VISUALISASI DATA ATTACKER ACTIVITY LOG PORTABLE MODERN HONEY NETWORK
نویسندگان
چکیده
Internet sudah menjadi komoditas utama dalam hal komunikasipada era ini. Dengan seiring perkembangan zaman, serangan yang terjadi di internetpun semakin berkembang. Untuk mencegah sebuah banyak sistem atau program dikembangkan untuk menghalau suatu serangan, salah satu diantaranya yaitu honeypot. Honeypot merupakan aplikasi guna mampu menahan, mendeteksi, serta mencatat masuk kedalam jaringan server. menggunakan informasi didapat oleh honeypot akan lebih memudahkan kerusakan teerjadi apabali saat mendatang. segala fitur terdapat pada tersebut, masih belum pengguna ataupun peminat dari kalangan komunitas keamanan dikarenakan termasuk kategori cukup rumit pengelolaan pemeliharaannya. Modern Honey Network biasa dikenal MHN manajemen menjalankan sensor waktu bersamaan secara singkat. – mengumpulkan data berhubungan dengan ke jaringan. menyimpan ada bentuk file log.MHN bertujuan mengatasi permasalahan rumitnya pemeliharaan Akan tetapi kekurangan ini tidak adanya visualisasi tersimpan tadi, tentunya mempersulit kinerja seorang administrator jaringon Ketika melakukan Analisa terhadap server mereka. Oleh karena itu dibutuhkan dapat memvisualisasikan log MHN. tersebut penelitian digunakan bernama Grafana seluruh berada menghubungkan diharapkan Administrator mudah dan cepat mereka mengatasinya cepat.
منابع مشابه
Designing Generic Visualisations for Activity Log Data
Especially in lifelong or professional learning, the picture of a continuous learning analytics process emerges. In this process, heterogeneous and changing data source applications provide data relevant to learning, at the same time as questions of learners to data change. This reality challenges designers of analytics tools, as it requires analytics tools to deal with data and analytics tasks...
متن کاملUnderstanding Data Analysis Activity via Log Analysis
Understanding Data Analysis Activity via Log Analysis
متن کاملNetwork risk management using attacker profiling
Risk management refers to the process of making decisions that minimize the effects of vulnerabilities on the network hosts. This can be a difficult task in the context of high-exploit probability and the difficult to identify new exploits and vulnerabilities. For many years, security engineers have performed risk analysis using economic models for the design and operation of risk-prone, techno...
متن کاملAttacker-defender models and road network vulnerability.
The reliability of road networks depends directly on their vulnerability to disruptive incidents, ranging in severity from minor disruptions to terrorist attacks. This paper presents a game theoretic approach to the analysis of road network vulnerability. The approach posits predefined disruption, attack or failure scenarios and then considers how to use the road network so as to minimize the m...
متن کاملNetwork Game with Attacker and Protector Entities
Consider an information network with harmful procedures called attackers (e.g., viruses); each attacker uses a probability distribution to choose a node of the network to damage. Opponent to the attackers is the system protector scanning and cleaning from attackers some part of the network (e.g., an edge or a path), which it chooses independently using another probability distribution. Each att...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Jurnal Repositor
سال: 2022
ISSN: ['2716-1382', '2714-7975']
DOI: https://doi.org/10.22219/repositor.v4i1.1446