THE IMPLEMENTATION OF NETWORK SERVER SECURITY SYSTEM USING HONEYPOT

Faldi Faldi, Dinamita Romadoni, Muhammad T Sumadi

Abstract


Network Server security is an important aspect of ensuring the integrity and availability of information systems. This research aims to implement network Server security at Muhammadiyah University of East Kalimantan using Honeypot technology. Honeypots are used to attract the attention of attacks and monitor suspicious activities on the network. The research method used is NDLC (Network Development Life Cycle), which includes the design and implementation of Honeypots, as well as the collection and analysis of detected attack data. The research results show that by using three attack techniques, namely Slowloris attack with a Honeypot processing time of 2 seconds and Snort processing time of 180 seconds, GoldenEye attack with a Honeypot processing time of 2 seconds and Snort processing time of 180 seconds, and LOIC tools with a Snort processing time of 180 seconds. Honeypots cannot identify DDoS attacks because they focus more on attacks such as penetration attempts or other suspicious activities.


Full Text:

PDF

References


Y. Li and Q. Liu, “A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments,†Energy Reports, vol. 7, pp. 8176–8186, Nov. 2021, doi: 10.1016/j.egyr.2021.08.126.

F. Akpan, G. Bendiab, S. Shiaeles, S. Karamperidis, and M. Michaloliakos, “Cybersecurity Challenges in the Maritime Sector,†Network, vol. 2, no. 1, pp. 123–138, Mar. 2022, doi: 10.3390/network2010009.

C. S. Kruse, B. Smith, H. Vanderlinden, and A. Nealand, “Security Techniques for the Electronic Health Records,†J. Med. Syst., vol. 41, no. 8, p. 127, Aug. 2017, doi: 10.1007/s10916-017-0778-4.

S. K. Khan, N. Shiwakoti, P. Stasinopoulos, and Y. Chen, “Cyber-attacks in the next-generation cars, mitigation techniques, anticipated readiness and future directions,†Accid. Anal. Prev., vol. 148, p. 105837, Dec. 2020, doi: 10.1016/j.aap.2020.105837.

F. Cremer et al., “Cyber risk and cybersecurity: a systematic review of data availability,†Geneva Pap. Risk Insur. - Issues Pract., vol. 47, no. 3, pp. 698–736, Jul. 2022, doi: 10.1057/s41288-022-00266-6.

E. Altulaihan, M. A. Almaiah, and A. Aljughaiman, “Cybersecurity Threats, Countermeasures and Mitigation Techniques on the IoT: Future Research Directions,†Electronics, vol. 11, no. 20, p. 3330, Oct. 2022, doi: 10.3390/electronics11203330.

X. Yang, J. Yuan, H. Yang, Y. Kong, H. Zhang, and J. Zhao, “A Highly Interactive Honeypot-Based Approach to Network Threat Management,†Futur. Internet, vol. 15, no. 4, p. 127, Mar. 2023, doi: 10.3390/fi15040127.

Virtualization for Security. Elsevier, 2009.

U. Tariq, I. Ahmed, A. K. Bashir, and K. Shaukat, “A Critical Cybersecurity Analysis and Future Research Directions for the Internet of Things: A Comprehensive Review,†Sensors, vol. 23, no. 8, p. 4117, Apr. 2023, doi: 10.3390/s23084117.

M. Mesbah, M. S. Elsayed, A. D. Jurcut, and M. Azer, “Analysis of ICS and SCADA Systems Attacks Using Honeypots,†Futur. Internet, vol. 15, no. 7, p. 241, Jul. 2023, doi: 10.3390/fi15070241.

W. A. Sulaksono and C. E. Suharyanto, “Implementasi Honeypot Sebagai Sistem Keamanan Jaringan Pada Virtual Private Server,†InfoTekJar J. Nas. Inform. dan Teknol. Jar., vol. 5, no. 1, pp. 90–95, 2020.

H. Artail, H. Safa, M. Sraj, I. Kuwatly, and Z. Al-Masri, “A hybrid honeypot framework for improving intrusion detection systems in protecting organizational networks,†Comput. Secur., vol. 25, no. 4, pp. 274–288, Jun. 2006, doi: 10.1016/j.cose.2006.02.009.

W. Ahmad, M. A. Raza, S. Nawaz, and F. Waqas, “Detection and Analysis of Active Attacks using Honeypot,†Int. J. Comput. Appl., vol. 184, no. 50, pp. 27–31, Mar. 2023, doi: 10.5120/ijca2023922624.

C. Sanders and J. Smith, “Using Canary Honeypots for Detection,†in Applied Network Security Monitoring, Elsevier, 2014, pp. 317–338.

