JTIULM (Jurnal Teknologi Informasi Universitas Lambung Mangkurat)
Vol. 3 No. 1 (2018)

THE ANALYSIS NETWORK FORENSICS USING HONEYPOT ON PUBLIC CLOUD COMPUTING SERVICE NETWORK

Winda Andrini Wulandari (Unknown)



Article Info

Publish Date
20 Apr 2018

Abstract

This research presents visualization in dashboard using AWN campus honeypot log data connected to IHP (Kemkominfo) Jakarta on public cloud computing service network to categorize time stamp in data. Package attack data is divided into three categories namely morning, noon, and night based on Time Western Indonesia (WIB). DDoS attacks attacked several ports 21, 80, 135, and 445. K -means clustering method is implemented in this research to get categorization result of time of effective attack to know DDoS attack attack and cyber profilling which is expected to help monitoring process of anticipation of vulnerability cloud network of ddos / cyber crime attacks. The results of this study indicate that the method used to obtain results in accordance with the objectives.

Copyrights © 2018






Journal Info

Abbrev

jtiulm

Publisher

Subject

Computer Science & IT Electrical & Electronics Engineering Engineering

Description

Jurnal Teknologi Informasi Universitas Lambung Mangkurat (JTIULM) is intended as a media for scientific studies on the results of research, thinking and analytical-critical studies regarding research in Systems Engineering, Informatics / Information Technology, Information Management and Information ...