Application of Honeypot in Network Security for Detecting Cyber Attacks on IT Infrastructure
The high security risks that are susceptible to hacking and exploitation by malicious actors to steal data or information often arise due to a lack of awareness regarding the critical importance of implementing deceptive network security using honeypots. Negligence can create vulnerabilities that a...
Saved in:
| Main Authors: | , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
LPPM STIKI Malang
2025-06-01
|
| Series: | J-Intech (Journal of Information and Technology) |
| Subjects: | |
| Online Access: | https://jurnal.stiki.ac.id/J-INTECH/article/view/1924 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1849423035360083968 |
|---|---|
| author | Carlos Susanto Moh Ali Romli |
| author_facet | Carlos Susanto Moh Ali Romli |
| author_sort | Carlos Susanto |
| collection | DOAJ |
| description |
The high security risks that are susceptible to hacking and exploitation by malicious actors to steal data or information often arise due to a lack of awareness regarding the critical importance of implementing deceptive network security using honeypots. Negligence can create vulnerabilities that are easily exploited, allowing attackers to initiate breaches. A notable network security approach involves using Honeypots, a method that creates a decoy server to mimic an authentic one. Honeypots are deliberately engineered to attract the attention of cyber attackers and facilitate their access to the trap server, thereby enabling the monitoring and analysis of their activities without compromising the integrity of the primary server. To achieve optimal network security, comprehensive testing of Honeypots is essential. This testing process serves as a fundamental metric in evaluating the efficacy and performance of Honeypot systems in mitigating cyber threats.
|
| format | Article |
| id | doaj-art-0e6f5048bd7c4cd09f0f3ca975bdb39a |
| institution | Kabale University |
| issn | 2303-1425 2580-720X |
| language | English |
| publishDate | 2025-06-01 |
| publisher | LPPM STIKI Malang |
| record_format | Article |
| series | J-Intech (Journal of Information and Technology) |
| spelling | doaj-art-0e6f5048bd7c4cd09f0f3ca975bdb39a2025-08-20T03:30:49ZengLPPM STIKI MalangJ-Intech (Journal of Information and Technology)2303-14252580-720X2025-06-01130110.32664/j-intech.v13i01.1924Application of Honeypot in Network Security for Detecting Cyber Attacks on IT InfrastructureCarlos Susanto0Moh Ali Romli1University of Technology Yogyakarta, IndonesiaUniversity of Technology Yogyakarta, Indonesia The high security risks that are susceptible to hacking and exploitation by malicious actors to steal data or information often arise due to a lack of awareness regarding the critical importance of implementing deceptive network security using honeypots. Negligence can create vulnerabilities that are easily exploited, allowing attackers to initiate breaches. A notable network security approach involves using Honeypots, a method that creates a decoy server to mimic an authentic one. Honeypots are deliberately engineered to attract the attention of cyber attackers and facilitate their access to the trap server, thereby enabling the monitoring and analysis of their activities without compromising the integrity of the primary server. To achieve optimal network security, comprehensive testing of Honeypots is essential. This testing process serves as a fundamental metric in evaluating the efficacy and performance of Honeypot systems in mitigating cyber threats. https://jurnal.stiki.ac.id/J-INTECH/article/view/1924AI Log AnalysisCyberattack DetectionHoneypotIntrusion MonitoringNetwork Security |
| spellingShingle | Carlos Susanto Moh Ali Romli Application of Honeypot in Network Security for Detecting Cyber Attacks on IT Infrastructure J-Intech (Journal of Information and Technology) AI Log Analysis Cyberattack Detection Honeypot Intrusion Monitoring Network Security |
| title | Application of Honeypot in Network Security for Detecting Cyber Attacks on IT Infrastructure |
| title_full | Application of Honeypot in Network Security for Detecting Cyber Attacks on IT Infrastructure |
| title_fullStr | Application of Honeypot in Network Security for Detecting Cyber Attacks on IT Infrastructure |
| title_full_unstemmed | Application of Honeypot in Network Security for Detecting Cyber Attacks on IT Infrastructure |
| title_short | Application of Honeypot in Network Security for Detecting Cyber Attacks on IT Infrastructure |
| title_sort | application of honeypot in network security for detecting cyber attacks on it infrastructure |
| topic | AI Log Analysis Cyberattack Detection Honeypot Intrusion Monitoring Network Security |
| url | https://jurnal.stiki.ac.id/J-INTECH/article/view/1924 |
| work_keys_str_mv | AT carlossusanto applicationofhoneypotinnetworksecurityfordetectingcyberattacksonitinfrastructure AT mohaliromli applicationofhoneypotinnetworksecurityfordetectingcyberattacksonitinfrastructure |