Implementation of the Honeypot Method in Form Input Security Against Sql-Injection Attacks Implementasi Metode Honeypot Dalam Pengamanan Form Input Terhadap Serangan Sql-Injection

Main Article Content

Adam Putra
Ade Eviyanti

Abstract

At this time the internet is something that can not be separated in the life of modern society. For this reason, fast, safe and reliable internet is very important. To achieve this on the internet there are various kinds of technology that make it very influential in our lives. In the scope of security for safe and smooth internet web surfing, we need security, especially in the excess part of the website. One way to do this is to commit website crimes, namely Sql Injection. Sql injection is a hacking action that is carried out in the client application by modifying the SQL commands that are in the client application memory. SQL Injection is a technique for exploiting web applications, commands can be entered as desired by the user even though the user is not authorized to do so. The damage done by the user that can lead to fatal consequences can be done by using SQL injection. One of the methods used to prevent website security attacks is Honeypot. Honeypot is a system or computer that is deliberately used as bait to become a target for attacks from attackers.

Downloads

Download data is not yet available.

Article Details

How to Cite
[1]
A. Putra and A. Eviyanti, “Implementation of the Honeypot Method in Form Input Security Against Sql-Injection Attacks”, PELS, vol. 3, Dec. 2022.
Section
Computer Science

References

[1] A. S. Irawan, E. S. Pramukantoro, and A. Kusyanti, “Pengembangan Intrusion Detection System Terhadap SQL Injection Menggunakan Metode Learning Vector Quantization,” J. Pengemb. Teknol. Inf. dan Ilmu Komput. Univ. Brawijaya, vol. 2, no. 6, pp. 2295–2301, 2018.
[2] I. Riadi, R. Umar, and W. Sukarno, ANALISIS FORENSIK SERANGAN SQL INJECTION MENGGUNAKAN METODE STATIS FORENSIK. 2019.
[3] W. D. Fatma, “Analisa Keamanan Server Pada Login Page Webserver Dengan Enkripsi Sha 1 Dari Serangan Sql Injection Menggunakansystemoperasi Kali Linux Di Lkp Multi Logika Binjai,” 2018.
[4] Yulianingsih, J. Nangka, T. Barat, and J. J. Selatan, “Menangkal Serangan SQL Injection dengan Parameterized Query,” 2018.
[5] T. R. Yudantoro, “Sql Injection Pada Sistem Keamanan Database,” 2018.
[6] P. Soepomo, “Penerapan Sistem Keamanan Honeypot dan Ids pada Jaringan Nirkabel (Hotspot),” JSTIE (Jurnal Sarj. Tek. Inform., vol. 1, no. 1, pp. 111–118, 2019, doi: 10.12928/jstie.v1i1.2512.
[7] M. H. Romadhon and Y. Yudhistira, “Sistem Informasi Rental Mobil Berbsasis Android Dan Website Menggunakan Framework Codeigniter 3 Studi Kasus : CV Kopja Mandiri,” vol. 2, no. 1, pp. 30–36, 2021.
[8] R. F. Ramadhan and R. Mukhaiyar, “Penggunaan Database Mysql dengan Interface PhpMyAdmin sebagai Pengontrolan Smarthome Berbasis Raspberry Pi,” JTEIN J. Tek. Elektro Indones., vol. 1, no. 2, pp. 129–134, 2020, doi: 10.24036/jtein.v1i2.55.
[9] N. Arkaan and D. V. S. Y. Sakti, “Implementasi Low Interaction Honeypot Untuk Analisa Serangan Pada Protokol SSH,” J. Nas. Teknol. dan Sist. Inf., vol. 5, no. 2, pp. 112–120, 2019, doi: 10.25077/teknosi.v5i2.2019.112-120.
[10] B. Wiguna et al., “Wiguna, Implementasi Web Application Firewall dalam Mencegah Serangan SQL Injection pada Website Implementasi Web Application Firewall Dalam Mencegah Serangan SQL Injection Pada Website,” 2019, doi: 10.31849/digitalzone.v11i2.4867ICCS.

Most read articles by the same author(s)

<< < 1 2