Implementasi Low Interaction Honeypot Untuk Analisa Serangan Pada Protokol SSH
Faktor keamanan pada teknologi informasi saat ini sangatlah penting, dikarenakan pada zaman yang semakin berkembang data merupakan segalanya. Ancaman serangan terhadap jaringan dan server juga ikut berkembang, maka diperlukan adanya sebuah penanganan terhadap ancaman yang dapat memantau dan menganal...
Main Authors: | Naufal Arkaan, Dolly Virgian Shaka Yudha Sakti |
---|---|
Format: | Article |
Language: | Indonesian |
Published: |
Universitas Andalas
2019-09-01
|
Series: | Jurnal Teknologi dan Sistem Informasi |
Subjects: | |
Online Access: | https://teknosi.fti.unand.ac.id/index.php/teknosi/article/view/1220 |
Similar Items
-
Development of Intelligent Network Defense System to enable detection and analysis of cyber-attacks using an intrusion detection and prevention system based on honeypots
by: منير الوزة, et al.
Published: (2023-01-01) -
Evaluation and Comparison of the Use of Reinforcement Learning Algorithms on SSH Honeypot
by: Marco Ariano Kristyanto, et al.
Published: (2024-02-01) -
Detection of Username Enumeration Attack on SSH Protocol: Machine Learning Approach
by: Abel Z. Agghey, et al.
Published: (2021-11-01) -
A Comparison of an Adaptive Self-Guarded Honeypot with Conventional Honeypots
by: Sereysethy Touch, et al.
Published: (2022-05-01) -
Design and Implementation of Dynamic Hybrid Virtual Honeypot Architecture for Attack Analysis
by: Yonas Kibret, et al.
Published: (2013-04-01)