Application of Honeypot in Network Security for Detecting Cyber Attacks on IT Infrastructure

The high security risks that are susceptible to hacking and exploitation by malicious actors to steal data or information often arise due to a lack of awareness regarding the critical importance of implementing deceptive network security using honeypots. Negligence can create vulnerabilities that a...

Full description

Saved in:
Bibliographic Details
Main Authors: Carlos Susanto, Moh Ali Romli
Format: Article
Language:English
Published: LPPM STIKI Malang 2025-06-01
Series:J-Intech (Journal of Information and Technology)
Subjects:
Online Access:https://jurnal.stiki.ac.id/J-INTECH/article/view/1924
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849423035360083968
author Carlos Susanto
Moh Ali Romli
author_facet Carlos Susanto
Moh Ali Romli
author_sort Carlos Susanto
collection DOAJ
description The high security risks that are susceptible to hacking and exploitation by malicious actors to steal data or information often arise due to a lack of awareness regarding the critical importance of implementing deceptive network security using honeypots. Negligence can create vulnerabilities that are easily exploited, allowing attackers to initiate breaches. A notable network security approach involves using Honeypots, a method that creates a decoy server to mimic an authentic one. Honeypots are deliberately engineered to attract the attention of cyber attackers and facilitate their access to the trap server, thereby enabling the monitoring and analysis of their activities without compromising the integrity of the primary server. To achieve optimal network security, comprehensive testing of Honeypots is essential. This testing process serves as a fundamental metric in evaluating the efficacy and performance of Honeypot systems in mitigating cyber threats.
format Article
id doaj-art-0e6f5048bd7c4cd09f0f3ca975bdb39a
institution Kabale University
issn 2303-1425
2580-720X
language English
publishDate 2025-06-01
publisher LPPM STIKI Malang
record_format Article
series J-Intech (Journal of Information and Technology)
spelling doaj-art-0e6f5048bd7c4cd09f0f3ca975bdb39a2025-08-20T03:30:49ZengLPPM STIKI MalangJ-Intech (Journal of Information and Technology)2303-14252580-720X2025-06-01130110.32664/j-intech.v13i01.1924Application of Honeypot in Network Security for Detecting Cyber Attacks on IT InfrastructureCarlos Susanto0Moh Ali Romli1University of Technology Yogyakarta, IndonesiaUniversity of Technology Yogyakarta, Indonesia The high security risks that are susceptible to hacking and exploitation by malicious actors to steal data or information often arise due to a lack of awareness regarding the critical importance of implementing deceptive network security using honeypots. Negligence can create vulnerabilities that are easily exploited, allowing attackers to initiate breaches. A notable network security approach involves using Honeypots, a method that creates a decoy server to mimic an authentic one. Honeypots are deliberately engineered to attract the attention of cyber attackers and facilitate their access to the trap server, thereby enabling the monitoring and analysis of their activities without compromising the integrity of the primary server. To achieve optimal network security, comprehensive testing of Honeypots is essential. This testing process serves as a fundamental metric in evaluating the efficacy and performance of Honeypot systems in mitigating cyber threats. https://jurnal.stiki.ac.id/J-INTECH/article/view/1924AI Log AnalysisCyberattack DetectionHoneypotIntrusion MonitoringNetwork Security
spellingShingle Carlos Susanto
Moh Ali Romli
Application of Honeypot in Network Security for Detecting Cyber Attacks on IT Infrastructure
J-Intech (Journal of Information and Technology)
AI Log Analysis
Cyberattack Detection
Honeypot
Intrusion Monitoring
Network Security
title Application of Honeypot in Network Security for Detecting Cyber Attacks on IT Infrastructure
title_full Application of Honeypot in Network Security for Detecting Cyber Attacks on IT Infrastructure
title_fullStr Application of Honeypot in Network Security for Detecting Cyber Attacks on IT Infrastructure
title_full_unstemmed Application of Honeypot in Network Security for Detecting Cyber Attacks on IT Infrastructure
title_short Application of Honeypot in Network Security for Detecting Cyber Attacks on IT Infrastructure
title_sort application of honeypot in network security for detecting cyber attacks on it infrastructure
topic AI Log Analysis
Cyberattack Detection
Honeypot
Intrusion Monitoring
Network Security
url https://jurnal.stiki.ac.id/J-INTECH/article/view/1924
work_keys_str_mv AT carlossusanto applicationofhoneypotinnetworksecurityfordetectingcyberattacksonitinfrastructure
AT mohaliromli applicationofhoneypotinnetworksecurityfordetectingcyberattacksonitinfrastructure