IMPLEMENTASI MULTIPLE HONEYPOT DENGAN RASBERRY PI DAN VISUALISASI LOG HONEYPOT MENGGUNAKAN ELK STACK
Main Author: | Romadhan, Ilfan Arif |
---|---|
Format: | Thesis NonPeerReviewed Book |
Bahasa: | eng |
Terbitan: |
, 2018
|
Subjects: | |
Online Access: |
http://eprints.umm.ac.id/39225/1/Pendahuluan.pdf http://eprints.umm.ac.id/39225/2/BAB%201.pdf http://eprints.umm.ac.id/39225/3/BAB%202.pdf http://eprints.umm.ac.id/39225/4/bab%203.pdf http://eprints.umm.ac.id/39225/5/bab%204.pdf http://eprints.umm.ac.id/39225/6/BAB%205.pdf http://eprints.umm.ac.id/39225/7/Lampiran.pdf http://eprints.umm.ac.id/39225/ |
Daftar Isi:
- Protection of network security becomes a very important thing to do. Given the ease in accessing the network allows the existence of interference from Parties that want to attack, damage, even taking important data. Honeypot did not solve the problem of network security, but on the honeypot to make research about the attack into a simpler concept that is easy to understand and implement. This study applies some honeypot using Raspberry pi and ELK stack to visualize the results obtained by the honeypot. The purpose of this research is to design a system that is able to detect attacks on the network using the honeypot. Raspberry pi is used as a honeypot sensors for monitoring security threats proved to be cost-effective and effectively replace the desktop computer. ELK stack facilitates the centralization of data from various sources and makes log analysis which initially complicated to be analyzed become more interesting.