scholarly journals Implementasi Multiple Honeypot pada Raspberry Pi dan Visualisasi Log Honeypot Menggunakan ELK Stack

Repositor ◽  
2020 ◽  
Vol 2 (4) ◽  
pp. 475
Author(s):  
Ilfan Arif Romadhan ◽  
Syaifudin Syaifudin ◽  
Denar Regata Akbi

ABSTRAKPerlindungan terhadap keamanan jaringan merupakan hal yang sangat penting untuk dilakukan. Mengingat kemudahan dalam mengakses jaringan memungkinkan adanya gangguan dari pihak yang ingin menyerang, merusak, bahkan mengambil data penting. Honeypot memang tidak menyelesaikan masalah pada keamanan jaringan, namun honeypot membuat penelitian tentang serangan menjadi lebih sederhana dengan konsep yang mudah untuk dimengerti dan dimplementasikan. Penelitian ini menerapkan beberapa honeypot menggunakan Raspberry pi dan ELK stack untuk monitoring hasil yang didapatkan oleh honeypot. Tujuan dari penelitian ini untuk merancang sistem yang mampu mendeteksi serangan pada jaringan menggunakan honeypot. Raspberry pi digunakan sebagai sensor honeypot untuk pemantauan ancaman keamanan terbukti hemat biaya dan efektif menggantikan komputer desktop. ELK stack memudahkan pemusatan data dari berbagai sumber dan membuat analisis log yang awalnya rumit untuk dianalisis menjadi lebih menarik.ABSTRACTProtection of network security is very important to do. Given the ease in accessing the network allows for interference from parties who want to attack, destroy, and even retrieve important data. Honeypot does not solve the problem on network security, but the honeypot makes research about attacks become simpler with concepts that are easy to understand and implement. This research applies some honeypot using Raspberry pi and ELK stack for monitoring result obtained by honeypot. The purpose of this research is to design a system capable of detecting attacks on a network using a honeypot. Raspberry pi is used as a honeypot sensor for monitoring proven cost-effective and cost-effective security threats to replace desktop computers. The ELK stack facilitates the convergence of data from multiple sources and makes log analysis initially complex for analysis to be more interesting.

2018 ◽  
Vol 7 (2) ◽  
pp. 61-67
Author(s):  
Iga Revva Princiss Jeinever

Computer networks are basically not safe to access freely. Security gaps in the network can be seen by irresponsible people with various techniques. Opening a port for access carries a high risk of being attacked by an attacker. In this connection, network administrators are required to work more to be able to secure the computer network they manage. One form of network security that is often used by network administrators in server management is through remote login such as ports on telnet, SSH, etc. A port that is always open is a network security hole that can be used by people who are not responsible for logging into the server. Focusing on these problems, in this study, Random Port Knocking is the right way and can be used to increase network security. With Random Port Knocking, the port will be opened as needed, the port will automatically change when it fails to log in more than three times and IP will automatically be blocked and access will not continue so that attacks on the network can be avoided and network security stability can be further improved. The final result of this research shows that the method applied in this research makes server safe. Because port randomization and IP block make irresponsible parties try harder to penetrate firewall walls.


Author(s):  
Miss Payal W. Paratpure

Tracking of public bus location requires a GPS device to be installed, and lots of bus operators in developing countries don't have such an answer in situ to supply an accurate estimation of bus time of arrival (ETA). Without ETA information, it's very difficult for the overall public to plan their journey effectively. In this paper, implementation of an innovative IOT solution to trace the real time location of buses without requiring the deployment of a GPS device is discussed. It uses Bluetooth Low Energy (BLE) proximity beacon to trace the journey of a bus by deploying an Estimate location beacon on the bus. BLE detection devices (Raspberry Pi 4) are installed at selected bus stops along the path to detect the arrival of buses. Once detected, the situation of the bus is submitted to a cloud server to compute the bus ETAs. A field trial is currently being conducted in Johor, Malaysia together with an area bus operator on one single path. Our test results showed that the detection of BLE beacons is extremely accurate and it's feasible to trace the situation of buses without employing a GPS device during a cost-effective way.


Author(s):  
MADHAVI DHINGRA ◽  
DEEPIKA SRIVASTAVA ◽  
VIPUL SHARMA

With continual advances in technology, wireless accessibility is being deployed increasingly in office and public environments, as it is having huge benefits. But it is also coupled with the security threats and risks that will adversely affect the performance of the organization. To get rid of these threats, firstly these threats need to be understood and then their solutions need to be finding out. This paper discusses major security threats and describes their solutions for securing wireless network.


2021 ◽  
Vol 2083 (4) ◽  
pp. 042084
Author(s):  
Xi Wang ◽  
Lei Shi

Abstract Nowadays, computer networks are widely used. Besides the convenience, people also feel the pressure of network viruses and hackers. At present, in the process of fighting against network security threats, traditional defense measures have been difficult to meet. Therefore, in order to meet the needs of computer network security under cloud computing technology, and for the future of cloud computing high-quality network storage system can be gradually optimized. In this paper, from the cloud computing and network security storage system two aspects of the computer network security storage performance analysis and design; Then from the design framework, through careful design, to ensure the reliability and security of data upload, storage.


