dc.description.abstract |
Cybercrime is committed with the intention of obtaining information, with the information afterwards utilized as a source of data to launch an assault. Attacks typically affect a wide range of space, starting from physical servers to virtual servers. This research focuses on the author's ability to implement a design-based qualitative development of existing technology, specifically the design of a virtual server system in the form of data communication security that can cover vulnerabilities in a virtual server. The authors' study found a difference in each attack test against the dynamic honeypot system's ability to detect intruders when conducting a test experiment based on attacks made on each port on the dynamic honeypot that is not configured with real services on the virtual server. The system detects the attacker's IP address based on attacks made on each port available in the dynamic honeypot application; however, when the dynamic honeypot's service port is configured, the honeypot cannot detect the attack. When running the dynamic honeypot system, bandwidth is consumed beginning with the data capture process with a total of 43442 bytes and ending with the use of 108352198 bytes in running the honeypot.
Keyword: dynamic honeypot, tunneling, virtual server.
| en_US |