Implementasi honeypot cowrie untuk meningkatkan sistem keamanan server berbasis web monitoring dengan notifikasi menggunakan telegram

Achmad, Faisal (2020) Implementasi honeypot cowrie untuk meningkatkan sistem keamanan server berbasis web monitoring dengan notifikasi menggunakan telegram. Diploma thesis, Institut Teknologi Telkom Purwokerto.

[img]
Preview
Text
abstract.pdf - Accepted Version

Download (238kB) | Preview
[img]
Preview
Text
abstrak.pdf - Accepted Version

Download (260kB) | Preview
[img]
Preview
Text
COVER.pdf - Accepted Version

Download (976kB) | Preview
[img]
Preview
Text
BAB I.pdf - Accepted Version

Download (443kB) | Preview
[img]
Preview
Text
BAB II.pdf - Accepted Version

Download (633kB) | Preview
[img]
Preview
Text
BAB III.pdf - Accepted Version

Download (1MB) | Preview
[img] Text
BAB IV.pdf - Accepted Version
Restricted to Registered users only

Download (584kB)
[img]
Preview
Text
BAB V.pdf - Accepted Version

Download (418kB) | Preview
[img]
Preview
Text
DAFTAR PUSTAKA.pdf - Accepted Version

Download (325kB) | Preview
[img]
Preview
Text
LAMPIRAN.pdf - Accepted Version

Download (399kB) | Preview

Abstract

security needs attention from the administrator to detect and prevent cyber attacks. Attackers attack port 22 (SSH) on the network can be either bruteforce attacks. To increase security on the server can be done by using the Intrusion Prevention System (IPS) software as a mitigation if there is an attack on the SSH port on the server. Intrusion Prevention System by using Cowrie in this case can detect and mitigate so that the original SSH port cannot be Accessed by random parties and unknown parties are transferred access to the SSH port and the fake system. The information aspect of the attacker can be recorded by Cowrie. This system is integrated with IPTables to distinguish the ip that is allowed access to the server and the ip that is denied access to the original server, as well as the use of the Telegram application to get a notification every time an unknown party tries to access the server. Administrators can monitor the server in real time using Splunk. The test was carried out using 1 unit of PC as a server integrated with Honeypot Cowrie, then with 4 units of PC using the Ncrack brute force method. Performance testing is carried out to determine the condition of the system by measuring Quality of Service testing. The study found an average throughput of 234.44 KBps, an average delay of 11.27 ms, an average value of jitter of 9.13 ms and packet loss of 0.61%. The accuracy rate of Splunk in recording attacker information without Telegram is 97.4% and using Telegram is 95.74%. Keywords: Honeypot Cowrie, Intrusion Prevention System, , Telegram, Splunk, Quality of Services.

Item Type: Thesis (Diploma)
Subjects: T Technology > T Technology (General)
Divisions: Faculty of Telecommunication and Electrical Engineering > Electrical Engineering
Depositing User: KinatJr
Date Deposited: 15 Feb 2021 03:54
Last Modified: 21 Apr 2021 06:19
URI: http://repository.ittelkom-pwt.ac.id/id/eprint/5970

Actions (login required)

View Item View Item