosi.v5i2.2019.112-120.
R. Dermawati and M. H. Siregar, “Implementasi Honeypot Pada Jaringan Internet Labor,” J. Ilm. Edutic, vol. 7, no. 1, pp. 20–30, 2020.
S. H. Wibowo et al., Cyber Crime di Era Digital. 2023.
A. F. Nurrahman, “Low-Interaction Honeypot Dengan Dionaea Untuk Mendukung Keamanan Jaringan,” J. Informatics Technol., vol. 2, no. 4, pp. 28–37, 2019.
R. Purwoko, D. P. Febriyan, G. P. Adhe, W. S. Y. Laksito, S. Siswanti, and M. Hasbi, “JEPIN (Jurnal Edukasi dan Penelitian Informatika) Honeypot-as-a-Service dengan Kubernetes Cluster,” Jepin, vol. 9, no. 2, pp. 204–2017, 2023.
Arkaan, N. & Sakti, D. V. S. Y., “Implementasi Low Interaction Honeypot Untuk Peningkatan Keamanan Server dan Analisa Serangan Pada Protokol SSH,” J. Nas. Teknol. dan Sist. Inf., vol. 5, no. 2, 2019.