Implementation of the Honeypot Method in Form Input Security Against Sql-Injection Attacks


Implementasi Metode Honeypot Dalam Pengamanan Form Input Terhadap Serangan Sql-Injection


  • (1) * Adam Putra            Universitas Muhammadiyah Sidoarjo  
            Indonesia

  • (2)  Ade Eviyanti            Universitas Muhammadiyah Sidoarjo  
            Indonesia

    (*) Corresponding Author

Abstract

At this time the internet is something that can not be separated in the life of modern society. For this reason, fast, safe and reliable internet is very important. To achieve this on the internet there are various kinds of technology that make it very influential in our lives. In the scope of security for safe and smooth internet web surfing, we need security, especially in the excess part of the website. One way to do this is to commit website crimes, namely Sql Injection. Sql injection is a hacking action that is carried out in the client application by modifying the SQL commands that are in the client application memory. SQL Injection is a technique for exploiting web applications, commands can be entered as desired by the user even though the user is not authorized to do so. The damage done by the user that can lead to fatal consequences can be done by using SQL injection. One of the methods used to prevent website security attacks is Honeypot. Honeypot is a system or computer that is deliberately used as bait to become a target for attacks from attackers.

Downloads

Download data is not yet available.

References

A. S. Irawan, E. S. Pramukantoro, and A. Kusyanti, “Pengembangan Intrusion Detection System Terhadap SQL Injection Menggunakan Metode Learning Vector Quantization,” J. Pengemb. Teknol. Inf. dan Ilmu Komput. Univ. Brawijaya, vol. 2, no. 6, pp. 2295–2301, 2018.

I. Riadi, R. Umar, and W. Sukarno, ANALISIS FORENSIK SERANGAN SQL INJECTION MENGGUNAKAN METODE STATIS FORENSIK. 2019.

W. D. Fatma, “Analisa Keamanan Server Pada Login Page Webserver Dengan Enkripsi Sha 1 Dari Serangan Sql Injection Menggunakansystemoperasi Kali Linux Di Lkp Multi Logika Binjai,” 2018.

Yulianingsih, J. Nangka, T. Barat, and J. J. Selatan, “Menangkal Serangan SQL Injection dengan Parameterized Query,” 2018.

T. R. Yudantoro, “Sql Injection Pada Sistem Keamanan Database,” 2018.

P. Soepomo, “Penerapan Sistem Keamanan Honeypot dan Ids pada Jaringan Nirkabel (Hotspot),” JSTIE (Jurnal Sarj. Tek. Inform., vol. 1, no. 1, pp. 111–118, 2019, doi: 10.12928/jstie.v1i1.2512.

M. H. Romadhon and Y. Yudhistira, “Sistem Informasi Rental Mobil Berbsasis Android Dan Website Menggunakan Framework Codeigniter 3 Studi Kasus : CV Kopja Mandiri,” vol. 2, no. 1, pp. 30–36, 2021.

R. F. Ramadhan and R. Mukhaiyar, “Penggunaan Database Mysql dengan Interface PhpMyAdmin sebagai Pengontrolan Smarthome Berbasis Raspberry Pi,” JTEIN J. Tek. Elektro Indones., vol. 1, no. 2, pp. 129–134, 2020, doi: 10.24036/jtein.v1i2.55.

N. Arkaan and D. V. S. Y. Sakti, “Implementasi Low Interaction Honeypot Untuk Analisa Serangan Pada Protokol SSH,” J. Nas. Teknol. dan Sist. Inf., vol. 5, no. 2, pp. 112–120, 2019, doi: 10.25077/teknosi.v5i2.2019.112-120.

B. Wiguna et al., “Wiguna, Implementasi Web Application Firewall dalam Mencegah Serangan SQL Injection pada Website Implementasi Web Application Firewall Dalam Mencegah Serangan SQL Injection Pada Website,” 2019, doi: 10.31849/digitalzone.v11i2.4867ICCS.

Picture in here are illustration from public domain image (License) or provided by the author, as part of their works
Published
2022-12-31
 
How to Cite
[1]
A. Putra and A. Eviyanti, “Implementation of the Honeypot Method in Form Input Security Against Sql-Injection Attacks”, PELS, vol. 3, Dec. 2022.

Most read articles by the same author(s)

<< < 1 2