S. Maesschalck, V. Giotsas, B. Green, and N. Race, “Don’t get stung, cover your ICS in honey: How do honeypots fit within industrial control system security,†Comput. Secur., vol. 114, p. 102598, Mar. 2022, doi: 10.1016/j.cose.2021.102598.

P. Williams, I. K. Dutta, H. Daoud, and M. Bayoumi, “A survey on security in internet of things with a focus on the impact of emerging technologies,†Internet of Things, vol. 19, p. 100564, Aug. 2022, doi: 10.1016/j.iot.2022.100564.

Li Li, Hua Sun, and Zhenyu Zhang, “The research and design of honeypot system applied in the LAN security,†in 2011 IEEE 2nd International Conference on Software Engineering and Service Science, Jul. 2011, pp. 360–363, doi: 10.1109/ICSESS.2011.5982237.

M. I. Al-Ghamdi, “WITHDRAWN: Effects of knowledge of cyber security on prevention of attacks,†Mater. Today Proc., Apr. 2021, doi: 10.1016/j.matpr.2021.04.098.

N. Nurdadyansyah and M. Hasibuan, “Perancangan Local Area Network Menggunakan NDLC Untuk Meningkatkan Layanan Sekolah,†pp. 342–346, 2021.

A. B. Feroz Khan and A. G, “A Multi-layer Security approach for DDoS detection in Internet of Things,†Int. J. Intell. Unmanned Syst., vol. 9, no. 3, pp. 178–191, Jun. 2021, doi: 10.1108/IJIUS-06-2019-0029.

A. Mairh, D. Barik, K. Verma, and D. Jena, “Honeypot in network security,†in Proceedings of the 2011 International Conference on Communication, Computing & Security - ICCCS ’11, 2011, p. 600, doi: 10.1145/1947940.1948065.

M. Mohammadzad and J. Karimpour, “Using rootkits hiding techniques to conceal honeypot functionality,†J. Netw. Comput. Appl., vol. 214, p. 103606, May 2023, doi: 10.1016/j.jnca.2023.103606.

M. R. Amal and P. Venkadesh, “H-DOCTOR: Honeypot based firewall tuning for attack prevention,†Meas. Sensors, vol. 25, no. December 2022, 2023, doi: 10.1016/j.measen.2022.100664.

D. Fraunholz, M. Zimmermann, S. D. Anton, J. Schneider, and H. Dieter Schotten, “Distributed and highly-scalable WAN network attack sensing and sophisticated analysing framework based on Honeypot technology,†in 2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence, Jan. 2017, pp. 416–421, doi: 10.1109/CONFLUENCE.2017.7943186.

M. Nawrocki, M. Wählisch, T. C. Schmidt, C. Keil, and J. Schönfelder, “A Survey on Honeypot Software and Data Analysis,†Aug. 2016, [Online]. Available: http://arxiv.org/abs/1608.06249.

A. J. Alhasan and N. Surantha, “Evaluation of Data Center Network Security based on Next-Generation Firewall,†Int. J. Adv. Comput. Sci. Appl., vol. 12, no. 9, pp. 518–525, 2021, doi: 10.14569/IJACSA.2021.0120958.

Tati Ernawati and Fikri Faiz Fadhlur Rachmat, “Keamanan Jaringan dengan Cowrie Honeypot dan Snort Inline-Mode sebagai Intrusion Prevention System,†J. RESTI (Rekayasa Sist. dan Teknol. Informasi), vol. 5, no. 1, pp. 180–186, 2021, doi: 10.29207/resti.v5i1.2825.

D. Desmira, D. Apriana, and M. Avicena H.B.H, “Analisa Jaringan Local Area Network Pada Laboratorium Komputer SMK Informatika Kota Serang,†INSANtek, vol. 3, no. 1, pp. 23–31, 2022, doi: 10.31294/instk.v3i1.532.

L. Dian, “Analisis Implementasi Honeypot Dan IDS Pada Jaringan Hospot Sebagai Penunjang Keamanan Jaringan Di Kopkar BGA Dengan Menggunakan Honeyd Dan Snort,†pp. 1–10, 2022.

A. Zainuddin, L. Affandi, and A. D. Susilo, “Honeypot Dan Ids Di Kampus Stmik Ppkia Pradnya Paramita Malang,†J. Teknol. Inf., vol. 5, no. 2, pp. 107–111, 2014.

S. Akbar et al., “Analisis Performansi Intrusion Detection System , Firewall , Honeypot Dan Load Balancer Dalam Rangka Mitigasi Serangan Dos Dan Ddos Pada Lpse Kab . Luwu Timur Performance Analysis of Intrusion Detection System , Firewall , Honeypot and Load Balancer To Mi,†2016.

