Claim Missing Document
Check
Articles

Found 1 Documents
Search
Journal : Jiko (Jurnal Informatika dan komputer)

THE IMPLEMENTATION OF NETWORK SERVER SECURITY SYSTEM USING HONEYPOT Faldi Faldi; Dinamita Romadoni; Muhammad T Sumadi
JIKO (Jurnal Informatika dan Komputer) Vol 6, No 2 (2023): JIKO (Jurnal Informatika dan Komputer)
Publisher : Universitas Khairun

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33387/jiko.v6i2.6385

Abstract

Network Server security is an important aspect of ensuring the integrity and availability of information systems. This research aims to implement network Server security at Muhammadiyah University of East Kalimantan using Honeypot technology. Honeypots are used to attract the attention of attacks and monitor suspicious activities on the network. The research method used is NDLC (Network Development Life Cycle), which includes the design and implementation of Honeypots, as well as the collection and analysis of detected attack data. The research results show that by using three attack techniques, namely Slowloris attack with a Honeypot processing time of 2 seconds and Snort processing time of 180 seconds, GoldenEye attack with a Honeypot processing time of 2 seconds and Snort processing time of 180 seconds, and LOIC tools with a Snort processing time of 180 seconds. Honeypots cannot identify DDoS attacks because they focus more on attacks such as penetration attempts or other suspicious activities.