THE IMPLEMENTATION OF NETWORK SERVER SECURITY SYSTEM USING HONEYPOT
نویسندگان
چکیده
Network Server security is an important aspect of ensuring the integrity and availability information systems. This research aims to implement network at Muhammadiyah University East Kalimantan using Honeypot technology. Honeypots are used attract attention attacks monitor suspicious activities on network. The method NDLC (Network Development Life Cycle), which includes design implementation Honeypots, as well collection analysis detected attack data. results show that by three techniques, namely Slowloris with a processing time 2 seconds Snort 180 seconds, GoldenEye LOIC tools seconds. cannot identify DDoS because they focus more such penetration attempts or other activities.
منابع مشابه
assessment of the efficiency of s.p.g.c refineries using network dea
data envelopment analysis (dea) is a powerful tool for measuring relative efficiency of organizational units referred to as decision making units (dmus). in most cases dmus have network structures with internal linking activities. traditional dea models, however, consider dmus as black boxes with no regard to their linking activities and therefore do not provide decision makers with the reasons...
Implementation of Network Forensics Based on Honeypot
For years, numbers of researches had addressed the serious matters of network attacks, and developed various technologies such as firewalls and intrusion detection systems to prevent the malware attacking. Currently, technologies lack any investigative features because of the network information gathering is too difficult. In this study, we designed a network forensics system, which contented h...
متن کاملNetwork Security Enhancement through Honeypot based Systems
Computer Networks and Internet has become very famous nowadays since it satisfies people with varying needs by providing variety of appropriate services. Computer Networks have revolutionized our use of computers. Online bills, shopping, transactions and many other essential activities performed on the go by just a single click from our homes. Though it is a boon in this era, it also has its ow...
متن کاملHoneypot based Secure Network System
A honeypot is a non-production system, design to interact with cyber-attackers to collect intelligence on attack techniques and behaviors. There has been great amount of work done in the field of network intrusion detection over the past three decades. With networks getting faster and with the increasing dependence on the Internet both at the personal and commercial level, intrusion detection b...
متن کاملImplementation of Home Network Security System based on Remote Management Server
The user authentication and access control technology of home networks has, up until recently, adopted a practice of direct security management by residents, with the placing of the security system in the home network of each house. Such a type of system has a high probability of producing weaknesses in security, because home residents must manage their security. Additionally, as the security s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: JIKO (Jurnal Informatika dan Komputer)
سال: 2023
ISSN: ['2656-1948', '2614-8897']
DOI: https://doi.org/10.33387/jiko.v6i2.6385