ANALISIS SISTEM KEAMANAN HOTSPOT DENGAN MENGGUNAKAN HONEYPOT DAN IDS DI KAMPUS STMIK PPKIA PRADNYA PARAMITA MALANG

  • Ahmad Zainuddin Teknik Informatika, STMIK PPKIA Pradnya Paramita Malang
  • Luqman Affandi Teknik Informatika, STMIK PPKIA Pradnya Paramita Malang
  • Antonius Duty Susilo

Abstract

Campus STMIK PPKIA Pradnya Paramita Malang an informatics-based private university in Malang. Security Hotspot used Mikrotik is using a security system. Users who use Hotspot itself is the lecturer and students. Honeypot and IDS is a tool to help security systems that still use Mikrotik Hotspot. Every time there is an attack action using Hotspot then stored into a log of activities each server. Honeypot itself is useful as a shadow Server or Server fake to fool the server where the original moment of the attack. The attack can be done in antaralain Hotspot network using scanning techniques, Arp Spoofing and DDOS. The ultimate goal of this research is to provide a recommendation of Honeypot and IDS analysis results that are tailored to the security system "STMIK PPKIA Pradnya Paramita Malang" and determine the performance of software after testing on Honeypot and IDS. The results of the study indicated that the Snort IDS is able to give a warning on the attack quite well and would be even better if combined with a low interaction and high interaction honeypot honeypot because besides being able to provide better alerting honeypot able to learn what is done by the attacker.

 

Keywords: Honeypot - IDS, Snort, Mikrotik, Server,STMIK PPKIA Pradnya Paramita Malang

References

Beale, Jay. 2003. “Snort 2.0 Intrusion Detection”, Masachusset : Syngress Publishing, Inc.

Fauziah, Lilis. 2009. “Pendeteksian Serangan Pada Jaringan Komputer Berbasis IDS Snort Dengan Algoritma Clustering K-Means”, Surabaya : Institut Teknologi Sepuluh November, Surabaya.

Firrar, Utdirartatmo. 2005. “Trik Menjebak Hacker Dengan Honeypot”. Yogyakarta : ANDI OFFSET.

Gunadi. 2009. “Wifi - Wireless LAN Jaringan Komputer Tanpa Kabel”. Bandung: Informatika.

http://www.dvwa.co.uk (online) diakses pada tanggal 19 Mei 2014

http://www.linux.org (online) diakses pada tanggal 19 Mei 2014

http://www.snort.org (online) diakses pada tanggal 19 Mei 2014

http://www.intechopen.com (online) diakses pada tanggal 19 Mei 2014

Priyambodo. 2005. “Jaringan Hotspot (Wifi)”. Jogjakarta : ANDI OFFSET

Rafiudin, Rahmat. 2010. “Mengganyang Hacker dengan SNORT”.Surabaya : ANDI OFFSET.

Sofana, Iwan. 2011. “Teori dan Modul Praktikum Jaringan Komputer”. Bandung : Modula.

Snort Teams. Desember 7, 2011. "Snort User Manual 2.9.2". Columbia: Sourcefire, Inc.

The Ubuntu Manual Team. Juli 30, 2012. "Getting Started with Ubuntu 12.04" California: Creative Commons.

Wahana, Komputer. 2003. “Konsep Jaringan Komputer dan Pengembangannya”. Jakarta : Salemba Infotek.

Wagoner, Richard. 2007. “Performance Testing An Inline Network Intrusion Detection System Snort”. Master Thesis, Morehead State University.

Published
2014-10-11