Analisis Perbandingan Tiga Jenis Honeypot Terhadap Serangan Web Server

Iqbal, Win Nazofa (2024) Analisis Perbandingan Tiga Jenis Honeypot Terhadap Serangan Web Server. Undergraduate thesis, Politeknik Negeri Bengkalis.

[img] Text (Abstract)
1. TA - 6404201006 - Abstract.pdf - Submitted Version
Available under License Creative Commons Attribution Share Alike.

Download (79kB)
[img] Text (Bab I Pendahuluan)
2. TA - 6404201006 - Bab I Pendahuluan.pdf - Submitted Version
Available under License Creative Commons Attribution Share Alike.

Download (145kB)
[img] Text (Daftar Pustaka)
3. TA - 6404201006 - Daftar Pustaka.pdf - Submitted Version
Available under License Creative Commons Attribution Share Alike.

Download (109kB)
[img] Text (Full Text)
4. TA - 6404201006 - Full Text.pdf - Submitted Version
Restricted to Registered users only
Available under License Creative Commons Attribution Share Alike.

Download (1MB) | Request a copy

Abstract

In the continuously evolving digital era, the internet becomes a cornerstone in information technology, with its usage ever-increasing and its geographical reach expanding. This growth not only brings benefits but also opens opportunities for cyber-attacks against critical infrastructure such as web servers. Serving as central hubs of information services, web servers face threats like data theft, infrastructure damage, and financial losses due to DDoS, Brute Force, and SQL Injection attacks. Given the importance of maintaining the reliability and security of web servers, the use of honeypots as attack detection tools becomes increasingly relevant. Honeypots, designed to attract and record attacker activities, are categorized into three types based on the level of interaction: low, medium, and high interaction. This study aims to analyze and compare the effectiveness of these three types of honeypots in detecting attacks against web servers. Through comparative analysis, this research endeavors to determine which honeypot is most effective in identifying cyber-attacks with high accuracy and recommends the most suitable type of honeypot for organizations to protect their web server infrastructure. The findings of this study are expected to provide valuable guidance for the development of more effective and proactive cyber security strategies in the face of current and future cyber threats, as well as serving as a reference for future researchers and organizations involved in deploying honeypots for web server security.

Item Type: Thesis (Undergraduate)
Contributors:
ContributionContributorsEmailNIDN/NIDK
Thesis advisorDanuri, Danuridanuri@polbeng.ac.idNIDN1012088501
Thesis advisorNurmi, Hidayasarinurmihidayasari@polbeng.ac.idNIDN0001099105
Uncontrolled Keywords: Internet, Information Technologi, Web Server, Honeypot
Subjects: 410 ILMU TEKNIK > 450 TEKNIK ELEKTRO DAN INFORMATIKA > 458 Teknik Informatika
Divisions: Jurusan Teknik Informatika > Sarjana Terapan Keamanan Sistem Informasi > TUGAS AKHIR
Depositing User: Keamanan Sistem Informasi 2024
Date Deposited: 06 Sep 2024 01:41
Last Modified: 06 Sep 2024 01:41
URI: http://eprints.polbeng.ac.id/id/eprint/14702

Actions (login required)

View Item View Item