Analisis Kinerja Sistem Honeypot Dalam Mendeteksi Serangan Brute Force Dan DDOS (Distributed Denial Of Service) Pada Server

Yusup, Syuhada (2021) Analisis Kinerja Sistem Honeypot Dalam Mendeteksi Serangan Brute Force Dan DDOS (Distributed Denial Of Service) Pada Server. Undergraduate Thesis thesis, Institut Teknologi Telkom Purwokerto.

[img] Text
Cover (2).pdf

Download (1MB)
[img] Text
Abstrack.pdf

Download (72kB)
[img] Text
Abstrak.pdf

Download (72kB)
[img] Text
BAB I.pdf

Download (510kB)
[img] Text
BAB II.pdf

Download (353kB)
[img] Text
BAB III.pdf

Download (873kB)
[img] Text
BAB IV.pdf
Restricted to Registered users only

Download (508kB) | Request a copy
[img] Text
BAB V (2).pdf

Download (72kB)
[img] Text
Daftar Pustaka.pdf

Download (152kB)
[img] Text
Lampiran.pdf
Restricted to Registered users only

Download (1MB) | Request a copy

Abstract

More and more server attacks will cause the server to experience operating system corruption. Examples of attacks that occur such as DDoS and brute force attacks. In preventing such attacks, security is required on the server. This study discusses system attacks on servers by combining mock servers and implementing firewall systems to secure servers from attackers. The mock server was created using a honeypot cowrie and installed a web server. Honeypot cowrie interacts with the SSH (secure shell) medium, and can record brute force attacks. The results of brute force attacks are recorded in cowrie honeypot logs and can be seen on the kippo graph using a browser. This research uses quantitative method because this research analyzes the performance and performance of the server in case of attack. Testing was conducted in two scenarios, namely the first scenario of attacking port 80 and obtained a very large percentage of CPU and memory on Mikrotik RouterOS that impacted the performance of Mikrotik RouterOS such as difficulty to control Mikrotik RouterOS and slow traffic. Logs in the first scenario obtained an average of 515.542 attacks. While in the second scenario attack port 22 and obtained the percentage of CPU and memory increased on the honeypot server, because the attack directly impacted the honeypot instead of to Mikrotik RouterOS. Logs in the second scenario obtained 7.727 usernames and 273 passwords and a total of 568 activities occurred. Keyword : Honeypot, Cowrie, SSH, Brute force, Mikrotik RouterOS

Item Type: Thesis (Undergraduate Thesis)
Subjects: T Technology > T Technology (General)
Divisions: Faculty of Telecommunication and Electrical Engineering > Telecommunication Engineering
Depositing User: pustakawan ittp
Date Deposited: 27 Sep 2021 04:09
Last Modified: 05 May 2023 07:50
URI: http://repository.ittelkom-pwt.ac.id/id/eprint/6472

Actions (login required)

View Item View Item