Iqbal, Win Nazofa (2024) Analisis Perbandingan Tiga Jenis Honeypot Terhadap Serangan Web Server. Undergraduate thesis, Politeknik Negeri Bengkalis.
Text (Abstract)
1. TA - 6404201006 - Abstract.pdf - Submitted Version Available under License Creative Commons Attribution Share Alike. Download (79kB) |
|
Text (Bab I Pendahuluan)
2. TA - 6404201006 - Bab I Pendahuluan.pdf - Submitted Version Available under License Creative Commons Attribution Share Alike. Download (145kB) |
|
Text (Daftar Pustaka)
3. TA - 6404201006 - Daftar Pustaka.pdf - Submitted Version Available under License Creative Commons Attribution Share Alike. Download (109kB) |
|
Text (Full Text)
4. TA - 6404201006 - Full Text.pdf - Submitted Version Restricted to Registered users only Available under License Creative Commons Attribution Share Alike. Download (1MB) | Request a copy |
Abstract
In the continuously evolving digital era, the internet becomes a cornerstone in information technology, with its usage ever-increasing and its geographical reach expanding. This growth not only brings benefits but also opens opportunities for cyber-attacks against critical infrastructure such as web servers. Serving as central hubs of information services, web servers face threats like data theft, infrastructure damage, and financial losses due to DDoS, Brute Force, and SQL Injection attacks. Given the importance of maintaining the reliability and security of web servers, the use of honeypots as attack detection tools becomes increasingly relevant. Honeypots, designed to attract and record attacker activities, are categorized into three types based on the level of interaction: low, medium, and high interaction. This study aims to analyze and compare the effectiveness of these three types of honeypots in detecting attacks against web servers. Through comparative analysis, this research endeavors to determine which honeypot is most effective in identifying cyber-attacks with high accuracy and recommends the most suitable type of honeypot for organizations to protect their web server infrastructure. The findings of this study are expected to provide valuable guidance for the development of more effective and proactive cyber security strategies in the face of current and future cyber threats, as well as serving as a reference for future researchers and organizations involved in deploying honeypots for web server security.
Item Type: | Thesis (Undergraduate) | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Contributors: |
|
||||||||||||
Uncontrolled Keywords: | Internet, Information Technologi, Web Server, Honeypot | ||||||||||||
Subjects: | 410 ILMU TEKNIK > 450 TEKNIK ELEKTRO DAN INFORMATIKA > 458 Teknik Informatika | ||||||||||||
Divisions: | Jurusan Teknik Informatika > Sarjana Terapan Keamanan Sistem Informasi > TUGAS AKHIR | ||||||||||||
Depositing User: | Keamanan Sistem Informasi 2024 | ||||||||||||
Date Deposited: | 06 Sep 2024 01:41 | ||||||||||||
Last Modified: | 06 Sep 2024 01:41 | ||||||||||||
URI: | http://eprints.polbeng.ac.id/id/eprint/14702 |
Actions (login required)
View Item |