IMPLEMENTATION OF SERVER SECURITY SYSTEM USING HONEYPOT AND RASPBERRY PI ON ATTACKER
Abstract
Security in computer networks can be vulnerable to cyber attacks coming from external networks as well as from internal networks, due to weaknesses in making computer security policies, weak computer system configurations or bugs in software applications. But if the attack comes from the internal network is certainly more dangerous because it can easily pass through the firewall and difficult to detect, In order to be able to detect and learn the motives, tactics, and tools used by the attackers, honeypot system can be easily used for the purpose. The Honeypot is briefly described as a shadow server that provides a similar service as the original server, serving as a container for learning the motive of an attack by an attacker. By integrating IDPS on Honeypot can increase security on the server because it can detect and prevent attacks against the server. Based on the tests that have been done, It is known that to save costs and resources spent to build the honeypot and IDPS can be implemented on Raspberry Pi devices. Because the Raspberry Pi honeypot is able to work like a honeypot in general with the cost and resources are cheap, Such as detection and prevention of attacks that come up to record the activities of attackers.Key words: honeypot, raspberry pi, IDPS
Published
2020-06-29