Analisis Keamanan Jaringan Terhadap Serangan Brute Force DOS Dan SQL Attack Menggunakan Honeypot Kippo Dan Honeypot Dionaea

Irhamni, Redi (2023) Analisis Keamanan Jaringan Terhadap Serangan Brute Force DOS Dan SQL Attack Menggunakan Honeypot Kippo Dan Honeypot Dionaea. Undergraduate Thesis thesis, Institut Teknologi Telkom Purwokerto.

[img] Text

Download (782kB)
[img] Text

Download (30kB)
[img] Text

Download (32kB)
[img] Text
BAB 1.pdf

Download (136kB)
[img] Text
BAB 2.pdf

Download (215kB)
[img] Text
BAB 3.pdf

Download (1MB)
[img] Text
BAB 4.pdf
Restricted to Registered users only

Download (2MB)
[img] Text
BAB 5.pdf

Download (37kB)
[img] Text
Daftar pustaka.pdf

Download (120kB)


The Internet is a connection between various types of computers and also with networks in the world that have different operating systems and applications. Based on the survey results of the Indonesian Internet Service Providers Association (APJII), internet users in Indonesia reached 215.63 million people in the 2022-2023 period. The more internet users, the higher the cyberattacks that threaten computers. This research discusses attacks on dummy servers and strengthening the original server. The dummy server is made using a honeypot so that the system is able to record and monitor the activities carried out by the attacker so that it can provide information to an administrator. In this study will use two types of honeypots namely Kippo Graph and Dionaea to secure servers, these two honeypots have different capabilities. Where in the process of testing honeypots, kippo graphs are used to monitor Brute Force attacks, while Dionaea honeypots are used to monitor DoS and Sql attacks. Testing was carried out in twoscenarios, the first scenario attacked a mock server and the second scenario attacked the original server that had been strengthened by looking at the results in the first scenario. The results of the study in the first scenario showed that the honeypot system implemented in the study managed to record every activity carried out by the attacker where the information was recorded in real time and stored in the form of a log file, then in the second scenario the attacker could not enter the original server because the author had blocked the attacker's IP and closed all ports that could be entered by the attacker.

Item Type: Thesis (Undergraduate Thesis)
Subjects: T Technology > T Technology (General)
Divisions: Faculty of Telecommunication and Electrical Engineering > Telecommunication Engineering
Depositing User: staff repository
Date Deposited: 21 Feb 2024 03:13
Last Modified: 21 Feb 2024 03:13

Actions (login required)

View Item View Item