Analisis Serangan Hacker Menggunakan Honeypot High Interaction

Jurnal Tiarsie

View Publication Info
 
 
Field Value
 
Title Analisis Serangan Hacker Menggunakan Honeypot High Interaction
Analisis Serangan Hacker Menggunakan Honeypot High Interaction
 
Creator Sari, Wahyu Purnama
Adhi Palguna Putra, I Nyoman
 
Description Informasi merupakan asset perusahaan yang harus dijaga kerahasiaannya dari akses pihak-pihak yang tidak bertanggungjawab. Aspek keamanan informasi yang harus dilindungi mencakup Confidentiality, Integrity dan Availability. Berbagai serangan dan ancaman dapat dilakukan untuk mengambil alih asset informasi yang diinginkan. Hacker merupakan seseorang yang memiliki kemampuan untuk menembus sistem keamanan sebuah perusahaan. Ada beberapa jenis serangan hacker biasa dilakukan yaitu SQL Injection, Cross Site Scripting (XSS), Brute Force, Distributed-Denial-of-Service (DDoS), Inclusion, Code Injection dan lain-lain. Honeypot merupakan teknologi keamanan yang bertujuan mengidentifikasi, mencari celah keamanan dan berkontribusi aktif ketika terjadi aktifitas penyusupan keamanan teknologi informasi. Honeypot High Interaction (Hihat) dapat merekam dan mengumpulkan informasi serangan lebih spesifik dan lebih banyak. Jenis serangan yang terekam oleh Honeypot Hihat ini kemudian dianalisa untuk mengetahui jenis serangan yang paling banyak masuk ke perusahaan XYZ.
Information is a corporate asset that should be kept confidential access to parties who are not responsible. Aspects of the security of the information to be protected includes the Confidentiality, Integrity and Availability. A wide range of attacks and threats can be made to take over the assets of the desired information. A hacker is someone who has the ability to penetrate security systems of a company. There are several types of hacker attacks performed, i.e. SQL Injection, Cross Site Scripting (XSS), Brute Force, Distributed-Denial-of-Service (DDoS), Inclusion, Code Injection and more. Honeypot is a security technology that aims to identify, find security gaps and contribute actively when there are security intrusions on information technology activities. High Interaction Honeypot (Hihat) may record and collect information more specific attacks and more. The type of attack that was recorded by the Honeypot Hihat is then analyzed to find out the type of attack that most got into XYZ Company.
 
Publisher Fakultas Teknik Universitas Langlangbuana
 
Date 2018-01-06
 
Type info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
Peer-reviewed Article
 
Format application/pdf
 
Identifier http://jurnalunla.web.id/tiarsie/index.php/tiarsie/article/view/Analisis%20Serangan%20Hacker%20Menggunakan%20Honeypot%20High%20Interaction%20%28HIHAT%29
10.32816/tiarsie.v14i1.16
 
Source Jurnal TIARSIE; Vol 14 No 1 (2017): Jurnal TIARSIE 14.1; 13-18
Jurnal TIARSIE; Vol 14 No 1 (2017): Jurnal TIARSIE 14.1; 13-18
2623-2391
1411-2248
10.32816/tiarsie.v14i1
 
Language eng
 
Relation http://jurnalunla.web.id/tiarsie/index.php/tiarsie/article/view/Analisis%20Serangan%20Hacker%20Menggunakan%20Honeypot%20High%20Interaction%20%28HIHAT%29/2
 
Rights Copyright (c) 2017 JURNAL TIARSIE
 

Contact Us

The PKP Index is an initiative of the Public Knowledge Project.

For PKP Publishing Services please use the PKP|PS contact form.

For support with PKP software we encourage users to consult our wiki for documentation and search our support forums.

For any other correspondence feel free to contact us using the PKP contact form.

Find Us

Twitter

Copyright © 2015-2018 Simon Fraser University Library