scholarly journals IMPLEMENTASI HONEYPOT PADA JARINGAN INTERNET LABOR FAKULTAS TEKNIK UNIKS MENGGUNAKAN DIONAEA SEBAGAI KEAMANAN JARINGAN

Author(s):  
Muhammad Hasim Siregar ◽  
Rosi Dermawati

AbstractLack of knowladge of computer user about system security problem is one of the cause of computer problems. There are many computers that do not update their antivirus and some even do not use an antivirus. Network security techniques usually block attacks using a firewall or detect attack with IDS (Intruction Detection System), which is in charge of guarding against axisting attacks. However, by only using IDS the network administrator will be overwhelmed checking every notification given by IDS. This IDS works almost the same as an antivirus, unable to work in an encrypted environment or an IPv6 environment. For that, additional security is needed such as a dionaea honeypot. A honeypot is a fake system the signed to trap attacker, as if it were a real system. Based on these problems, a research will be conducted on the Analysis And Implementation Of Honeypot Using Dionaea as Network Security Support. Keywords: Honeypot, Dionaea, IDS, Firewall, Malware

2014 ◽  
Vol 602-605 ◽  
pp. 1526-1529
Author(s):  
Hai Yan Chen

With the popularization and development of Internet, the network has penetrated into every corner of social life. Network brings people convenient but at the same time it also brings a series of safety problems. Intrusion detection system is an important part of network security system. Computer security problem is increasingly prominent, which puts forward higher requirements on intrusion detection system. In this paper, the application of data mining and intelligent Agent detection in the intrusion detection system is researched.


Author(s):  
Zoltan Czirkos ◽  
Gabor Hosszú

The importance of the network security problems comes into prominence with the growth of the Internet. This article presents a special approach to the intrusion detection (ID) problem, which relies on the collaboration of the protection programs running on different hosts. Computers connected to networks are to be protected by various means (Kemmerer & Vigna, 2002). The collaboration of the elements of the proposed intrusion detection system uses the so-called peer-to-peer (P2P) communication model. The article first presents the usage of the P2P paradigm for improving the protection of the operating systems (Bauer, 2005).


2014 ◽  
Vol 707 ◽  
pp. 458-461 ◽  
Author(s):  
Dong Ming Zhao ◽  
Kai Feng Zhu

Internet technology as the cutting-edge of the current information technology, it has penetrated into every aspect of human life, more and more government agencies, enterprises are using Internet to improve their office efficiency and to establish new business operation model, in order to improve its reaction ability in fierce competition. Internet has brought convenience for people to work, while the security problem of network also will follow. The internal network not only needs to ensure the security of their data, but also needs to exchange data with the external network, then by adopting network security isolation system which takes gatekeeper technology as its core technology, so that we can ensure that internal network and external network will have physical isolation at any time, meanwhile, according to business needs, it also has multiple forms of information and data’s exchanges.


2014 ◽  
Vol 971-973 ◽  
pp. 1684-1687
Author(s):  
Xiu Juan Sun

this article from the various security threats facing the computer network, systematically introduces the network security technology. And in view of the campus network security issues, firstly analyzes the hidden dangers to the safety of network system in colleges and universities, and then from the build two aspects of security defense system and strengthen the safety management design of the campus network security policy. This paper study, the first thing I learned the main threat to the network security problem, and use the knowledge of security network security problems are analyzed. Secondly, based on the research of the network technology, campus network will also be faced with the security threat. Finally, the idea of established with P2DR model to establish campus network security defense system. And it is concluded that the building of a set of effective network security defense system is the solution Campus network main threats and hidden trouble of necessary ways and measures.


2021 ◽  
Author(s):  
Farah Jemili ◽  
Hajer Bouras

In today’s world, Intrusion Detection System (IDS) is one of the significant tools used to the improvement of network security, by detecting attacks or abnormal data accesses. Most of existing IDS have many disadvantages such as high false alarm rates and low detection rates. For the IDS, dealing with distributed and massive data constitutes a challenge. Besides, dealing with imprecise data is another challenge. This paper proposes an Intrusion Detection System based on big data fuzzy analytics; Fuzzy C-Means (FCM) method is used to cluster and classify the pre-processed training dataset. The CTU-13 and the UNSW-NB15 are used as distributed and massive datasets to prove the feasibility of the method. The proposed system shows high performance in terms of accuracy, precision, detection rates, and false alarms.


Author(s):  
Chanintorn Jittawiriyanukoon

<span>To secure a wealth of data traversing the computer network at your fingertips is compulsory. But when attack arises at various parts of the network it is difficult to protect, especially when each incident is investigated separately. Geography is a necessary construct in computer networks. The analytics of geography algorithms and metrics to curate insight from a security problem are a critical method of analysis for computer systems. A geography based representation is employed to highlight aspects (on a local and global level) of a security problem which are Eigenvalue, eccentricity, clustering coefficient and cliques. Network security model based on attack undirected geography (AUG) is familiarized. First, analysis based upon association rules is presented then the attack threshold value is set from AUG. The probability of an individual attack edge and associated network nodes are computed in order to quantify the security threat. The simulation is exploited to validate that results are effective.</span>


2021 ◽  
Vol 5 (1) ◽  
pp. 60-69
Author(s):  
Farid Wahyudi ◽  
◽  
Listanto Tri Utomo ◽  

Security is very main in computer networks, where many devices are connected to each other to interact and exchange data without limits. Network security is also a very important issue to prioritize, one of which is to use an intrusion prevention system. At PDTI UNIRA there are often network security problems, one of which is that during the test season, the server experiences many intrusion problems. The purpose of this research is to develop a social science system based on the analysis at PDTI of Raden Rahmat Islamic University Malang. This research method uses a computer security development approach, namely the Intrusion Prevention System (IPS), by combining firewall engineering methods and Intrusion-Detection System (IDS). The result of this research is a technology that can be used to prevent attacks that will enter the local network checking and recording all data packets and recognizing sensor packets, when the attack has been identified, IPS will deny access (block) and record (log) all data packets. identified. So IPS acts as a firewall that will allow and block combined with IDS that can detect packets in detail. With a network security system, the Unira PDTI server is safer and can avoid intrusion.


Author(s):  
Yongli Liu ◽  
Weifang Zhai ◽  
Song Ji

With the “Internet +” era of arrival, the major colleges and universities are in the construction of the wisdom of the campus, students and teachers living with the campus network is more and more closely related, Campus network security has become the protection of the wisdom of the campus construction. Campus network security issues become increasingly serious; a single security protection has been unable to meet the current security needs. This paper analyzes the major security threats facing the campus network, and presents the campus network security protection measures from the physical layer, network layer, system layer, application layer and management of five aspects, thus constructing the campus network's overall security defense system. The system has multiple security protection for Campus Network, thus improving the security of the campus network.


Sign in / Sign up

Export Citation Format

Share Document