IMPLEMENTASI HONEYPOT SEBAGAI PENDETEKSI MALWARE PADA LAYANAN CLOUD COMPUTING

ARYA ERVAN LEORESTA , NIM. 10650062 (2014) IMPLEMENTASI HONEYPOT SEBAGAI PENDETEKSI MALWARE PADA LAYANAN CLOUD COMPUTING. Skripsi thesis, UNIVERSITAS ISLAM NEGERI SUNAN KALIJAGA.

[img]
Preview
Text (IMPLEMENTASI HONEYPOT SEBAGAI PENDETEKSI MALWARE PADA LAYANAN CLOUD COMPUTING)
10650062_bab-i_iv-atau-v_daftar-pustaka.pdf

Download (5MB) | Preview
[img] Text (IMPLEMENTASI HONEYPOT SEBAGAI PENDETEKSI MALWARE PADA LAYANAN CLOUD COMPUTING)
10650062_bab-ii_sampai_sebelum-bab-terakhir.pdf
Restricted to Registered users only

Download (3MB)

Abstract

Security had become the main focus and public concentration along society’s dependance on information technology. There were various security threat, starting from viruses or worms, malware, up to backdoor attacks. Security threats could be decreased by optimalizing identification of security holes earliest. Honeypot system implementation was a comprehensive security solution. Despite it had only the scope of detection and response, it was able to record all possible security holes. This research aimed to detect malware attacks by using Honeypot towards cloud computing services. This study uses data collection methods such as study of literature and observation. The study emphasizes on the implementation of the honeypot to detect malware attacks on cloud computing services. Stages of research is divided into several steps that the design of the system and network, analysist and prototyping, system design implementation and system testing using black box method and stress test. Honeypot, which had been run for a week using public IP, successfully captured malware infiltrating into the system. Port 5060, which was commonly used for voice and media services by Internet, mostly gained 1301 threat attacks. The United States was the only country that frequently gave threat attack with percentage 36.31%. In addition, based on the time in each day, the attacks threat occured mostly during the night, between 20:00 up to 4:00 WIB. Test results of stress testing using stress applications, the Internet runs smoothly and the server works well with cpu load by 99.91%. Honeypot systems on cloud computing services can run well and the information can be used honeypot network administrator to make the next attack threat prevention.

Item Type: Thesis (Skripsi)
Additional Information: Pembimbing : Dr. H. Imam Riadi, M.Kom
Uncontrolled Keywords: Keywords : Honeypot, Cloud Computing, Dionaea, Malware, Port
Subjects: Tehnik Informatika
Divisions: Fakultas Sains dan Teknologi > Teknik Informatika (S1)
Depositing User: Miftahul Ulum [IT Staff]
Date Deposited: 05 Dec 2014 11:25
Last Modified: 14 Mar 2016 13:35
URI: http://digilib.uin-suka.ac.id/id/eprint/14989

Share this knowledge with your friends :

Actions (login required)

View Item View Item
Chat Kak Imum