IMPLEMENTASI SISTEM MONITORING SERANGAN SIBER BERBASIS HONEYPOT PADA JARINGAN SMK MUHAMMADIYAH 7 MALANG

Ummam, Khotibul (2023) IMPLEMENTASI SISTEM MONITORING SERANGAN SIBER BERBASIS HONEYPOT PADA JARINGAN SMK MUHAMMADIYAH 7 MALANG. Undergraduate thesis, Universitas Muhammadiyah Malang.

[thumbnail of Pendahuluan.pdf]
Preview
Text
Pendahuluan.pdf

Download (1MB) | Preview
[thumbnail of BAB 1.pdf] Text
BAB 1.pdf
Restricted to Registered users only

Download (166kB) | Request a copy
[thumbnail of BAB 2.pdf] Text
BAB 2.pdf
Restricted to Registered users only

Download (116kB) | Request a copy
[thumbnail of BAB 3.pdf] Text
BAB 3.pdf
Restricted to Registered users only

Download (135kB) | Request a copy
[thumbnail of BAB 4.pdf] Text
BAB 4.pdf
Restricted to Registered users only

Download (919kB) | Request a copy
[thumbnail of BAB 5.pdf] Text
BAB 5.pdf
Restricted to Registered users only

Download (36kB) | Request a copy
[thumbnail of Lampiran.pdf] Text
Lampiran.pdf
Restricted to Registered users only

Download (63kB) | Request a copy
[thumbnail of POSTER.pdf]
Preview
Text
POSTER.pdf

Download (123kB) | Preview

Abstract

Security on a computer network is very important. With weak security on a
computer network, existing information can be stolen or misused by irresponsible
parties. This Modern Honey Network system can minimize cyber attacks that occur.
In this study, the computer network LAB SMK Muhammadiyah 7 Malang was used
as a case study. In the scenario carried out, the Dionaea Honeypot Sensor and the
Suricata Honeypot sensor are used as bait by opening all ports as gaps for attackers
to carry out attacks on the Sensor. The results of attacks carried out by attackers are
displayed on the Modern Honey Network web, which is then analyzed for the types
of attacks that occur. The data obtained from the Dionaea Honeypot and Suricata
Honeypot sensors are attacker IP, protocol, port, sensor being attacked and also
md5 data. This md5 data will be used for further analysis using www.virustotal.com
and www.hybird-analysis.com. One of the results obtained from some of the
parameters above is the type of Malware such as Trojan.Generic Malware and
CVE-2017-06.

Item Type: Thesis (Undergraduate)
Student ID: 201910370311062
Keywords: MHN, Honeypot, Dionaea, Suricata
Subjects: T Technology > T Technology (General)
Divisions: Faculty of Engineering > Department of Informatics (55201)
Depositing User: 201910370311062 khotibul_ummam_28
Date Deposited: 16 Nov 2023 08:24
Last Modified: 16 Nov 2023 08:25
URI: https://eprints.umm.ac.id/id/eprint/945

Actions (login required)

View Item
View Item