Yusup, Syuhada (2021) Analisis Kinerja Sistem Honeypot Dalam Mendeteksi Serangan Brute Force Dan DDOS (Distributed Denial Of Service) Pada Server. Undergraduate Thesis thesis, Institut Teknologi Telkom Purwokerto.
Text
Cover (2).pdf Download (1MB) |
|
Text
Abstrack.pdf Download (72kB) |
|
Text
Abstrak.pdf Download (72kB) |
|
Text
BAB I.pdf Download (510kB) |
|
Text
BAB II.pdf Download (353kB) |
|
Text
BAB III.pdf Download (873kB) |
|
Text
BAB IV.pdf Restricted to Registered users only Download (508kB) | Request a copy |
|
Text
BAB V (2).pdf Download (72kB) |
|
Text
Daftar Pustaka.pdf Download (152kB) |
|
Text
Lampiran.pdf Restricted to Registered users only Download (1MB) | Request a copy |
Abstract
More and more server attacks will cause the server to experience operating system corruption. Examples of attacks that occur such as DDoS and brute force attacks. In preventing such attacks, security is required on the server. This study discusses system attacks on servers by combining mock servers and implementing firewall systems to secure servers from attackers. The mock server was created using a honeypot cowrie and installed a web server. Honeypot cowrie interacts with the SSH (secure shell) medium, and can record brute force attacks. The results of brute force attacks are recorded in cowrie honeypot logs and can be seen on the kippo graph using a browser. This research uses quantitative method because this research analyzes the performance and performance of the server in case of attack. Testing was conducted in two scenarios, namely the first scenario of attacking port 80 and obtained a very large percentage of CPU and memory on Mikrotik RouterOS that impacted the performance of Mikrotik RouterOS such as difficulty to control Mikrotik RouterOS and slow traffic. Logs in the first scenario obtained an average of 515.542 attacks. While in the second scenario attack port 22 and obtained the percentage of CPU and memory increased on the honeypot server, because the attack directly impacted the honeypot instead of to Mikrotik RouterOS. Logs in the second scenario obtained 7.727 usernames and 273 passwords and a total of 568 activities occurred. Keyword : Honeypot, Cowrie, SSH, Brute force, Mikrotik RouterOS
Item Type: | Thesis (Undergraduate Thesis) |
---|---|
Subjects: | T Technology > T Technology (General) |
Divisions: | Faculty of Telecommunication and Electrical Engineering > Telecommunication Engineering |
Depositing User: | pustakawan ittp |
Date Deposited: | 27 Sep 2021 04:09 |
Last Modified: | 05 May 2023 07:50 |
URI: | http://repository.ittelkom-pwt.ac.id/id/eprint/6472 |
Actions (login required)
View Item |