UJI COBA SISTEM KEAMANAN JARINGAN MENGGUNAKAN HONEYPOT DAN SIEM PADA JARINGAN KOMPUTER PT. GLORIA MAJU CAHAYA

IQBAL, MOHAMAD (2022) UJI COBA SISTEM KEAMANAN JARINGAN MENGGUNAKAN HONEYPOT DAN SIEM PADA JARINGAN KOMPUTER PT. GLORIA MAJU CAHAYA. S1 thesis, Universitas Mercu Buana Jakarta-Menteng.

[img]
Preview
Text (Cover)
TALK+41517120057+MOHAMADIQBAL_COVER - MOHAMAD IQBAL.pdf

Download (928kB) | Preview
[img]
Preview
Text (Abstrak)
TALK+41517120057+MOHAMADIQBAL_ABSTRAK - MOHAMAD IQBAL.pdf

Download (54kB) | Preview
[img] Text (Bab 1)
TALK+41517120057+MOHAMADIQBAL_BAB I - MOHAMAD IQBAL.pdf
Restricted to Registered users only

Download (322kB)
[img] Text (Bab 2)
TALK+41517120057+MOHAMADIQBAL_BAB II - MOHAMAD IQBAL.pdf
Restricted to Registered users only

Download (515kB)
[img] Text (Bab 3)
TALK+41517120057+MOHAMADIQBAL_BAB III - MOHAMAD IQBAL.pdf
Restricted to Registered users only

Download (297kB)
[img] Text (Bab 4)
TALK+41517120057+MOHAMADIQBAL_BAB IV - MOHAMAD IQBAL.pdf
Restricted to Registered users only

Download (528kB)
[img] Text (Bab 5)
TALK+41517120057+MOHAMADIQBAL_BAB V - MOHAMAD IQBAL.pdf
Restricted to Registered users only

Download (916kB)
[img] Text (Bab 6)
TALK+41517120057+MOHAMADIQBAL_BAB VI - MOHAMAD IQBAL.pdf
Restricted to Registered users only

Download (328kB)
[img] Text (Daftar Pustaka)
TALK+41517120057+MOHAMADIQBAL_DAFTAR PUSTAKA - MOHAMAD IQBAL.pdf
Restricted to Registered users only

Download (494kB)
[img] Text (Lampiran)
TALK+41517120057+MOHAMADIQBAL_LAMPIRAN - MOHAMAD IQBAL.pdf
Restricted to Registered users only

Download (620kB)
[img] Text (Form Keabsahan dan Publikasi)
MOHAMAD IQBAL_41517120057_Pernyataan Keaslian dan Persetujuan Publikasi Tugas Akhir - MOHAMAD IQBAL.pdf
Restricted to Repository staff only

Download (97kB)

Abstract

Keamanan informasi terlalu penting di zaman teknologi sekarang ini. Penyimpanan dan penyebaran informasi saat ini sudah tidak memakai media kertas, tapi banyak memakai teknologi komputer dan internet. Dengan berkembangnya teknologi internet dapat mempermudah pekerjaan dan juga dapat memberikan efisiensi waktu dan tempat tetapi dengan segala manfaatnya yang besar internet tidak serta merta membuat para pengguna merasa aman. di samping kemudahan akses, terdapat pula potensi serta gangguan berbahaya pada jaringan ancaman yang mengintai misalnnya Jenis serangan yang terjadi pada server meliputi port scan detection, brute force dan Denial-of-Service (DoS). Oleh karena itu, dibutuhkan pendeteksi dan pertahanan untuk melawan serangan terhadap jaringan untuk melindungi informasi penting dalam jaringan. Sejalan dengan perkembangan teknologi informasi, peralatan-peralatan pendukung jaringan komputer masih sangat diperlukan. Peralatan tersebut pun kini menjadi komponen penting dalam pembangunan jaringan komputer. Perkembangan teknologi keamanan jaringan saat ini sudah terdapat teknik mendeteksi serangan jaringan seperti honeypot dan Siem. Honeypot terdiri dari sistem pencegahan intrusi (Interruption counteractive action framework) yang terletak di taraf Penyedia Layanan Internet. IPS kemudian membentuk jaring pengaman untuk melindungi data pergerakan yg dipilih. evaluasi honeypot mempromosikan reproduksi luas dan gugusan data pasti diperkenalkan, yang membagikan aktivitas honeypot serta overhead yang rendah. Honeypot mengantisipasi agresi semacam itu serta mengurangi server. IDS yang berlaku umumnya dimodulasi untuk membedakan agresi sistem tingkat otoritas yang diketahui. Spontanitas ini membentuk sistem honeypot kuat melawan serangan pada jaringan Security information and event management (SIEM) akan memberikan keamanan yang mengadopsi metodologi yang dipergunakan untuk meng korelasi log, peristiwa, mengalir dari komputasi perangkat, sistem dan layanan terdistribusi dengan baseline keamanan (kegiatan pengguna serta aplikasi, kegiatan basis data dan kegiatan jaringan. Kata kunci: Honeypot, Security information and event management (SIEM), Denial-of-Service (DoS) , port scan detection, brute force ,ilmu komputer, universitas mercu buana Information security is too important in today's technological age. Currently, the storage and dissemination of information does not use paper media, but uses computer and internet technology a lot. With the development of internet technology, it can make work easier and can also provide time and place efficiency, but with all its great benefits the internet does not necessarily make users feel safe. In addition to the ease of access, there is also the potential and dangerous interference on the network of threats that lurk, for example. Types of attacks that occur on servers include port scan detection, brute force and Denial-of-Service (DoS). Therefore, it takes detection and defense against attacks against the network to protect important information on the network. In line with the development of information technology, computer network support equipment is still very much needed. The equipment is now an important component in the construction of computer networks. The development of network security technology currently includes techniques for detecting network attacks such as honeypot and Siem. Honeypot consists of an intrusion prevention system (Interruption counteractive action framework) located at the Internet Service Provider level. The IPS then forms a safety net to protect the selected movement data. Honeypot evaluation promotes extensive reproduction and definite data sets are introduced, which provides honeypot activity and low overhead. Honeypot anticipates such attacks and reduces servers. The prevailing IDS is generally modulated to discriminate against known authority level system aggressions. This spontaneity establishes a robust honeypot system against attacks on the network. Security information and event management (SIEM) will provide security that adopts the methodology used to correlate logs, events, flows from computing devices, distributed systems and services with a security baseline (user and application activity, activity). database, network activity. Keywords: Honeypot, Security information and event management (SIEM), Denial-of-Service (DoS), port scan detection, brute force, computer science, mercu buana university

Item Type: Thesis (S1)
NIM/NIDN Creators: 41517120057
Uncontrolled Keywords: Honeypot, Security information and event management (SIEM), Denial-of-Service (DoS) , port scan detection, brute force ,ilmu komputer, universitas mercu buana, Honeypot, Security information and event management (SIEM), Denial-of-Service (DoS), port scan detection, brute force, computer science, mercu buana university
Subjects: 000 Computer Science, Information and General Works/Ilmu Komputer, Informasi, dan Karya Umum > 000. Computer Science, Information and General Works/Ilmu Komputer, Informasi, dan Karya Umum > 004 Data Processing, Computer Science/Pemrosesan Data, Ilmu Komputer, Teknik Informatika
Divisions: Fakultas Ilmu Komputer > Informatika
Depositing User: Maulana Arif Hidayat
Date Deposited: 21 Apr 2022 08:02
Last Modified: 21 Apr 2022 08:03
URI: http://repository.mercubuana.ac.id/id/eprint/60364

Actions (login required)

View Item View Item