scholarly journals Implementasi Honeypot Menggunakan Dionaea Dan Kippo Sebagai Penunjang Keamanan Jaringan Komunikasi Komputer

2021 ◽  
Vol 9 (1) ◽  
pp. 80-91
Author(s):  
Adi Widiatmoko Wastumirad ◽  
Moh Irzam Darmawan

Today, the internet has become the most used tool for delivering information. Through the internet, people can search for information by freely accessing a web page. This freedom of access often raises security issues in the website provider's internal network. These security issues can be in the form of misuse of information, threats, and other attacks on the provider's internal network. Based on these conditions, a technique is needed to protect important data on the website owner's server from various attacks. In this research, a Honeypot security system has been implemented using Dionaea and Kippo in the Demilitarized Zone to increase the security of a network. The methodology of this research is Waterfall Model for software engineering. The system that has been built is able to detect, take action, record attack logs and display them in the form of a website in real time.

2014 ◽  
Vol 573 ◽  
pp. 519-522
Author(s):  
N.S. Sudharsan ◽  
K. Latha

. Phishing has become most notorious security issues in online real time web pages. Many studies and ideas have been proposed related to phishing attack in order to overcome the security issues. Phishing attack can be easily done by Uniform resource locator (URL) obfuscation. It is the trick where the user will be forwarded to fake web page which has look and feel effect as the original web page when they click through the fake link. Organizations which use online business and transaction like ebay, paypal use many preventive approaches like blacklist, whitelist of URL in order to prevent any online theft using phishing attack. This paper propose a novel idea for detecting Phishing attack by checking the URL patterns of the suspected page with generated legitimate common URL pattern by inspecting different international URL patterns of that particular banking site.


The Given dynamic web pages have many security issues, and it can be very difficult to handle.The goal of card and finger print system gives more security to dynamic web pages. In this paper, We clearly discuss and workout the real time example with the help of Internet. Specifically, by introducing this technology the cyber crime also be comes underthecontrol.Fingerprintverificationisanimportantbiometric techniqueforpersonalidentification.Inthispaper,wedescribethede signandimplementationofaprototypeautomaticidentityauthentic ationsystemwhichusesfingerprintstoauthenicatetheidentityofani ndividual.


Author(s):  
Cristinel Marius VASILE

Today, most businesses are based on a computer system, more or less developed. For daily activities the organization needs to be able to connect to the Internet, possibly from a local area network (LAN). But, once with the benefits of the Internet, there are also security risks that the organization must minimize by measures and appropriate controls. Among security issues arising from using the Internet include hacker attacks, computers infection with viruses, malware and spyware. In theory, hackers can enter inside the organization network and steal confidential data, damaging computers or the entire organization's local area network. In this sense, firewall implementation is a security measure needed to any organization. This paper presents firewall types and technologies, attacks on firewalls and some security measures on the internal network.


IEE Review ◽  
1992 ◽  
Vol 38 (3) ◽  
pp. 112
Author(s):  
Stuart Bennett

Author(s):  
Qingtao Wu ◽  
Zaihui Cao

: Cloud monitoring technology is an important maintenance and management tool for cloud platforms.Cloud monitoring system is a kind of network monitoring service, monitoring technology and monitoring platform based on Internet. At present, the monitoring system is changed from the local monitoring to cloud monitoring, with the flexibility and convenience improved, but also exposed more security issues. Cloud video may be intercepted or changed in the transmission process. Most of the existing encryption algorithms have defects in real-time and security. Aiming at the current security problems of cloud video surveillance, this paper proposes a new video encryption algorithm based on H.264 standard. By using the advanced FMO mechanism, the related macro blocks can be driven into different Slice. The encryption algorithm proposed in this paper can encrypt the whole video content by encrypting the FMO sub images. The method has high real-time performance, and the encryption process can be executed in parallel with the coding process. The algorithm can also be combined with traditional scrambling algorithm, further improve the video encryption effect. The algorithm selects the encrypted part of the video data, which reducing the amount of data to be encrypted. Thus reducing the computational complexity of the encryption system, with faster encryption speed, improve real-time and security, suitable for transfer through mobile multimedia and wireless multimedia network.


IEEE Access ◽  
2021 ◽  
pp. 1-1
Author(s):  
Jiabin Li ◽  
Zhi Xue ◽  
Changlian Li ◽  
Ming Liu

2003 ◽  
Vol 22 (2) ◽  
pp. 87-93
Author(s):  
James Otto ◽  
Mohammad Najdawi ◽  
William Wagner

With the extensive growth of the Internet and electronic commerce, the issue of how users behave when confronted with long download times is important. This paper investigates Web switching behavior. The paper describes experiments where users were subjected to artificially delayed Web page download times to study the impact of Web site wait times on switching behavior. Two hypotheses were tested. First, that longer wait times will result in increased switching behavior. The implication being that users become frustrated with long waiting times and choose to go elsewhere. Second, that users who switch will benefit, in terms of decreased download times, from their decision to switch.


Sign in / Sign up

Export Citation Format

Share Document