Astrid Noviriandini, Hermanto Hermanto, Diah Ayu Ambarsari, and Didy Eriawan, “Analisis Management Bandwidth Dan Firewall Dengan Router Mikrotik Pada Pt. Bca Multifinance,†J. Tek. dan Sci., vol. 1, no. 3, pp. 40–45, 2022, doi: 10.56127/jts.v1i3.466.

S. M. Sulaman, “An Analysis and Comparison of The Security Features of Firewalls and IDSs,†2011.

M. Arman and N. Rachmat, “Implementasi Sistem Keamanan Web Server Menggunakan Pfsense,†Jusikom J. Sist. Komput. Musirawas, vol. 5, no. 1, pp. 13–23, 2020, doi: 10.32767/jusikom.v5i1.752.

A. P. Sari and N. Kemala, “PERANCANGAN JARINGAN VIRTUAL PRIVATE NETWORK BERBASIS IP SECURITY MENGGUNAKAN ROUTER MIKROTIK,†vol. 7, no. 2, pp. 150–164, 2020.

M. Iqbal, A.- Arini, and H. B. Suseno, “Analisa Dan Simulasi Keamanan Jaringan Ubuntu Server Dengan Port Knocking, Honeypot, Iptables, Icmp,†Cyber Secur. dan Forensik Digit., vol. 3, no. 1, pp. 27–32, 2020, doi: 10.14421/csecurity.2020.3.1.1933.

K. Al Fikri and Djuniadi, “Keamanan Jaringan Menggunakan Switch Port Security,†InfoTekJar J. Nas. Inform. dan Teknol. Jar., vol. 5, no. 2, pp. 302–307, 2021.

K. Y. Layuk, “Analisis Keamanan Jaringan Web Server Menggunakan Suricata Pada Sekolah Menengah Pertama Negeri 1 Palopo Krismadia Yanti Layuk,†Universitas Cokroamimnoto Palopo, 2021.

N. Fitriana and F. N. Khasanah, “Honeypot Menggunakan Honeyd Sebagai Solusi Keamanan Jaringan Dari Aktivitas Serangan,†vol. 5, no. 2, pp. 143–152, 2018.

A. S. Imron Kadafi Hariri, “Pemantauan Dan Analisis Performa Sistem Honeypot Dengan Simple Network Management Protocol (SNMP),†vol. 2, no. 1, 2021.

A. Aminanto and W. Sulistyo, “Simulasi Sistem Keamanan Jaringan Komputer Berbasis IPS Snort dan Honeypot Artilery,†Aiti, vol. 16, no. 2, pp. 135–150, 2020, doi: 10.24246/aiti.v16i2.135-150.

M. H. Siregar and R. Dermawati, “Implementasi Honeypot Pada Jaringan Internet Labor Fakultas Teknik Uniks Menggunakan Dionaea Sebagai Keamanan Jaringan,†Edutic - Sci. J. Informatics Educ., vol. 7, no. 1, pp. 20–30, 2020, doi: 10.21107/edutic.v7i1.8660.

W. Wilman, I. Fitri, and N. D. Nathasia, “Port Knocking Dan Honeypot Sebagai Keamanan Jaringan Pada Server Ubuntu Virtual,†J I M P - J. Inform. Merdeka Pasuruan, vol. 3, no. 1, pp. 27–33, 2018, doi: 10.37438/jimp.v3i1.86.

M. T. Alshammari, “Editorial Preface From the Desk of Managing Editor… Associate Editors,†IJACSA - Int. J. Adv. Comput. Sci. Appl., vol. 10, no. 9, pp. 204–208, 2019.

D. Bayu Rendro and W. Nugroho Aji, “Analisis Monitoring Sistem Keamanan Jaringan Komputer Menggunakan Software Nmap (Studi Kasus Di Smk Negeri 1 Kota Serang),†PROSISKO J. Pengemb. Ris. dan Obs. Sist. Komput., vol. 7, no. 2, pp. 108–115, 2020.

K.-C. Lu et al., “Evaluation and Build to honeypot System about SCADA Security for Large-Scale IoT Devices,†J. Robot. Netw. Artif. Life, vol. 6, no. 3, pp. 157–161, 2019, doi: 10.2991/jrnal.k.191202.008.

D. Desmira et al., “Implementasi Honeypot Sebagai Sistem Keamanan Jaringan Pada Virtual Private Server,†InfoTekJar J. Nas. Inform. dan Teknol. Jar., vol. 5, no. 1, pp. 90–95, 2020, doi: 10.30630/jitsi.1.2.10.




DOI: https://doi.org/10.33387/jiko.v6i2.6385

Refbacks

  • There are currently no refbacks.