Author(s):  
Megha Kamble ◽  
Jaspreet Mehra ◽  
Monika Jain

The growing demand of internet of things (IoT) has rendered advancement in the practical fields towards society. In spite of recent advancements and cost effective IoT solutions for smart railway infrastructure, presently, most of the railway gates in India are opened and closed manually. This is a time-consuming process. It is an error-prone system and raises the accident probability. This chapter evaluates and demonstrates the applicability of IoT to resolve the problem of unmanned automatic railway crossing. The aim is to propose a prototype that will control with the help of microcontroller board, IoT sensor integration, and integrating it to machine learning-based image analysis to detect the intermediate real time obstacle (obstacle on the track). This kind of IoT system will also invite potential attacks, and traditional security countermeasures can be inefficient in dynamic IoT environments. So open challenges related to IoT security threats and emerging security mechanisms for security of the proposed smart railway crossing system are also elaborated.


Author(s):  
Yongli Liu ◽  
Weifang Zhai ◽  
Song Ji

With the “Internet +” era of arrival, the major colleges and universities are in the construction of the wisdom of the campus, students and teachers living with the campus network is more and more closely related, Campus network security has become the protection of the wisdom of the campus construction. Campus network security issues become increasingly serious; a single security protection has been unable to meet the current security needs. This paper analyzes the major security threats facing the campus network, and presents the campus network security protection measures from the physical layer, network layer, system layer, application layer and management of five aspects, thus constructing the campus network's overall security defense system. The system has multiple security protection for Campus Network, thus improving the security of the campus network.


2020 ◽  
Vol 2020 ◽  
pp. 1-9
Author(s):  
Fatna El Mahdi ◽  
Ahmed Habbani ◽  
Zaid Kartit ◽  
Bachir Bouamoud

Internet of Things (IoT) is a hot and emerging topic nowadays. In the world of today, all kinds of devices are supposed to be connected and all types of information are exchanged. This makes human daily life easier and much more intelligent than before. However, this life mode is vulnerable to several security threats. In fact, the mobile networks, by nature, are more exposed to malicious attacks that may read confidential information and modify or even drop important data. This risk should be taken in consideration prior to any construction of mobile networks especially in the coming 5G technology. The present paper aims to provide a contribution in securing such kinds of environment by proposing a new protocol that can be implemented in ad hoc networks.


Sensors ◽  
2020 ◽  
Vol 20 (3) ◽  
pp. 613
Author(s):  
David Safadinho ◽  
João Ramos ◽  
Roberto Ribeiro ◽  
Vítor Filipe ◽  
João Barroso ◽  
...  

The capability of drones to perform autonomous missions has led retail companies to use them for deliveries, saving time and human resources. In these services, the delivery depends on the Global Positioning System (GPS) to define an approximate landing point. However, the landscape can interfere with the satellite signal (e.g., tall buildings), reducing the accuracy of this approach. Changes in the environment can also invalidate the security of a previously defined landing site (e.g., irregular terrain, swimming pool). Therefore, the main goal of this work is to improve the process of goods delivery using drones, focusing on the detection of the potential receiver. We developed a solution that has been improved along its iterative assessment composed of five test scenarios. The built prototype complements the GPS through Computer Vision (CV) algorithms, based on Convolutional Neural Networks (CNN), running in a Raspberry Pi 3 with a Pi NoIR Camera (i.e., No InfraRed—without infrared filter). The experiments were performed with the models Single Shot Detector (SSD) MobileNet-V2, and SSDLite-MobileNet-V2. The best results were obtained in the afternoon, with the SSDLite architecture, for distances and heights between 2.5–10 m, with recalls from 59%–76%. The results confirm that a low computing power and cost-effective system can perform aerial human detection, estimating the landing position without an additional visual marker.


2016 ◽  
Vol 9 (10) ◽  
pp. 47 ◽  
Author(s):  
Faieza Chowdhury

<p class="apa">In recent years, education quality and quality assessment have received a great deal of attention at Higher Education Institutions (HEIs) in Bangladesh. Most of the HEIs in Bangladesh face severe resource constraints and find it difficult to improve education quality by improving inputs, such as better infrastructure and modernized classroom facilities. Thus, in response to the present government’s demand to improve the quality of education at HEIs in Bangladesh, it is imperative to formulate plans that are more cost-effective. According to some previous studies, the quality of education depends largely on the teaching-learning process. These studies affirm that, with limited resources at hand, the employment of active learning in the classroom is one of the most effective ways to improve education quality. To conduct this qualitative research, we utilized multiple sources of data, including semi-structured and in-depth interviews, descriptive observations and self-administered questionnaires. This paper aims to explore three related issues: What are the various active learning strategies that can be employed by the instructors at HEIs in Bangladesh? What are the potential factors that can hinder the implementation process? Finally, what recommendations can be provided on how to successfully implement active learning strategies in the classroom? The findings suggest that a lack of teacher training and student prior experience in an active learning environment, large class sizes, excessive curriculum loads and students’ academic backgrounds are some common factors that can hinder the implementation of active learning in Bangladesh. The findings of this study can be instrumental for HEIs in Bangladesh as they aspire to improve their education quality.</p>


Sign in / Sign up

Export Citation Format

Share Document