
Analysis of Hacker Attack Using Honeypot High Interaction
Author(s) -
Wahyu Purnama Sari,
I Nyoman Adhi Palguna Putra
Publication year - 2018
Publication title -
jurnal tiarsie
Language(s) - English
Resource type - Journals
eISSN - 2623-2391
pISSN - 1411-2248
DOI - 10.32816/tiarsie.v14i1.16
Subject(s) - hacker , honeypot , computer security , sql injection , denial of service attack , cross site scripting , computer science , asset (computer security) , scripting language , confidentiality , information security , application layer ddos attack , internet privacy , the internet , world wide web , web application security , operating system , web development , query by example , web search query , search engine
Information is a corporate asset that should be kept confidential access to parties who are not responsible. Aspects of the security of the information to be protected includes the Confidentiality, Integrity and Availability. A wide range of attacks and threats can be made to take over the assets of the desired information. A hacker is someone who has the ability to penetrate security systems of a company. There are several types of hacker attacks performed, i.e. SQL Injection, Cross Site Scripting (XSS), Brute Force, Distributed-Denial-of-Service (DDoS), Inclusion, Code Injection and more. Honeypot is a security technology that aims to identify, find security gaps and contribute actively when there are security intrusions on information technology activities. High Interaction Honeypot (Hihat) may record and collect information more specific attacks and more. The type of attack that was recorded by the Honeypot Hihat is then analyzed to find out the type of attack that most got into XYZ Company.