Main Article Content

Abstract

Network security is now increasingly needed in the era of the industrial revolution 4.0. As technology grows, cybercrimes are becoming more and more common, including attacks on a resource. At this time, honeypots are also widely used by large industries for network security, besides that honeypots are also useful for them in developing intrusion and preventing systems. Honeypots are usually used in a virtual environment, they will stimulate a fake system to capture data packets on the network and be analysed offline later for all threats and attacks.


This propose of this paper is to detect and prevent building attacks from computer network attackers using an android application. This application can monitor an attack on the server by installing a honeypot tool into the server as an attack detector, then the honeypot log is used as a Rest API using Django framework with MongoDB database. this application can find out if there is an attack on the server, and can block the attacker's IP address.

Article Details

How to Cite
Panduardi, F., Herman Yuliandoko, & Agus Priyo Utomo. (2021). Network Security Using Honeypot and Attack Detection with Android Application. Indonesian Journal of Engineering Research, 2(2), 53-60. https://doi.org/10.11594/10.11594/ijer.02.02.04

References

A. Jain, Dr. BalaBush (2015) “Advaces Trend in Network Security With Honeypot and its Compare Study With Othe Techniques”, R.N. Modi Engineering College, Kota, Rajasthan, India, (IJETT), Vol. 29, No. 26, Nov
B. Adam, A. Todd (2016) “What’s in Your Honeypot”, International Conferrence on Cyber Warfare and Security, 355-IX
J. Kumar Jain, S. Surabi (2012) “Honeypot Base Secure Network System”, Computer Science & Engineering Samrat Ashok Technological Institute Vidisha, MP, India, (IJCSE),-Volume 3 – no 2, Feb
K. Rutu (2011) “Honeypot With Honeypot Management System for Web Application”, California State University, Long Beach, Proquest Dissertation Publishing
K. Shubham, (2019) “Securing Network Trough Honeypot and its Implementation”, International Journal of Advanced Research in Computer Sience, Vol 10, No. 5, Sept-Okt
DOI:http://dx.doi.org/10.26483/ijarcs.v10i5.6478
Lakhsmi S. Deepa, G. Arunkumar, V. Madhu (2015) “Network Security Enhancement through Honey-pot based Systems”, International Journal of Engi-neering and Technology (IJET), Vol 7, No 1, Mar, ISSN: 0975-4024
M. Solomon Z, P.S. Avadhani (2016) “Honeypot System for Attacks on SSH Protocol”, I.J. Computer Network and Information Security, Sept
P. Sheilly, G. Sonali, Apoorva, Lotfy, K. Amandeep, (2016) “Honeypot : A Security Tool in Intrution Detection”, International Journal of Advanced Engineering, Management and Science (IJAEMS), Vol 2, Issue 5, May , ISSN: 2454-1311.
R. Rajbhar (2018) “Intrusion Detection & Prevention Using Honeypot”, International Journal of Advanced Research in Computer Sience, vol 9, No. 4, July
DOI: http://dx.doi.org/10.26483/ijarcs.v9i4.6176
S. Pavol, M. Jakub, H. Martin (2017) “Honeypots and Honeynets : Issues of Privacy”, EURASIP Journal on Information Security, April , DOI 10.1186/s13635-017-0057-4
Vladimir B. Oliviera, A. Zair, L. Denivaldo, Mario H. Santos, Valeria P. Fernandes (2013) “HONEYPOTLABSAC: A Virtual Honeypot Framework For Android”, International Journal of Computer Network and Communication (IJCNC), vol.5, No.5, July .