PENERAPAN SISTEM KEAMANAN JARINGAN INTRANET MENGGUNAKAN HONEYPOT (STUDI KASUS DI UNIVERSITAS MUHAMMADIYAH PURWOKERTO)

Computer networks connected to the Internet will increase the risk of threats or disruption to the network security. Malware in the form of viruses, worms, and trojan horses is a major threat to the network security. The objective of this research was to detect and identify attacks on the internal n...

Full description

Bibliographic Details
Main Authors: , HARJONO, S.T., , Dr. Widyawan, S.T., M.Sc.
Format: Thesis
Published: [Yogyakarta] : Universitas Gadjah Mada 2012
Subjects:
ETD
_version_ 1797032633676333056
author , HARJONO, S.T.
, Dr. Widyawan, S.T., M.Sc.
author_facet , HARJONO, S.T.
, Dr. Widyawan, S.T., M.Sc.
author_sort , HARJONO, S.T.
collection UGM
description Computer networks connected to the Internet will increase the risk of threats or disruption to the network security. Malware in the form of viruses, worms, and trojan horses is a major threat to the network security. The objective of this research was to detect and identify attacks on the internal network of Muhammadiyah University of Purwokerto using Honeypot. Honeypot platform used in this research are Honeyd and Dionaea. Research was began by evaluating the network security, then design of application Honeypot was performed to help secure the network. After installation in accordance with the design, then the simulation was performed to determine the performance of the system. Further testing system in the network to get data across a network attack. Then conducted an analysis of the log file from the Honeypot. A number of attacks to Honeyd originated from several host with private IP addresses from the internal network. Almost all attacks from hosts with Windows XP operating system, and 96.81% of attacks aimed at port 445. Dionaea succesfully download copy of the malware as much as 76 times that consists of only one type of malware that is Win32.Worm.Downadup.Gen. By knowing the type and location of the malware, an appropriate action can be performed.
first_indexed 2024-03-13T22:41:20Z
format Thesis
id oai:generic.eprints.org:99989
institution Universiti Gadjah Mada
last_indexed 2024-03-13T22:41:20Z
publishDate 2012
publisher [Yogyakarta] : Universitas Gadjah Mada
record_format dspace
spelling oai:generic.eprints.org:999892016-03-04T08:46:49Z https://repository.ugm.ac.id/99989/ PENERAPAN SISTEM KEAMANAN JARINGAN INTRANET MENGGUNAKAN HONEYPOT (STUDI KASUS DI UNIVERSITAS MUHAMMADIYAH PURWOKERTO) , HARJONO, S.T. , Dr. Widyawan, S.T., M.Sc. ETD Computer networks connected to the Internet will increase the risk of threats or disruption to the network security. Malware in the form of viruses, worms, and trojan horses is a major threat to the network security. The objective of this research was to detect and identify attacks on the internal network of Muhammadiyah University of Purwokerto using Honeypot. Honeypot platform used in this research are Honeyd and Dionaea. Research was began by evaluating the network security, then design of application Honeypot was performed to help secure the network. After installation in accordance with the design, then the simulation was performed to determine the performance of the system. Further testing system in the network to get data across a network attack. Then conducted an analysis of the log file from the Honeypot. A number of attacks to Honeyd originated from several host with private IP addresses from the internal network. Almost all attacks from hosts with Windows XP operating system, and 96.81% of attacks aimed at port 445. Dionaea succesfully download copy of the malware as much as 76 times that consists of only one type of malware that is Win32.Worm.Downadup.Gen. By knowing the type and location of the malware, an appropriate action can be performed. [Yogyakarta] : Universitas Gadjah Mada 2012 Thesis NonPeerReviewed , HARJONO, S.T. and , Dr. Widyawan, S.T., M.Sc. (2012) PENERAPAN SISTEM KEAMANAN JARINGAN INTRANET MENGGUNAKAN HONEYPOT (STUDI KASUS DI UNIVERSITAS MUHAMMADIYAH PURWOKERTO). UNSPECIFIED thesis, UNSPECIFIED. http://etd.ugm.ac.id/index.php?mod=penelitian_detail&sub=PenelitianDetail&act=view&typ=html&buku_id=56105
spellingShingle ETD
, HARJONO, S.T.
, Dr. Widyawan, S.T., M.Sc.
PENERAPAN SISTEM KEAMANAN JARINGAN INTRANET MENGGUNAKAN HONEYPOT (STUDI KASUS DI UNIVERSITAS MUHAMMADIYAH PURWOKERTO)
title PENERAPAN SISTEM KEAMANAN JARINGAN INTRANET MENGGUNAKAN HONEYPOT (STUDI KASUS DI UNIVERSITAS MUHAMMADIYAH PURWOKERTO)
title_full PENERAPAN SISTEM KEAMANAN JARINGAN INTRANET MENGGUNAKAN HONEYPOT (STUDI KASUS DI UNIVERSITAS MUHAMMADIYAH PURWOKERTO)
title_fullStr PENERAPAN SISTEM KEAMANAN JARINGAN INTRANET MENGGUNAKAN HONEYPOT (STUDI KASUS DI UNIVERSITAS MUHAMMADIYAH PURWOKERTO)
title_full_unstemmed PENERAPAN SISTEM KEAMANAN JARINGAN INTRANET MENGGUNAKAN HONEYPOT (STUDI KASUS DI UNIVERSITAS MUHAMMADIYAH PURWOKERTO)
title_short PENERAPAN SISTEM KEAMANAN JARINGAN INTRANET MENGGUNAKAN HONEYPOT (STUDI KASUS DI UNIVERSITAS MUHAMMADIYAH PURWOKERTO)
title_sort penerapan sistem keamanan jaringan intranet menggunakan honeypot studi kasus di universitas muhammadiyah purwokerto
topic ETD
work_keys_str_mv AT harjonost penerapansistemkeamananjaringanintranetmenggunakanhoneypotstudikasusdiuniversitasmuhammadiyahpurwokerto
AT drwidyawanstmsc penerapansistemkeamananjaringanintranetmenggunakanhoneypotstudikasusdiuniversitasmuhammadiyahpurwokerto