Claim Missing Document
Check
Articles

Found 1 Documents
Search

Aplikasi Honeypot dalam Keamanan Jaringan untuk Mendeteksi Serangan Siber pada Infrastruktur TI Susanto, Carlos; Romli, Moh Ali
J-INTECH ( Journal of Information and Technology) Vol 13 No 01 (2025): J-Intech : Journal of Information and Technology
Publisher : LPPM STIKI MALANG

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32664/j-intech.v13i01.1924

Abstract

The high security risks that are susceptible to hacking and exploitation by malicious actors to steal data or information often arise due to a lack of awareness regarding the critical importance of implementing deceptive network security using honeypots. Negligence can create vulnerabilities that are easily exploited, allowing attackers to initiate breaches. A notable network security approach involves using Honeypots, a method that creates a decoy server to mimic an authentic one. Honeypots are deliberately engineered to attract the attention of cyber attackers and facilitate their access to the trap server, thereby enabling the monitoring and analysis of their activities without compromising the integrity of the primary server. To achieve optimal network security, comprehensive testing of Honeypots is essential. This testing process serves as a fundamental metric in evaluating the efficacy and performance of Honeypot systems in mitigating cyber threats.